Crypto is Hipto | WiFi Bluetooth no cables needed | You can't evade this category | The typical junk drawer | Get your head out of the clouds |
---|---|---|---|---|
What is a Certificate Authority
This manages digital certificates
|
What are wired networks
WEP was designed to offer security comparable to this
|
What is a HIDS
If I wanted to monitor activity on a host, I would use this
|
What is Traffic Filtering
I do this to prevent a Denial of Service attack
|
What is Software hosting
I'm using SaaS in the cloud and hosting this
|
What is Hashing
This is a kind of algorithm, a message digest if you will
|
What is a Site Survey
If I wanted to locate a wireless access point, I would do this
|
What is Port Scanning
A search engine isn't going to help identify a firewall, this would be more appropriate
|
What is UDP
Firing up Trinoo, this protocol is the goto to perform a DoS
|
What is MitM
I am called this if I can manipulate data in transit.
|
What are the number of keys
Because of this problems exist with Symmetric key distributions
|
What is Bluesnarfing
Reading information from a Bluetooth enabled device is this type of attack
|
What is Encryption
If I want to evade an IDS, i would use this
|
What is Targa
8 different types of DoS attacks are at your disposal with this tool
|
What is reduce costs
A private cloud would not be an option if you are looking for this
|
What is transmitted data
SSL is used to secure data in this state
|
What is a Honeypot
You could say this is used to attract victims to connect to it
|
What is three
At a minumum, a multi homed firewall has this many network connections
|
What is a wrapper
I'm not busting out rhymes, instead I'm combining a Trojan and a back door into a single executable
|
What is three
There are only this many cloud hosting environments
|
What is Level 3
in IPsec, encryption and other processes happen on this layer of the OSI model
|
What is WPA
Because of WPS support it's easy to defeat this wireless security standard
|
What is SNMP
I need both ports 161 and 162 to function
|
What is a worm spreads by itself but a virus must attach to another program
Virus and Worms can both be malicious however they differ in regards to this
|
What is Layer 3 and 4
If I am a cloud based solution, according to the OSI model I operate at these layers
|