600 Flashcards Preview

Security > 600 > Flashcards

Flashcards in 600 Deck (100)
Loading flashcards...
1

92 - 128 - 256 bit bit/key strength

AES

2

168 bit/key strength

3DES

3

160 bit/key strength

SHA-1 bit/key strength

4

128 bit/key strength

MD5 bit/key strength

5

MSCHAPv2

Microsoft's authentication protocol

6

a legacy suite of Microsoft security protocols that provides authentication - integrity - and confidentiality

NTLM

7

Stop gap replacement for WEP while hardware was upgraded to support full WPA

TKIP(Temporal Key Integrity Protocol)

8

Allows single file encryption

EFS

9

Social media sites fuel what type of attacks?

Cognitive password attacks

10

encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.

PEAP(Protected Extensible Authentication Protocol)

11

encrypts a chunk of bits at a time before sending them over the network.

Block cipher

12

a client or user authenticating themselves to a server and that server authenticating itself to the user in such a way that both parties are assured of the others' identity

mutual authentication

13

Strongest access control

MAC

14

limiting MAC addresses to a port prevents what?

Rogue access points

15

Where

Bitlocker

16

Plain text and cipher text are always the same size

block cipher

17

Secure a router in an unsecured closet?

disable the console port

18

a system that is designed to detect potential data breach

DLP(data loss prevention)

19

Personal Electronic Device

PED

20

Disable what to prevent a web server from being used as a mail relay?

SMTP

21

Mitigate ARP spoofing attacks?

Flood guards

22

Cisco: block tftp and record it?

deny udp any server eq 69 log

23

Protect from zero day attacks?

HIPS

24

Triple A Services

Authorization - Authentication - Accounting

25

Query packet for remote identification - lights up multiple flag fields?

XMAS

26

Username - password & PIN?

single factor authentication

27

Smartcards vs key punch?

eliminates shoulder surfing

28

Keys needed to decrypt encrypted data are held in escrow so that an authorized third party may gain access to those keys.

key escrow

29

A network service that supplies session tickets and temporary session keys to users and computers within an Active Directory domain - runs on each domain controller

Kerberos Key Distrobution Center

30

Deploys quickly and cleanly and won't leave behind oily residue - particulate - or water.

FM-200