Review Flashcards

(39 cards)

1
Q

MD5 Hash

A

128 Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptography

A

Making something obscure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES

A

Symmetric block-cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IDS vs IPS

A

IDS Alerts IPS Changes

IPS Can detect threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encryption Node for Websites

A

SSL came out for websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To get a virus to run constantly where are you going to place it

A

In memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPV4 can fragment IPV6 does not

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ping detects connectivity

A

Traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

517 ID

A

When someone clears a security log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where is the buffer located

A

Data Section, Stack, Heap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Traceroute packet size?

A

32 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Barcodes on CAC Card

A

PDF14 Front

Code 39 Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

in an IOS what keeps apps from accessing other apps

A

Data Vault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is installed in the background and very hard to detect

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Sanitation

A

Protect against SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trojan vs Spyware Vs Worm Difference

17
Q

When a program is running where is it pulling its data from

18
Q

What is a single point firewall

A

Its on the outside and its a funnel for all traffic

19
Q

Routing Header Breakdown

A

Bits in Each Section

20
Q

What protocol is used to find Neighbors in IPv6

A

Neighbor Discovery Protocol

21
Q

How many bytes make up a shell code

22
Q

For DNS where is the first place your computer looks

23
Q

Hybrid Firewall Do?

A

Multiple firewalls all assigned to a specific task

24
Q

Different IDS

A

HIDS, PIDS, NIDS, VMIS

25
HIDS, Hueristic Firewall
Functions off of flags
26
Telnet vs SSH
Unsecure vs Clear
27
Ping Default runs
4 times
28
IDS where is it going ?
Behind the Firewall
29
If you're able to give yourself privileges what is that called?
Broken Authentication
30
Dynamic Packet Filtering
Looks at the content of packet and is "stateful"
31
Different types of DNS Queries
Iterative (Not Upstream), Recursive, Non-Recursive
32
Stateless Packet Filtering
Just cares about Source and Destination Addresses
33
Netscan
T0 harder to detect because of the slow speeds vs T5
34
GA Law that protects against trespassing of computers or hacking
OCGA 16-9-93b
35
NOPSLED?
What is it
36
SNORT rules
DROP, REJECT, ALERT, LOG, PASS, ACTIVATE
37
IPV6 Multicast Address
FF00::/8
38
Belt and Suspender Firewall Archetecture
Internet - Router - Firewall- Servers - Firewall - Network
39
Asymmetric and Symmetric Keys Usage
Public and Private Keys