08982917_NewHorizons Flashcards

(55 cards)

1
Q

Name one Stream Cipher

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IMAP Port

A

143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Devices at Layer 3

A

Router - Makes decisions on sending PACKETS..

Can find the fastest ROUTE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Drawback to CBC

A

Have to go in order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric Examples

A

RSA (used by Web), Diffie-Hellman,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RC4 is a ______ cipher

A

STREAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In Stream Cipher the bit are same size as _____

A

plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Deluge System

A

Floods area - Fire suppression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Substitution

A

Swaps out plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transposition or Permutation does what?

A

TRANSPOSITION CIPHERS rearrange the letters of a plaintext message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer 3 (Network) data element

A

PACKET DATAGRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FTP, HTTP, SMTP function at what layer

A

7 Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Element for Layer 2

A

FRAME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Substitution and Transposition provide..

A

Confusion and Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP is in layer …

A

2 Data - Assigns MAC to IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

0-1023 are known as

A

Well known ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Key management should be used to:

A
Issue, 
Store , 
Backup, 
Renew, 
Revoke, 
Expire, 
Destroy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security Architects design based on __________

A

requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Layer 2 Tunneling protocol, occurs at what layer?

A

Layer 2 (data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SAG vs BROWNOUT

A

SAG short timeframe of LOW

BROWNOUT longer timeframe of low power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Attempting to use multiple combinations of username and password. What is this attack?

A

Brute Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Covert Channel is _______. What types are there?

A

“Unintended” access to data.

Storage-

Timing- Observe timing and order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PKI workflow

A

Sender requests certificate from CA
Sender gets certificate
Receiver verifies CA using CRL or OCSP
Receiver trusts Sender

24
Q

Birthday attack focuses on finding ______

25
Hash - One Way
MD5, SHA1/2/256,
26
ICMP, OSPF and IP reside at what layer?
Layer 3 (Network)
27
IMAPs Port
995
28
802.3 operates at which layer?
Layer 1 and 2, Ethernet
29
Layer 3 (Network) protocols
IP, ICMP, RIP, OSPF
30
ICS vulnerabilities
legacy code,
31
Cipher is also known as an _______
algorithm
32
IP is layer ..
3 Network
33
ICS mitigation
Patching, design using IDS and Firewalls,
34
Stream ciphers encrypt data ____ at a time
ONE
35
TCP/IP Stack
Application Host to Host Networking Network Access
36
What is the most commonly used and standard for Symmetric Encryption
AES
37
Block cipher blocks in ______
Chunks - 64/128bit at a time.
38
Stream and Block are a form _____ encryption
Symmetric
39
Key Clustering
Multiple Keys work for one lock
40
US Government Security Modes: Security Modes Must have these 3 things:
1) Mandatory Access Control environment MAC. 2) Total PHYSICAL control of COMPUTER CONSOLE. 3) Total PHYSICAL control over subject access to COMPUTER CONSOLE work space. ..
41
_______ _______mode provides the most granular control over resources and users because it enforces clearances, requires need to know, and allows the processing of only single sensitivity levels. All the other levels either do not have unique need to know between users (dedicated), allow multiple levels of data processing (compartmented), or allow a wide number of users with varying clearance (multilevel).
System high
42
Layer 2 devices?
Switches (layer 2 switch)
43
Layer 4 (Transport) data element
SEGMENT
44
Block Cipher Examples
DES, AES, Blowfish, IDEA
45
UDP, TCP, SSL/TLS is what layer
Layer 4 Transport
46
Layer 6 protocols and functions
Encryption, JPG, MPG, JPG
47
Primary risk for sending unencrypted data on the network
Sniffing attack
48
HTTP is what layer
7 Apllication
49
Encryption is used for ______ , _______and ____
Confidentiality, Integrity and NonRepudiation
50
Stream Cipher Examples
RC4
51
Block Cipher is _______ than Stream Cipher but more secure
Slower
52
JPG, MPG, PNG, Encryption and Compression layer ??
6 Presentation
53
Dictionary Attack
Encrypts know pw's and compares the hash with your hash.
54
Layer 2 (Data) protocols
ARP, Ethernet, L2TP
55
Well Known Port #'s
0-1023