🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Cyber Security and Encryption
20 Questions
0 Views

Cyber Security and Encryption

Created by
@ChivalrousRetinalite3695

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does 3DES stand for?

  • Data Encryption Standard
  • Triple DES (correct)
  • Single DES
  • Double DES
  • What is the purpose of the Advanced Encryption Standard (AES)?

    AES is a block cipher type of encryption that comes in 128, 192, and 256 bits.

    What does an authentication header (AH) provide?

    Authentication, integrity, and anti-replay for data packets.

    What is ARP Spoofing?

    <p>A form of spoofing using MAC address/IP address combinations</p> Signup and view all the answers

    Access Control is solely about restricting physical access.

    <p>False</p> Signup and view all the answers

    What happens during an account lockout?

    <p>An account is prevented from logging on after several incorrect logon attempts.</p> Signup and view all the answers

    What is Active Directory used for?

    <p>To store and administer users, groups, printers, devices, and other objects in a Windows domain.</p> Signup and view all the answers

    What type of share is only accessible by administrators?

    <p>Administrative Share</p> Signup and view all the answers

    What is Adware?

    <p>A form of malware that displays advertisements while an app is being used.</p> Signup and view all the answers

    What does Antivirus software do?

    <p>Protects against malware</p> Signup and view all the answers

    What is an Application-Level Firewall?

    <p>A firewall that does filtering at the application layer of the OSI model.</p> Signup and view all the answers

    What is Asymmetric Encryption?

    <p>Encryption where one key encrypts and another key decrypts</p> Signup and view all the answers

    What is meant by Attack Surface?

    <p>The totality of ways in which a system can be attacked.</p> Signup and view all the answers

    What does Auditing track?

    <p>Who has logged on to a system and what has been accessed.</p> Signup and view all the answers

    What does Authentication involve?

    <p>Verifying identification to an application or a system.</p> Signup and view all the answers

    What is the CIA Triangle?

    <p>The combination of confidentiality, integrity, and availability.</p> Signup and view all the answers

    A Backdoor is a form of malware used to perform _______ tasks on a system.

    <p>unauthorized</p> Signup and view all the answers

    What is a Certificate Authority (CA)?

    <p>A server or third-party entity used to issue digital certificates.</p> Signup and view all the answers

    What does CHAP stand for?

    <p>Challenge Handshake Authentication Protocol</p> Signup and view all the answers

    What is the purpose of a Certificate Revocation List (CRL)?

    <p>To store certificates that have been revoked due to expiration or compromise.</p> Signup and view all the answers

    Study Notes

    Encryption

    • 3DES is a block cipher encryption method offering stronger security than DES.
    • AES is another block cipher encryption method available in 128, 192, and 256 bit variations.
    • Asymmetric Encryption uses separate keys for encryption and decryption.

    Security Mechanisms

    • Access Control restricts access to systems and data, ensuring authorized individuals can access information while preventing unauthorized access.

    Network Security

    • Authentication Header (AH) safeguards data packets by providing authentication, integrity, and anti-replay protection.
    • ARP Spoofing manipulates MAC address/IP address combinations, enabling attackers to redirect network traffic to their machines by stealing legitimate IP addresses.
    • Circuit Filtering analyzes data at the Session layer (Layer 5) of the OSI model, filtering based on session information.

    Malware and Attacks

    • Adware displays advertisements while applications are in use.
    • Backdoors provide unauthorized access to systems, allowing malicious activities to be performed.
    • Botnets are networks of compromised computers controlled by attackers, often used in DDoS attacks.
    • Brute Force Attacks attempt to guess passwords by systematically trying all possible character combinations.
    • Buffer Overflow occurs when data exceeds allocated storage space, potentially causing system performance issues, crashes, or security vulnerabilities.
    • Cross-Site Scripting Attacks inject malicious scripts, bypassing web browser security measures.
    • DDoS Attacks overwhelm systems with traffic from multiple sources, resulting in service disruption.

    Authentication

    • Biometrics leverages physical traits like fingerprints, retinal scans, or facial recognition for authentication.
    • Challenge Handshake Authentication Protocol (CHAP) uses MD5 hashing for challenge-response authentication.

    Certificates and Revocation

    • Base-64-Encoded X.509 certificates store a single certificate but not a private key.
    • Certificate Revocation List (CRL) maintains a list of revoked certificates, due to expiration or compromise.

    Other Security Concepts

    • Account Lockout prevents unauthorized access by locking accounts after multiple failed login attempts.
    • Active Directory is a Windows directory service used for managing user accounts, groups, printers, devices, and other network objects.
    • Administrative Share restricts access to administrators, backup operators, and server operators.
    • Antispam software filters out unwanted email messages.
    • Antivirus software detects and removes malware.
    • Application-Level Firewall operates at the application layer (Layer 7) of the OSI model, filtering based on specific applications.
    • Attack Surface encompasses all potential vulnerabilities that attackers could exploit.
    • Auditing logs user activity, tracking login attempts and data access for security monitoring.
    • Availability ensures access to data and systems when needed.
    • Confidentiality safeguards data and systems from unauthorized access.
    • Cookies store information from webpages, such as user data, preferences, and shopping cart items.
    • Distinguished Encoding Rules (DER) are a binary format used to encode X.509 certificates.
    • BitLocker encrypts entire drives.
    • BitLocker To Go encrypts removable drives.
    • Block Cipher encrypts data blocks using a key.
    • CIA Triangle represents the core principles of security: confidentiality, integrity, and availability.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Network_Security_Glossary.pdf

    Description

    This quiz covers key concepts of encryption methods including 3DES and AES, as well as various security mechanisms and network security techniques. Test your knowledge on malware types and common attacks in the digital landscape.

    More Quizzes Like This

    Wireless Network Security Quiz
    3 questions
    VPN Protocols and Encryption Methods
    18 questions
    Web and Network Security Quiz
    24 questions
    Use Quizgecko on...
    Browser
    Browser