Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
Port number for SSH |
22 |
|
Port number for FTP |
21 |
|
Port number for Telnet |
23 |
|
Port number for HTTP |
80 |
|
Port number for HTTPS |
443 |
|
Port number for RDP |
3389 |
|
Port number for SMTP |
25 |
|
Port number for DNS |
53 |
|
Port number for DHCP |
67 and 68 |
|
Port number for Kerberos |
88 |
|
Port number for POP3 |
110 |
|
Port number for SNMP |
161 |
|
Port number for LDAP |
389 |
|
Port number for TFTP |
69 |
|
What does TFTP stand for and do? |
Trivial File Transport Protocol. No authentication. Transfers router configuration files on a network. |
|
What does LDAP stand for and what does it do? |
Light-Weight Directory Access Protocol. Connects, searches and modifies internet directories. |
|
Which Key Agreement Protocol is used in Public Key Cryptography |
ECDH |
|
What is Elliptic Curve Diffie-Hellman (EHDC) |
Key Exchange Protocol used in public key cryptography. Establishes a secure session between two parties. |
|
What is Rivest-Shamir-Adleman (RSA) |
Most common public-private key generation algorithm. |
|
What is Advanced Encryption Algorithm |
Symmetric key cryptography, not used in public key cryptography. |
|
What is the simplest form of disaster recovery |
Documentation Review |
|
What is the Recovery Point Objective |
RPO is the MAXIMUM allowable amount of DATA that the company can AFFORD to lose during an incident |
|
Does PAP send credentials over clear text? |
Yes PAP is not recommended for use. EAP is better |
|
What uses password hashes and challenge methods to authenticate systems |
Challenge Handshake Authentication Protocols |
|
Which password authentication protocol is used only by microsoft? |
Microsoft-CHAP (MS-CHAP) |
|
What is the best password authentication protocol |
EAP |
|
Security Identifier (SID) |
Unique number assigned to each windows account |
|
Group and User Identifiers are located on which OS user account |
Linux, UNIX |
|
Type of Governance developed internally with policies, procedures and standards |
Organizational Governance |
|
Public key cryptography that uses web of trust model |
PGP because it uses small groups of individuals |
|
What is used to obtain the status of digital certificates in public keys? |
Online Certificate Status Protocol (OCSP) |
|
The length of time a device is expected to last in operation. Single occurrence. |
Mean Time to Failure |
|
What is the manufacturers best guess on how much time a device will fail? Multiple failures |
Mean Time Between Failures |
|
What is the size of the Initialization Vector for TKIP used in WPA. |
48-bit |
|
Do first responders notify the incident response team? |
No, they secure the scene, notify management and determine the impact and scope. |
|
What evidence proves innocence |
Exculpatory evidence |
|
What evidence proves innocence? |
Inculpatory evicence |
|
What kind of evidence is used with charts and other educational items? |
Demonstrative evidence |
|
What kind of pen test does neither the testers or the clients know about the test of network |
Double-Blind test |
|
Bob needs which key in order to encrypt data sent to Dan |
Dan's public key |