Ports | Reports, Plans Assessments | Definitions | Protocols | Encryption |
---|---|---|---|---|
What is HTTP
Port TCP/80
|
What is Continuity of Operations
A mail order company has purchased laptops for all employees, so they can work from the office, home or a standby site. The company regularly updates them with company applications and data.
|
What is Ransomware
Malware that extorts money from a user in exchange for the return of data.
|
What is +100
YOU WIN +100
|
What is Digital Signature
What involves encrypting with a private key and decrypting with the public key.
|
What is Telnet
Port TCP/23
|
What is Succession planning
Mitigationg against a single point of failure in personnel, having identified backups and a new chain of command describes what?
|
What is Pen test tool
A program used by an ethical hacker that sends exploits.
|
What is Password Authentication Protocol (PAP)
What protocol using clear text to authenticate
|
What is IPSec
Secures a network for telecommuters
|
What is HTTPS
Port TCP/433
|
What is Fuzzing
Automated testing methods that is used to send randown or sequential data to an application to discern errors, exceptions and buffer overflows?
|
What is Virtualization
A technique that allows a host machine to support and simultaneously run other isolated guest operating systems.
|
What is Temporal Key Integrity Protocol
What protocol is implemated by Wi-Fi Protected Access (WPA)
|
What is Elliptical Curve Cryptography
What encryption is associated with public-key algorithms and key negotiation
|
What is Microsoft's SQL
Port TCP/1433
|
What is Return on Investment (ROI)
The security administrator for your company has been contemplating the purchase of a new expensive defensive system. What would be used to justify the purchase?
|
What is Zombie
A controlled system that can cause DDos
|
What is L2TP
Tunneling protocol that does not encrypt the inner packet or payload
|
What is DES
Involves 56-bits in its operation
|
What is Internet Key Exchange (IKE)
Port UDP/500
|
What is Business impact analysis
Identifies critical assets and acceptable amounts of data loss.
|
What is XSS (Cross Site Scripting)
A server flaw that processes malicious URLs and sends unwanted code to clients.
|
What is SMIME
Provides for encryption and digital signing of emails.
|
What is One-time Pad
Unbreakable encryption
|