Part 2 Of Exam 1 Flashcards

(36 cards)

1
Q

Plaintext encryptionciphertextdecryptionplaintext

*one key for encryption and decryption

A

Encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Plaintextencryption[public key]ciphertextdecryption[private key]plaintext

A

Public key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Original textsigning[private key]signed text verifying[public key]verified text

A

Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Has public key value

Then: holder’s unique name (DN), issue’s unique name, version of cert. format, certificate serial number, signature algorithm identifier (for certificate issuer’s signature), certificate issuer’s name (the certification authority), validity period (start/expiration dates/times) and extensions

Certification Authority’s digital signature from certification authority’s private key/root of CA certificate

A

Digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is an anonymous, decentralized virtual currency
Online drug market where bitcoin is the standard currency
______ is exchanged peer-to-peer

A

Bitcoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a data file containing private crypto keys to the attacker

A

Wallet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

______ on the standard file location for a Bitcoin wallet

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Client computer [browser, HTML, JavaScript]HTTPWeb Server [Apache, HTML, PHP and SQL]

A

Client server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WOT

A

Web of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fake MP3 _____ Detected on 27% of PCs

The malicious media files appear to be either MP3 audio files or MPEG video files and can be found on file-sharing services McAfee believes they were placed there by cybercriminals

Prompted to download a file called PLAY MP3.exe

In the end you’re left with a fake MP3 file taking up space, a worthless MP3 player adware that claims not only to display popups, but also to block them, and more adware that successfully displays popup and popular ads.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

nodes are encrypted and are routed through other nodes to make it extremely difficult to determine who is requesting the info and what its content is.
Users contribute to the network by giving bandwidth and a portion of their hard drive… for storing files
Files are encrypted, so generally the user cannot easily discover what is in his datastore, and hopefully can’t be held accountable for it
Chat forums, websites, and search functionality, are all built on top of this distributed data store.

A

Freenet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Without app sandbox all user data, the app and all system resources have unrestricted access to each other
With app sandbox: the app is quarantined so it does not have access to user data and system resources.

A

Sand boxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

File is divided into segments called pieces. Each peer receives a new piece of the file it becomes a source of that piece for other peers. So the original piece doesn’t have to send itself to every computer who wants it. The task of distributing the file is shared by those who want it

A

BitTorrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a special software that interfaces the major hardware components of your computer with the operating system

A

BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a technique of loading a program into a computer by means of a few initial instructions that enable the introduction of the rest of the program from an input device

A

Bootstrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BIOS #1

Is configuration data read by BIOS

A

CMOS (complementary metal oxide semiconductor) Setup

17
Q

BIOS #2

POST

A

power-on self test

18
Q

BIOS steps #3

A

Determine which devices are bootable (USB vs. hard drive)

19
Q

BIOS checks information and stores it in

A

tiny (64 bytes) amount of RAM on a complementary metal oxide semiconductor (CMOS)

20
Q

translators between the hardware components and the operating system

A

Interrupt handlers

21
Q

this certification is for people just getting into the field

22
Q

for serious, dedicated information security professionals who intend to stay in the field and grow

$110,342
For security managers and professionals who develop policies and procedures in information security. Gold standard in information security certifications

A

CISSP (Certified Information Systems Security Professional)

23
Q

-$80,066
Network security, compliance and operational security, threats and vulnerabilities, access control and identity management, cryptography and application, and data and host security. Candidates will also be tested on their knowledge of security concepts, tools, and procedures to react to security incidents

A

CompTIA Security+

24
Q

True

Information security (protection of info and info systems from unauthorized access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity and availability) is a bubble inside of information assurance (measures that protect and defend information and info systems by ensuring their availability, integrity, authentication, confidentiality and on-repudiation).

25
Risk identificationrisk analysisrisk planningrisk monitoring[back to] risk analysis >list of potential risks >prioritized risk list >risk avoidance and contingency plans >risk asses. [last row are all products]
Risk management process
26
are specific, measurable steps that can be taken to meet the goal
Objective
27
an overarching principle that guides decision making
Goal
28
an algorithm or hash (a number derived from a string of text) that uniquely identifies a specific virus
Signature
29
similar to signature scanning, except that instead of looking for specific signatures, heuristic scanning looks for certain instructions or commands within a program that are not found in typical application programs.
Heuristic scanning
30
file emulation allows the file to run in a controlled virtual system (or sandbox) to see what it does. If the file acts like a virus it’s deemed a virus
Sandbox testing
31
occurs when you manipulate or trick a person into weakening the security of an organization. To be successful, an attacker needs the employee to violate policies is more economical for the hacker than trying to break through an automated control like a firewall One characteristic all humans share is that they make mistakes from 1) carelessness, 2) lack of knowledge, or 3) inadequate oversight or 4) training.
Social engineering
32
the practice of presenting oneself as someone else in order to obtain private information
Pretexting
33
any item that has value (could be organizational or personal)
Asset
34
a wannabe hacker, a person of any age with little or no skill (can buy tutorials and programs off of the black web).
Script key
35
Policy: (SANS -has suggested 27 policies) a document that states how the organizations is to perform… Standard: (from higher up) established and proven norm… Procedure: (more detailed than policy) steps required… Guideline: suggested but optional…
Policy framework
36
software that identify the base hardware components such as keyboard, mouse, hard drive
Device drivers