Review Flashcards

1
Q

MD5 Hash

A

128 Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptography

A

Making something obscure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES

A

Symmetric block-cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IDS vs IPS

A

IDS Alerts IPS Changes

IPS Can detect threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encryption Node for Websites

A

SSL came out for websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To get a virus to run constantly where are you going to place it

A

In memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPV4 can fragment IPV6 does not

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ping detects connectivity

A

Traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

517 ID

A

When someone clears a security log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where is the buffer located

A

Data Section, Stack, Heap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Traceroute packet size?

A

32 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Barcodes on CAC Card

A

PDF14 Front

Code 39 Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

in an IOS what keeps apps from accessing other apps

A

Data Vault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is installed in the background and very hard to detect

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Sanitation

A

Protect against SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trojan vs Spyware Vs Worm Difference

A

Know these

17
Q

When a program is running where is it pulling its data from

A

The Stack

18
Q

What is a single point firewall

A

Its on the outside and its a funnel for all traffic

19
Q

Routing Header Breakdown

A

Bits in Each Section

20
Q

What protocol is used to find Neighbors in IPv6

A

Neighbor Discovery Protocol

21
Q

How many bytes make up a shell code

A

25 bytes

22
Q

For DNS where is the first place your computer looks

A

Cache Memory

23
Q

Hybrid Firewall Do?

A

Multiple firewalls all assigned to a specific task

24
Q

Different IDS

A

HIDS, PIDS, NIDS, VMIS

25
Q

HIDS, Hueristic Firewall

A

Functions off of flags

26
Q

Telnet vs SSH

A

Unsecure vs Clear

27
Q

Ping Default runs

A

4 times

28
Q

IDS where is it going ?

A

Behind the Firewall

29
Q

If you’re able to give yourself privileges what is that called?

A

Broken Authentication

30
Q

Dynamic Packet Filtering

A

Looks at the content of packet and is “stateful”

31
Q

Different types of DNS Queries

A

Iterative (Not Upstream), Recursive, Non-Recursive

32
Q

Stateless Packet Filtering

A

Just cares about Source and Destination Addresses

33
Q

Netscan

A

T0 harder to detect because of the slow speeds vs T5

34
Q

GA Law that protects against trespassing of computers or hacking

A

OCGA 16-9-93b

35
Q

NOPSLED?

A

What is it

36
Q

SNORT rules

A

DROP, REJECT, ALERT, LOG, PASS, ACTIVATE

37
Q

IPV6 Multicast Address

A

FF00::/8

38
Q

Belt and Suspender Firewall Archetecture

A

Internet - Router - Firewall- Servers - Firewall - Network

39
Q

Asymmetric and Symmetric Keys Usage

A

Public and Private Keys