E5 Flashcards

1
Q

<p>Exam Question 201 (p.269)Why are weak passwords a significant problem in networks?</p>

A

<p>Because hackers get in and cause trouble.</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

<p class=”large” style=”text-align:center”;>Exam Question 202 (p.269):List three true measures of password quality.</p>

A

<p class=”large” style=”text-align:center”;>Is it easy for you to remember? Is it dicult to guess? Is it difficult forothers to remember</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

<p>Exam Question 203 (p.269):What is a dictionary attack?</p>

A

<p>It is using a long list of likely passwords in hopes of finding one that works</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

<p class=”large” style=”text-align:center”;>Exam Question 204 (p.269):List two types of bad passwords.</p>

A

<p class=”large” style=”text-align:center”;>a) anything short, (b) anything in a dictionary.</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

<p class=”large” style=”text-align:center”;>Exam Question 205 (p.269):What do I recommend for a password?</p>

A

<p class=”large” style=”text-align:center”;>initials of a familiar phrase</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

<p>Exam Question 206 (p.269):What is a high-value password?</p>

A

<p>A password to protect a high-value asset.</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

<p class=”large” style=”text-align:center”;>Exam Question 207 (p.269):What is a low-value password?</p>

A

<p class=”large” style=”text-align:center”;>A password to protect a low-value asset.</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

<p>Exam Question 208 (p.269):Does it matter if a low-value password is easy to guess?</p>

A

<p>Not much.</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

<p class=”large” style=”text-align:center”;>Exam Question 209 (p.269):List four ways to prove identity.</p>

A

<p class=”large” style=”text-align:center”;>What you have. What you know. What you are. What you can do.</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

<p class=”large” style=”text-align:center”;>Exam Question 210 (p.269):What is multi-factor authentication?</p>

A

<p class=”large” style=”text-align:center”;>Several UNRELATED factors must be presented.</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

<p>Exam Question 211 (p.269):What is single sign-on?</p>

A

<p>You authenticate once and then receive credentials that are (a) used onrelated websites (b) in place of authenticating again.</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

<p class=”large” style=”text-align:center”;>Exam Question 212 (p.269):What is a hacker?</p>

A

<p class=”large” style=”text-align:center”;>Someone that goes beyond the routine ways of using a tool.</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

<p class=”large” style=”text-align:center”;>Exam Question 213 (p.269):Is hacking bad?</p>

A

<p class=”large” style=”text-align:center”;>no</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

<p>Exam Question 214 (p.269):What does black hat mean?</p>

A

<p>It means a bad-guy hacker</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

<p class=”large” style=”text-align:center”;>Exam Question 215 (p.269):What does white hat mean?</p>

A

<p class=”large” style=”text-align:center”;>It means a good-guy (ethical) hacker.</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

<p class=”large” style=”text-align:center”;>Exam Question 216 (p.269):What is pen testing?</p>

A

<p class=”large” style=”text-align:center”;>penetration testing</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

<p>Exam Question 217 (p.269):What are symmetric keys?</p>

A

<p>Encryption keys that cancel each other out are symmetric.</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

<p class=”large” style=”text-align:center”;>Exam Question 218 (p.269):What does rot13 stand for?</p>

A

<p class=”large” style=”text-align:center”;>rotate thirteen</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

<p class=”large” style=”text-align:center”;>Exam Question 219 (p.269):How does rot13 work?</p>

A

<p class=”large” style=”text-align:center”;>Each letter is replaced by the one 13 places away.</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

<p>Exam Question 220 (p.270):Who knows Alice's public key?</p>

A

<p>everybody</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

<p class=”large” style=”text-align:center”;>Exam Question 221 (p.270):Who knows Alice’s private key?</p>

A

<p class=”large” style=”text-align:center”;>Alice</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

<p>Exam Question 222 (p.270):How do you send a private message to Bob?</p>

A

<p>Encrypt it with Bob's public key.</p>

24
Q

<p class=”large” style=”text-align:center”;>Exam Question 223 (p.270):What is the purpose of encrypting a message?</p>

A

<p class=”large” style=”text-align:center”;>Prevent others from understanding it.</p>

25
Q

<p class=”large” style=”text-align:center”;>Exam Question 224 (p.270):What is the purpose of signing a message?</p>

A

<p class=”large” style=”text-align:center”;>Prove authorship.</p>

25
Q

<p>Exam Question 225 (p.270):How do you sign a message?</p>

A

<p>Encrypt it with your private key.</p>

27
Q

<p class=”large” style=”text-align:center”;>Exam Question 226 (p.270):How does signing prove authorship?</p>

A

<p class=”large” style=”text-align:center”;>Only the person with the private key could have encrypted it. They mustbe the source.</p>

27
Q

<p>Exam Question 227 (p.270):How can Bob send a private, authenticated message to Alice?</p>

A

<p>First, encrypt it with Bob's private key to prove authorship. Second,encrypt the result with Alice's public key to provide privacy.</p>

29
Q

<p class=”large” style=”text-align:center”;>Exam Question 228 (p.270):Why are public-key systems special?</p>

A

<p class=”large” style=”text-align:center”;>They let us create a shared secret between parties that did not alreadyknow each other</p>

29
Q

<p>Exam Question 229 (p.270):Why is RSA special?</p>

A

<p>It easily creates good public keys.</p>

31
Q

<p class=”large” style=”text-align:center”;>Exam Question 230 (p.270):What is a prime number?</p>

A

<p class=”large” style=”text-align:center”;>A number with no proper factors.</p>

32
Q

<p class=”large” style=”text-align:center”;>Exam Question 231 (p.270):Why are prime numbers used in encryption?</p>

A

<p class=”large” style=”text-align:center”;>It is easy to multiply two large prime numbers, but it is dicult to ndthe original numbers.</p>

32
Q

<p>Exam Question 232 (p.270):What does the RSA private key consist of?</p>

A

<p>Two large prime numbers are chosen. They are the private key.</p>

34
Q

<p class=”large” style=”text-align:center”;>Exam Question 233 (p.270):What does the RSA public key consist of?</p>

A

<p class=”large” style=”text-align:center”;>The large prime numbers of the private key are multiplied together. Theresult is the public key.</p>

34
Q

<p>Exam Question 234 (p.270):If RSA is so great, why are other things used?</p>

A

<p>other things are faster</p>

36
Q

<p class=”large” style=”text-align:center”;>Exam Question 235 (p.270):Is http considered to be secure? Why?</p>

A

<p class=”large” style=”text-align:center”;>No. Traffic (data) is not encrypted.</p>

36
Q

<p>Exam Question 236 (p.270):Is https considered to be secure? Why?</p>

A

<p>Yes. Traffic (data) is encrypted.</p>

38
Q

<p class=”large” style=”text-align:center”;>Exam Question 237 (p.270):What does SSL stand for?</p>

A

<p class=”large” style=”text-align:center”;>secure sockets layer</p>

39
Q

<p class=”large” style=”text-align:center”;>Exam Question 238 (p.270):What does TLS stand for?</p>

A

<p class=”large” style=”text-align:center”;>transport layer security</p>

39
Q

<p>Exam Question 239 (p.270):How does SSL protect confidentiality of a TCP connection?</p>

A

<p>Traffic (data) is (a) encrypted to (b) hide its meaning.</p>

41
Q

<p class=”large” style=”text-align:center”;>Exam Question 240 (p.270):What is an Outside Threat?</p>

A

<p class=”large” style=”text-align:center”;>A threat by a machine outside of your LAN.</p>

41
Q

<p>Exam Question 241 (p.271):What is a botnet?</p>

A

<p>A network of computers controlled by a hacker, usually without theknowledge of their real owners.</p>

43
Q

<p class=”large” style=”text-align:center”;>Exam Question 242 (p.271):For what two things are botnets commonly used?</p>

A

<p class=”large” style=”text-align:center”;>Sending spam. Doing attacks.</p>

44
Q

<p class=”large” style=”text-align:center”;>Exam Question 243 (p.271):What does DDOS stand for?</p>

A

<p class=”large” style=”text-align:center”;>distributed denial of service (attack)</p>

44
Q

<p>Exam Question 244 (p.271):What is a zombie?</p>

A

<p>A computer that is part of a botnet.</p>

46
Q

<p class=”large” style=”text-align:center”;>Exam Question 245 (p.271):What does PWN stand for?</p>

A

<p class=”large” style=”text-align:center”;>ownPwn means you have been owned by a hacker. They control your computer.</p>

46
Q

<p>Exam Question 246 (p.271):What is an Inside Threat?</p>

A

<p>A threat by a machine inside your LAN.</p>

48
Q

<p class=”large” style=”text-align:center”;>Exam Question 247 (p.271):What two things does server mean?</p>

A

<p class=”large” style=”text-align:center”;>(a) a program (software) that provides a service, (b) a computer (hard-ware) where such a program runs</p>

48
Q

<p>Exam Question 248 (p.271):How can firewalls mitigate network attacks against servers?</p>

A

<p>They can control the number of incoming requests based on IP address.</p>

50
Q

<p class=”large” style=”text-align:center”;>Exam Question 249 (p.271):How can firewalls mitigate network attacks against clients?</p>

A

<p class=”large” style=”text-align:center”;>They can prevent all uninvited access from outside the LAN.</p>

50
Q

<p>Exam Question 250 (p.271):What does DMZ stand for?</p>

A

<p>demilitarized zone</p>

52
Q

<p class=”large” style=”text-align:center”;>Exam Question 251 (p.271):What service does DMZ provide?</p>

A

<p class=”large” style=”text-align:center”;>It directs unexpected network trac on all ports to one designated ma-chine.</p>

52
Q

<p>Exam Question 252 (p.271):What service does port forwarding provide?</p>

A

<p>It directs unexpected network trac on a few ports to a designated ma-chine.</p>

53
Q

<p>Exam Question 253 (p.271):How can sharing your Wi-Fi be dangerous?</p>

A

<p>Bad people might get directly into your LAN. This bypasses your mainfirewall.</p>