Domain 3 virtualization&architecture Flashcards

1
Q

s2.20 What is DCE? Verus what is this system? Why use DCEs?

A

Distributed computing environment. Not a centeralized system. It gives us horizaotnal scaling. modualr grwoth ,fault tolerance, coste effectiveness, low laency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

s2.20 Grid vs HPC system. Edge vs CDN?

A

Grid is different. it uses what ever resoruce is available. Edge is closest to where it is needed. Not all edge is cdn. all cdns are edge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

s2.22 What is emanation? What is steganography? what is cover timing channel?

A

2ndary information given. Unintentional signals. Steg: it is midden message within another media. Covert timing is manipulating the timing of events to covertly transmit information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

s2.23 exam tip on malware

A

You will not a get definition of a malware. it will ask how to protect by words like embedded, alter signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

s2.24 What are rootkits?

A

Malware. Replace some of the OS/Kernel with a malicious payload. User rootkits work on ring 3 and kernel rootkits on ring 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

s2.24 What are packers?

A

programs to compress *.exe files, which can be used to hid malware in a executable neutral technology. Trojan file. Changes the hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

s2.24 what can help with server side atacks? Can firewalls help with client side attacks?

A

defense in depth can mitigate some of these. Firewalls do not help. they only monitor inbound traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

s2.25 8min great exam tip

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

s2.26 What is polyinstantiation? What is aggregation?

A

alternative facts. two or more instance of the same file depending on who accesses it. Aggregation is collection of data for the purpose of statistical analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

s2.28 What is SCADA Supervisory Conrol and Data Acquistion?

A

Control system architecture that uses comptuers, networked data communications and GUI for high level process supervisory management. It uses the DNP3 Distributed Network Protocal .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

s2.29 What is difference between Cryptology and crypotgraphy? What is cipher?

A

Crptology is the science of securing communication. Crypotography is the study of creing messages where the meaning is hidden. Cipher is a cyptographi algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

s2.31 What is spartan scytale?

A

Message written lengthwise on a long thin pieceof parchment wrapped in a stick. By itself it is no sense but if rewrapped around a stick of hte same diameter it would be decipherable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

s2.31 What is caesar cipher?

A

done by switching letters by a certain number of spots in the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

s2.31Vigenere cipher?

A

16th century. alphabet is repeated 26 times to form a matrix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

s2.31 What is cipher disk?

A

2 concertric disk with alphabets on them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

s2.31 What is purple?

A

japanese rotary based very similar to the enigma. 3 rotors. German enigma is 4 rotors.

17
Q

s2.32 What is one time pad in cryptogprahy?

A

Algorithm where plaintext is combined with a random key. Unbreakable but very iimpractical. Charactered must be random

18
Q

s2.32 What is vernam cipher?

A

1st known use of one time pad. Used in bits and bits were XOR’d in plaintext bits.

19
Q

s2.32 Project VENONA?

A

US and UK broke KGB one time pad. KGB reused pads and many messages were decoded.

20
Q

s2.32 What is Jefferson Disk (Bazeries Cylinder)?

A

a cipher system each with 26 letters around the edge. each disk hasa unique number. the order of the disk is the cipher key. Both sender and receiver must arrange the disk in the same predefined order.

21
Q

s2.32 What is Sigaba?

A

US version of the enigma. It has 3x5 = 15 set of rotors. no successful cryptanalysis known.

22
Q

s2.32 what is cocom and wassenaar arrangement?

A

cocom prevent the export of critical tech. ended in 94. Wassenaar is from 96 to now. limits exports for dual use tech. crypotgraphy is part of that.

23
Q

s2.32 What is monoaplhabetic substitution?

A

Its a cipher text encryption using frequency to replace each letter of the plain text. Frequency analysis is an attack message

24
Q

s2.32 What is transposition? What is substitution?

A

IT is a cryptographic method that rearranging the letters of the plaintext. Substitution is replacing the plaintext symbols with other symbols.

25
Q
A