Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
39 Cards in this Set
- Front
- Back
What’s a Clipper chip? |
A device used by government agencies to bypass encryption. |
|
Which attack would be viable to obtain 2 different messages that produce same message using same hash function? |
Birthday attack |
|
Leakage sources used by side-channel analysis |
Power, timing, electromagnetic |
|
Which attack usually analyzed large amounts of plaintext pairs created with the same key? |
Linear cryptanalysis |
|
Which attack is less likely to be caught when trying to use the credentials of another user or admin? |
Pass the hash |
|
Which of the encryption standards rely on “web of trust”? |
PGP |
|
Zeroization |
Erasing of electronic data by overwriting the contents with no value so that the data can not be recovered. |
|
The network admin see all nodes on a subnet are experiencing network slowness and also suspects an infected computer on the network. Which tool can be utilized in this situation? |
Protocol analyzer |
|
A 802.1 device performs the following |
Role based access checking, all assignment, posture checking |
|
Risk with using UDP |
Packets may arrive out of order |
|
Packet destined for a devices on a network? |
Broadcast |
|
A land attack exemplifies what kind of attack? |
DoS |
|
2 common types of coax transmission methods |
Broadband and baseband |
|
Will capture all data whether or not it’s intended for your machine |
Promiscuous mode |
|
Host exposed to an attack from the internet |
Bastion host |
|
What type of firewall delivers highest amount and depth of control? |
Application gateway |
|
Crossover rate expressed as |
FRR=FAR |
|
Which method of data erasure is used when only special laboratory techniques can recover data? |
Clearing |
|
For system hacking, which is the next step after cracking systems account password? |
Maintain access |
|
Which information when compromised, could cause serious damage to national security? |
Secret |
|
A security manager wants all laptops to include a security crypto processor. The hardware required for this would be? |
Trusted platform module (tpm) |
|
A data custodian is a person who is responsible for securing resources after security label is assigned to a resource by? |
Data owner |
|
The order in which the physical protection system should work |
Deter-Detect-Delay-Response |
|
Physical factors for physical security environment protection factors |
Facility construction and location Security features of facility Earth movement |
|
The viewing of events after the fact using a CCTV is considered a |
Detective control |
|
A structured classification scheme for computer security attack and incident information |
Taxonomy |
|
What is the bare minimum twisted pair cat cable for 100MBps? |
Cat 5 |
|
The access control which allows the ability to take action on a subject |
Right |
|
Access control matrix that is called the ACL |
Column |
|
Establishes DAC over a file in a directory |
Subject |
|
Advantage of discretionary access control technique |
Automatic limited access |
|
Preventing an unauthorized user from accessing a file is a function of |
Authorization |
|
Administrators dictate who can access and modify data and systems |
Mandatory |
|
Access rights assigned to individual subjects |
Capabilities |
|
Access rights assigned to objects |
Access control lists |
|
All access must be mediated, protected from unauthorized modification and verifiable as correct is implemented through what? |
A security kernel |
|
RBAC can implement either |
Discretionary access control or mandatory access control |
|
What type of control is a permission? |
Logical |
|
Passwords |
Something you know |