Using the "-t" flag with hping3, what can we set the
value for? - <<<Answers>>>TTL
Using the Pre-Scale option increases the host size by
how many times? - <<<Answers>>>4
What is the name of the GUI you can use to manage
GPG? - <<<Answers>>>GNU Privacy Assistant
What command did you use to go to the restricted shell?
- <<<Answers>>>rbash
Differential Linear Cryptanalysis -
<<Answers>>>Applies differential analysis with linear
analysis
<
Virtual Private Network (VPN) -
<<<Answers>>>Givers confidentiality and authenticity
for traffic outside the dedicated lines of an organization.
Gives internal IP Address due to device tunneling
IPSec - <<<Answers>>>Comes from the authentication
and encryption of the IPv6 implementation brought out
to be used within IPv4
,Authentication Headers (AH) - <<<Answers>>>No
modification of data in-transit, no confidentiality,
identifies origin
Encapsulated Security Payload (ESP) -
<<<Answers>>>No modification of data in-transit, all
data encrypted, identifies origin
Pretty Good Privacy (PGP) - <<<Answers>>>Protects
files on hard drives, transferred files via email, and
file/folder level encryption
Full Disk Encryption - <<<Answers>>>Encrypted files
are decrypted to read and then encrypted back on the
hard drive
Public Key Infrastructure (PKI) -
<<<Answers>>>Provides a technical mechanism for
encrypting an organization's data. A hierarchy of
infrastructure systems is used to create digital
signatures
,Certificates - <<<Answers>>>Contain your public key,
hashed value is signed by the CA. Essential to PKI
Certificate Revocation List (CRL) -
<<<Answers>>>List of revoked digital certificates
Online Certificate Status Protocol -
<<<Answers>>>Designed to overcome the limitations
of CRL's
Encryption occurs on which layer of the OSI Stack -
<<<Answers>>>Any of them! IPSec- Layer 3,
Applications- Layer 7
Critical Security Controls (3 Sections, 20) -
<<<Answers>>>System (1-10)
Network (11-15)
Application (16-20)
IT Risk Management - <<<Answers>>>Identify threats
and vulnerabilities to analyze risk
, Single Loss Expectancy (SLE) - <<<Answers>>>Loss
from a single event.
Asset Value * Exposure Factor= SLE
Annualized Loss Expectancy (ALE) -
<<<Answers>>>Annual expected loss based on threat.
SLE * Annualized Rate Occurrence = ALE
Cost Benefit Analysis - <<<Answers>>>Comparison of
the cost of implementing countermeasures with the
value of reduced risk
Workgroups - <<<Answers>>>No domain controllers,
a standalone computer with local accounts and local
accounts database
Security ID Number (SID) - <<<Answers>>>Each
user, computer, and group has a unique SID
Security Access Token (SAT) -
<<<Answers>>>Contains SID number of user account
and all groups and privileges. Attached to every process
you start where Windows uses the SAT to check
privileges/permissions