Studydroid is shutting down on January 1st, 2019

Bookmark and Share

Front Back
What is a key difference in security between MAC and DAC?
In MAC a user who can access a file cannot necessarily copy it.
What DoD classification does MAC map to?
Level-B classification
What DoD classification does DAC map to?
Level-C classification
What does CHAP use for authentication?
What is AES?
\\\"Also known as Rijndael
What type of encryption is AES?
What kind of algorithm is 3DES?
What algorithm does AES use?
What two encryption standards is AES designed to replace?
DES and 3DES
What is the most effective way of enforcing security in a dialup network?
require callback
What port do DNS zone transfers use?
TCP port 53
What port do DNS lookups use?
UDP port 53
Why do routers help limit the damage done by sniffing and MITM attacks?
They send data to a specific subnet only
What are the two types of symmetric algorithms?
block and stream
What are the two advantages of block ciphers over stream ciphers?
They are faster and more secure.
What is the main difference between S/MIME and PGP?
S/MIME relies upon a CA for public key distribution
What is the maximum throughput of 802.11a?
54 Mbps
What frequency does 802.11b operate at?
2.4 GHz
What is the maximum throughput of 802.11b?
11 Mbps
What frequency does 802.11g operate at?
2.4 GHz
What is the maximum throughput of 802.11g?
54 Mbps
Is 802.11g backwards-compatible with 802.11a and 802.11b?
backwards-compatible with 802.11b only at 11 Mbps
What type of media access control does 802.11 use?
collision avoidance
What sort of attack does TACACS+\\\'s lack of integrity checking make it vulnerable to?
replay attacks
What two bit strengths is SSL available in?
40-bit and 128-bit
What is the maximum capacity of QIC?
20 GB
What is the maximum capacity of 4mm DAT?
40 Gb
What is the maximum capacity of 8mm tapes?
50 Gb
What is the maximum capacity of Travan?
40 Gb
What is the maximum capacity of DLT?
220 Gb
With biometric scanning what is rejecting a valid user called?
Type I Error
With biometric scanning what is accepting a user who should be rejected called?
Type II error
In biometric scanning what is the crossover accuracy?
When type I error equals Type II error.
What mathematical fact does a birthday attack rely on?
it is much easier to find two datasets that share a hash than to find a dataset that shares a hash with a given dataset
What is CRL?
Certificate Revocation List \\\"A list of certificates (more accurately: their serial numbers) which have been revoked
What is OCSP?
Online Certificate Status Protocol The replacement for CRL
What disadvantage does CRL have that OCSP addresses?
updates must be downloaded frequently to be accurate
Does TLS use the same ports for encrypted and unencrypted data?
What is the difference between S-HTTP and SSL?
\\\"S-HTTP is designed to send individual messages securely
What is the primary limitation of symmetric cryptography?
key distribution
What protocol is being pushed as an open standard for IM?
In relation to AAA what is CIA?
What are the three components of AAA?
What is an open relay?
an SMTP relay that does not restrict access to authenticated users
Describe the Diffie-Hellman key exchange.
A cryptographic protocol that allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher.
What encryption scheme does WEP use?
Who created RC2 and RC4?
What are the two main types of firewalls?
application-level and network-level
How does an application level firewall handle different protocols?
With a proxy program for each protocol
What happens if an application-level protocol doesn\\\'t have a proxy program for a given protocol?
the protocol can\\\'t pass through the firewall
x of y cards Next > >> >|