問題一覧
1
DEFINE: Phishing
an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
2
DEFINE: a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities.
Dictionary Attack
3
What does “TKIP” stand for:
Temporal Key Integrity Protocol
4
DEFINE: Deployment Image Servicing and Management command-line tool (DISM)
used to mount and service Windows images before deployment.
5
DEFINE: attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The passcode or password is incrementally increased by one letter number each time until the right passcode/password is found.
Brute Force Attack
6
DEFINE: an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco.
TACACS+
7
DEFINE: Boolean
stores a value of TRUE (1) or FALSE (0). It usually consumes only 1 bit of storage (a zero or a one).
8
What does “WPA” stand for:
WiFi Protected Access
9
What does “TACACS” stand for:
Terminal Access Controller Access Control System
10
DEFINE: a software application coding vulnerability that occurs when an attacker injects a CRLF character sequence where it is not expected.
CRLF injection
11
DEFINE: Explicit allow
a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule.
12
DEFINE: an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
Phishing
13
DEFINE: a Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.
NT File System (NTFS)
14
DEFINE: xcopy tool
copies all of the files from one directory to another.
15
What does “DISM” stand for:
Deployment Image Servicing and Management
16
What does “WPA3” stand for:
WiFi Protected Access Version 3
17
DEFINE: NT File System (NTFS)
a Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.
18
DEFINE: primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization.
Group Policy
19
DEFINE: TACACS+
an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco.
20
What does “WPA2” stand for:
WiFi Protected Access Version 2
21
DEFINE: robocopy tool
used to mirror or synchronize directories and their contents. This tool, will check the destination directory and remove files no longer in the main tree. It also checks the files in the destination directory against the files to be copied and doesn't waste time copying unchanged files.
22
DEFINE: an updated file system for optical media supporting multisession writing. It is the standard used by Windows, referred to as the Live File System.
Universal Disk Format (UDF or ISO 13346)
23
DEFINE: Kerberos
is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT.
24
DEFINE: Missing patches
the most common vulnerability found on both Windows and Linux systems. When a security patch is released, attackers begin to reverse engineer the security patch to exploit the vulnerability.
25
DEFINE: Character
stores a single character, such as J, D, or Z. A character data type usually consumes one byte (8 bits) of storage.
26
What does “NTFS” stand for?
NT File System
27
DEFINE: social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services (VolP).
Vishing
28
DEFINE: SQL injection
placement of malicious code in SQL statements via web page input. Commonly used against databases, but they are not useful when attacking file servers.
29
DEFINE: a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.
The Remote Authentication Dial-In User Service (RADIUS)
30
DEFINE: Wired Equivalent Privacy (WEP)
an older mechanism for encrypting data sent over a wireless connection. This is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key.
31
DEFINE: Wi-Fi Protected Access Version 2 (WPA2)
replaced the original version of WPA after the completion of the 802.11i security standard. WPA2 features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.
32
What does “WEP” stand for:
Wired Equivalent Privacy
33
DEFINE: Wi-Fi protected access (WPA)
improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This scheme uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.
34
DEFINE: Dictionary Attack
a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.
35
DEFINE: cp command
used in Linux to copy one or more files and directories from one location to another.
36
DEFINE: combines the use of a brute-force attack with a dictionary attack by using words from the dictionary's list as the basis for the brute-force attack.
Hybrid Password Cracking Attack
37
DEFINE: Brute Force Attack
attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The passcode or password is incrementally increased by one letter number each time until the right passcode/password is found.
38
DEFINE: CD File System (CDFS or ISO 9660)
legacy file system used for CD optical disc media (CD-ROM and CD-R).
39
What does “SAE” stand for:
Simultaneous Authentication of Equals
40
DEFINE: used to authenticate a user or network host to an authenticating entity.
Challenge-Handshake Authentication Protocol (CHAP)
41
What is “CDFS” short for:
CD File System / ISO 9660
42
What does “sfc” stand for:
System File Checker
43
DEFINE: used to mirror or synchronize directories and their contents. This tool, will check the destination directory and remove files no longer in the main tree. It also checks the files in the destination directory against the files to be copied and doesn't waste time copying unchanged files.
The robocopy tool
44
What does “UDF” stand for:
Universal Disk Format / ISO 13346
45
Define: has replaced WPA2 as the most secure wireless encryption method. This access version uses the simultaneous authentication of equals (SAE) to increase the security of preshared keys.
Wi-Fi Protected Access Version 3 (WPA3)
46
What does “WEP” stand for:
Wired Equivalent Privacy
47
DEFINE: Challenge-Handshake Authentication Protocol (CHAP)
used to authenticate a user or network host to an authenticating entity.
48
DEFINE: used to display the Resultant Set of Policy (RSoP) information for a remote user and computer. Because you can apply overlapping policy settings to any computer or user, the Group Policy feature generates a resulting set of policy settings when the user logs on. This command displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.
gpresult command-line tool
49
DEFINE: Hybrid Password Cracking Attack
combines the use of a brute-force attack with a dictionary attack by using words from the dictionary's list as the basis for the brute-force attack.
50
What does “CHAP” stand for:
Challenge Handshake Authentication Protocol
51
DEFINE: stores a value of TRUE (1) or FALSE (0). It usually consumes only 1 bit of storage (a zero or a one).
Boolean
52
DEFINE: type of injection in which malicious scripts are injected into otherwise benign and trusted websites.
Cross-Site Scripting (XSS)
53
DEFINE: fraudulent practice of sending emails from a seemingly known or trusted sender to induce targeted individuals to reveal confidential information.
Spear phishing
54
DEFINE: an email-based or web-based form of phishing that targets senior executives or wealthy individuals.
Whaling
55
DEFINE: Rainbow Table
a precomputed list of possible hashes used when trying to speed up the process of password cracking.
56
DEFINE: Wi-Fi Protected Access (WPA)
an improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This system uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.
57
DEFINE: replaced the original version of WPA after the completion of the 802.11i security standard. It features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks.
Wi-Fi protected access version 2 (WPA2)
58
DEFINE: used to mount and service Windows images before deployment.
Deployment Image Servicing and Management command-line tool (DISM)
59
DEFINE: Wi-Fi Protected Access Version 3 (WPA3)
has replaced WPA2 as the most secure wireless encryption method. This access version uses the simultaneous authentication of equals (SAE) to increase the security of preshared keys.
60
DEFINE: stores a whole number, such as 21, 143, or 1024. This data type usually consumes 8 bytes of storage.
Integer
61
DEFINE: stores a single character, such as J, D, or Z. A character data type usually consumes one byte (8 bits) of storage.
Character
62
DEFINE: used to update the group policy settings on a Windows system.
gpupdate command-line tool
63
DEFINE: used to copy one or more files from one location to another. This command cannot copy files that are 0 bytes long or for copying all of a directory's files and subdirectories.
The copy command
64
DEFINE: String
stores a group of characters, such as Hello, PYTHON, or JasonDion.
65
DEFINE: Whaling
an email-based or web-based form of phishing that targets senior executives or wealthy individuals.
66
DEFINE: is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT.
Kerberos
67
DEFINE: 32-bit file system supported by Windows, macOS, and Linux computers.
File Allocation Table 32bit FAT32
68
DEFINE: does not use an encryption key or preshared key to protect the network.
Open Network
69
DEFINE: Vishing
social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services (VolP).
70
DEFINE: gpresult command-line tool
used to display the Resultant Set of Policy (RSoP) information for a remote user and computer. Because you can apply overlapping policy settings to any computer or user, the Group Policy feature generates a resulting set of policy settings when the user logs on. This command displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.
71
What does “FAT 32” stand for:
File Allocation Table 32bit FAT32
72
DEFINE: The Remote Authentication Dial-In User Service (RADIUS)
a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.
73
DEFINE: a precomputed list of possible hashes used when trying to speed up the process of password cracking.
Rainbow Table
74
DEFINE: Integer
stores a whole number, such as 21, 143, or 1024. This data type usually consumes 8 bytes of storage.
75
DEFINE: Open Network
does not use an encryption key or preshared key to protect the network
76
DEFINE: Implicit allow
a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it.
77
DEFINE: Group Policy
primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization.
78
DEFINE: File Allocation Table 32-bit (FAT 32)
32-bit file system supported by Windows, macOS, and Linux computers.
79
What does “RADIUS” stand for:
Remote Authentication Dial in User Service
80
DEFINE: Universal Disk Format (UDF or ISO 13346)
an updated file system for optical media supporting multisession writing. It is the standard used by Windows, referred to as the Live File System.
81
DEFINE: Spear phishing
fraudulent practice of sending emails from a seemingly known or trusted sender to induce targeted individuals to reveal confidential information.
82
DEFINE: improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This scheme uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.
Wi-Fi protected access (WPA)
83
What does “WPA” stand for:
WiFi protected access
84
The SAE handshake is also known as:
the dragonfly handshake
85
DEFINE: Wired Equivalent Privacy (WEP)
encryption system based on the RC4 encryption cipher. This system uses a 40-bit encryption key and a 24-bit initialization vector by default, creating a 64-bit key.
86
DEFINE: gpupdate command-line tool
used to update the group policy settings on a Windows system.
87
DEFINE: encryption system based on the RC4 encryption cipher. This system uses a 40-bit encryption key and a 24-bit initialization vector by default, creating a 64-bit key.
Wired Equivalent Privacy (WEP)
88
DEFINE: CRLF injection
a software application coding vulnerability that occurs when an attacker injects a CRLF character sequence where it is not expected.
89
DEFINE: copies all of the files from one directory to another
The xcopy tool
90
DEFINE: Wi-Fi protected access version 2 (WPA2)
replaced the original version of WPA after the completion of the 802.11i security standard. It features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks.
91
DEFINE: stores a group of characters, such as Hello, PYTHON, or JasonDion.
String
92
DEFINE: placement of malicious code in SQL statements via web page input. Commonly used against databases, but they are not useful when attacking file servers.
SQL injection
93
DEFINE: the most common vulnerability found on both Windows and Linux systems. When a security patch is released, attackers begin to reverse engineer the security patch to exploit the vulnerability.
Missing patches
94
DEFINE: used in Linux to copy one or more files and directories from one location to another
The cp command
95
DEFINE: Cross-Site Scripting (XSS)
type of injection in which malicious scripts are injected into otherwise benign and trusted websites.
96
What does “WPA2” stand for:
WiFi Protected Access Version 2
97
DEFINE: copy command
used to copy one or more files from one location to another. This command cannot copy files that are 0 bytes long or for copying all of a directory's files and subdirectories.
98
DEFINE: legacy file system used for CD optical disc media (CD-ROM and CD-R)
CD File System (CDFS or ISO 9660)