Deck 1 Flashcards
(47 cards)
What is DAC?
Discretionary access control
What is kismet?
Kismet is an open source wireless sniffer. It can monitor wireless networks and the devices connected to them. As well as create coverage maps based on signal strength.
Where should a WAF be placed?
A Web Application Firewall (WAF) helps protect web applications from common attacks. It needs to sit in front of the web servers to perform its job and should be placed behind the firewall, as it does not replace the firewall
What is AES?
Advanced Encryption Standard (AES), another symmetric algorithm, is the replacement for DES. It can provide three different block sizes: 128, 192, and 256. Each goes through more iterations of computing the algorithm applied to the message.
What is DES?
Digital Encryption Standard (DES), a symmetric algorithm, uses a 64-bit key and divides the message into 64-bit blocks, with 16 rounds of transposition and substitution performed on each block. Replaced by AES
What is IDEA?
International Data Encryption Algorithm (IDEA) is a symmetric block cipher that uses 64-bit blocks. Each block is divided into 16 smaller blocks and then computed several times.
What is AEAD?
Authentication Encryption with Associated Data (AEAD) encrypts data with a symmetric key and generates an authentication tag that can verify the data’s authenticity.
What is a state-based threshold?
State-based thresholds are triggered when a system state changes, such as a firewall beginning a graceful shutdown or starting up after rebooting.
What is a fixed threshold?
Fixed thresholds are based on fixed numeric values or calculations.
What is a historical threshold?
Historical thresholds consider past and present values and are often used to compare different periods.
What is the perimeter network?
Perimeter network is the boundary between an internal network and the external network.
What is an Integer overflow?
An integer overflow occurs if an application tries to store a number that is larger than the size allocated to it. This can cause the number to wrap around or cause unusual behavior.
What is Javasnoop
JavaSnoop is for testing the security of Java applications
What is diStorm3?
The diStorm3 tool is for reverse engineering software
What is Haschat?
Haschat is a password cracking tool
What is a VLAN?
Virtual local area networks (VLANs) are logical subdivisions of a switch that segregate ports from one another as if they were in different LANs. VLANs can also span multiple switches, meaning that devices connected to the switches in different parts of a network can be placed in the same VLAN, regardless of physical location.
What is Port Mirroring?
Port mirroring is the process of replicating data transmitted over one switch port on another port
What is a collision domain?
Collision domains are segments of a network where packets may collide (e.g., an entire network hub or an individual switch port).
What is a broadcast domain?
Broadcast domains are a segment of a network that all receive the same broadcast messages.
What is a hashing collision?
When a hashing algorithm produces the same output from two different inputs
Hashing algorithms are often used for data integrity and authentication. It is important for them to produce different outputs (hash values) given a different input. When two different inputs create the same hash value, cybersecurity professionals call that a collision
What are the 4 ways to handle risk?
The four ways to handle risk are:
• Avoid - Eliminate the risk in some way. For example, an organization may avoid doing something or stop doing something.
• Accept - Accept the risk and proceed anyway. An informed decision has been made to move forward despite the risk.
• Transfer - Transfer the risk to some other organization or person. A common example of transferring risk is purchasing insurance.
• Mitigate - A control(s) is implemented to reduce risk.
What is OWASP?
The Open Web Application Security Project (OWASP) is a group that monitors attacks, specifically web attacks. They seek to provide additional information to those affected by any cyber attacks and maintain a list of the top 10 attacks impacting web applications (the “OWASP Top 10).
What is SCAP?
The Security Content Automation Protocol (SCAP) is maintained by the National Institute of Standards (NIST) and includes specifications that help standardize cybersecurity automation tasks including vulnerability and compliance management.
What is IEC?
The International Electrotechnical Commission (IEC) maintains electronic and electrical engineering standards