Test Prep Flashcards
MOU
Memorandum of understanding - preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange
Rules of engagement
define how that testing is to occur.
CRLF Injection
software application coding vulnerability that occurs when an attacker injects a CRLF character sequence where it is not expected
MOA
CSRF
malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts
Full Disk Encryption
Data Masking
LDAP
Lightweight directory access protocol: uses a client-server model for mutual authentication.
Directory Traversal
allows attackers to access restricted directories and execute commands outside the web server’s root directory
NTLM
Creates a 128-bit fixed output
RIPEMD
160-bit, 256-bit, or
320-bit message digest
Air Gaps
designed to remove connections between two networks to create physical segmentation between them.
Symmetric encryption
Private key : encryption algorithm in which both the sender and the receiver must
know the same secret using a privately-held key, 1 key
example: DES, IDEA, AES, RC4, RC5, Blowfish
Asymmetric encryption
Public key: Encryption algorithm where different keys are used to encrypt and
decrypt the data, 2 keys are needed.
Example: Diffie-Hellman, RSA, ECC
Stream cipher
Utilizes a keystream generator to encrypt data bit by bit using a
mathematical XOR function to create the ciphertext
Block Cipher
Breaks the input into fixed-length blocks of data and performs the
encryption on each block
DES
Data encryption standard: Encryption algorithm which breaks the input into 64-bit blocks and uses
transposition and substitution to create ciphertext using an effective key
strength of only 56-bits
3DES
Triple DES: uses three separate symmetric keys to encrypt, decrypt, then encrypt the plaintext into ciphertext
IDEA
International Data Encryption Algorithm: Symmetric block cipher which uses 64-bit blocks to encrypt plaintext into
ciphertext
AES
Advanced encryption standard: uses 128-bit, 192-bit, or 256-bit blocks and a
matching encryption key size to encrypt plaintext into ciphertext
Blowfish
uses 64-bit blocks and a variable length
encryption key
Twofish
uses 128-bit blocks
and a 128-bit, 192-bit, or 256-bit encryption key
RC4
Rivest Cipher: 40-bits to 2048-
bits that is used in SSL and WEP, this is the only stream cipher on the exam
Diffie-Hellman
Diffie-Hellman is used for the establishment of a VPN tunnel using IPSec