Ports Reports, Plans Assessments Definitions Protocols Encryption
100
What is HTTP
Port TCP/80
100
What is Continuity of Operations
A mail order company has purchased laptops for all employees, so they can work from the office, home or a standby site. The company regularly updates them with company applications and data.
100
What is Ransomware
Malware that extorts money from a user in exchange for the return of data.
100
What is +100
YOU WIN +100
100
What is Digital Signature
What involves encrypting with a private key and decrypting with the public key.
200
What is Telnet
Port TCP/23
200
What is Succession planning
Mitigationg against a single point of failure in personnel, having identified backups and a new chain of command describes what?
200
What is Pen test tool
A program used by an ethical hacker that sends exploits.
200
What is Password Authentication Protocol (PAP)
What protocol using clear text to authenticate
200
What is IPSec
Secures a network for telecommuters
300
What is HTTPS
Port TCP/433
300
What is Fuzzing
Automated testing methods that is used to send randown or sequential data to an application to discern errors, exceptions and buffer overflows?
300
What is Virtualization
A technique that allows a host machine to support and simultaneously run other isolated guest operating systems.
300
What is Temporal Key Integrity Protocol
What protocol is implemated by Wi-Fi Protected Access (WPA)
300
What is Elliptical Curve Cryptography
What encryption is associated with public-key algorithms and key negotiation
400
What is Microsoft's SQL
Port TCP/1433
400
What is Return on Investment (ROI)
The security administrator for your company has been contemplating the purchase of a new expensive defensive system. What would be used to justify the purchase?
400
What is Zombie
A controlled system that can cause DDos
400
What is L2TP
Tunneling protocol that does not encrypt the inner packet or payload
400
What is DES
Involves 56-bits in its operation
500
What is Internet Key Exchange (IKE)
Port UDP/500
500
What is Business impact analysis
Identifies critical assets and acceptable amounts of data loss.
500
What is XSS (Cross Site Scripting)
A server flaw that processes malicious URLs and sends unwanted code to clients.
500
What is SMIME
Provides for encryption and digital signing of emails.
500
What is One-time Pad
Unbreakable encryption






Security +

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline