暗記メーカー
ログイン
ID: C2 Deep Pt.2
  • Mixtapes øf Hanna

  • 問題数 98 • 6/4/2024

    記憶度

    完璧

    14

    覚えた

    37

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    DEFINE: Phishing

    an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.

  • 2

    DEFINE: a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities.

    Dictionary Attack

  • 3

    What does “TKIP” stand for:

    Temporal Key Integrity Protocol

  • 4

    DEFINE: Deployment Image Servicing and Management command-line tool (DISM)

    used to mount and service Windows images before deployment.

  • 5

    DEFINE: attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The passcode or password is incrementally increased by one letter number each time until the right passcode/password is found.

    Brute Force Attack

  • 6

    DEFINE: an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco.

    TACACS+

  • 7

    DEFINE: Boolean

    stores a value of TRUE (1) or FALSE (0). It usually consumes only 1 bit of storage (a zero or a one).

  • 8

    What does “WPA” stand for:

    WiFi Protected Access

  • 9

    What does “TACACS” stand for:

    Terminal Access Controller Access Control System

  • 10

    DEFINE: a software application coding vulnerability that occurs when an attacker injects a CRLF character sequence where it is not expected.

    CRLF injection

  • 11

    DEFINE: Explicit allow

    a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule.

  • 12

    DEFINE: an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.

    Phishing

  • 13

    DEFINE: a Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.

    NT File System (NTFS)

  • 14

    DEFINE: xcopy tool

    copies all of the files from one directory to another.

  • 15

    What does “DISM” stand for:

    Deployment Image Servicing and Management

  • 16

    What does “WPA3” stand for:

    WiFi Protected Access Version 3

  • 17

    DEFINE: NT File System (NTFS)

    a Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.

  • 18

    DEFINE: primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization.

    Group Policy

  • 19

    DEFINE: TACACS+

    an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco.

  • 20

    What does “WPA2” stand for:

    WiFi Protected Access Version 2

  • 21

    DEFINE: robocopy tool

    used to mirror or synchronize directories and their contents. This tool, will check the destination directory and remove files no longer in the main tree. It also checks the files in the destination directory against the files to be copied and doesn't waste time copying unchanged files.

  • 22

    DEFINE: an updated file system for optical media supporting multisession writing. It is the standard used by Windows, referred to as the Live File System.

    Universal Disk Format (UDF or ISO 13346)

  • 23

    DEFINE: Kerberos

    is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT.

  • 24

    DEFINE: Missing patches

    the most common vulnerability found on both Windows and Linux systems. When a security patch is released, attackers begin to reverse engineer the security patch to exploit the vulnerability.

  • 25

    DEFINE: Character

    stores a single character, such as J, D, or Z. A character data type usually consumes one byte (8 bits) of storage.

  • 26

    What does “NTFS” stand for?

    NT File System

  • 27

    DEFINE: social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services (VolP).

    Vishing

  • 28

    DEFINE: SQL injection

    placement of malicious code in SQL statements via web page input. Commonly used against databases, but they are not useful when attacking file servers.

  • 29

    DEFINE: a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.

    The Remote Authentication Dial-In User Service (RADIUS)

  • 30

    DEFINE: Wired Equivalent Privacy (WEP)

    an older mechanism for encrypting data sent over a wireless connection. This is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key.

  • 31

    DEFINE: Wi-Fi Protected Access Version 2 (WPA2)

    replaced the original version of WPA after the completion of the 802.11i security standard. WPA2 features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.

  • 32

    What does “WEP” stand for:

    Wired Equivalent Privacy

  • 33

    DEFINE: Wi-Fi protected access (WPA)

    improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This scheme uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

  • 34

    DEFINE: Dictionary Attack

    a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.

  • 35

    DEFINE: cp command

    used in Linux to copy one or more files and directories from one location to another.

  • 36

    DEFINE: combines the use of a brute-force attack with a dictionary attack by using words from the dictionary's list as the basis for the brute-force attack.

    Hybrid Password Cracking Attack

  • 37

    DEFINE: Brute Force Attack

    attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The passcode or password is incrementally increased by one letter number each time until the right passcode/password is found.

  • 38

    DEFINE: CD File System (CDFS or ISO 9660)

    legacy file system used for CD optical disc media (CD-ROM and CD-R).

  • 39

    What does “SAE” stand for:

    Simultaneous Authentication of Equals

  • 40

    DEFINE: used to authenticate a user or network host to an authenticating entity.

    Challenge-Handshake Authentication Protocol (CHAP)

  • 41

    What is “CDFS” short for:

    CD File System / ISO 9660

  • 42

    What does “sfc” stand for:

    System File Checker

  • 43

    DEFINE: used to mirror or synchronize directories and their contents. This tool, will check the destination directory and remove files no longer in the main tree. It also checks the files in the destination directory against the files to be copied and doesn't waste time copying unchanged files.

    The robocopy tool

  • 44

    What does “UDF” stand for:

    Universal Disk Format / ISO 13346

  • 45

    Define: has replaced WPA2 as the most secure wireless encryption method. This access version uses the simultaneous authentication of equals (SAE) to increase the security of preshared keys.

    Wi-Fi Protected Access Version 3 (WPA3)

  • 46

    What does “WEP” stand for:

    Wired Equivalent Privacy

  • 47

    DEFINE: Challenge-Handshake Authentication Protocol (CHAP)

    used to authenticate a user or network host to an authenticating entity.

  • 48

    DEFINE: used to display the Resultant Set of Policy (RSoP) information for a remote user and computer. Because you can apply overlapping policy settings to any computer or user, the Group Policy feature generates a resulting set of policy settings when the user logs on. This command displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.

    gpresult command-line tool

  • 49

    DEFINE: Hybrid Password Cracking Attack

    combines the use of a brute-force attack with a dictionary attack by using words from the dictionary's list as the basis for the brute-force attack.

  • 50

    What does “CHAP” stand for:

    Challenge Handshake Authentication Protocol

  • 51

    DEFINE: stores a value of TRUE (1) or FALSE (0). It usually consumes only 1 bit of storage (a zero or a one).

    Boolean

  • 52

    DEFINE: type of injection in which malicious scripts are injected into otherwise benign and trusted websites.

    Cross-Site Scripting (XSS)

  • 53

    DEFINE: fraudulent practice of sending emails from a seemingly known or trusted sender to induce targeted individuals to reveal confidential information.

    Spear phishing

  • 54

    DEFINE: an email-based or web-based form of phishing that targets senior executives or wealthy individuals.

    Whaling

  • 55

    DEFINE: Rainbow Table

    a precomputed list of possible hashes used when trying to speed up the process of password cracking.

  • 56

    DEFINE: Wi-Fi Protected Access (WPA)

    an improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This system uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

  • 57

    DEFINE: replaced the original version of WPA after the completion of the 802.11i security standard. It features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks.

    Wi-Fi protected access version 2 (WPA2)

  • 58

    DEFINE: used to mount and service Windows images before deployment.

    Deployment Image Servicing and Management command-line tool (DISM)

  • 59

    DEFINE: Wi-Fi Protected Access Version 3 (WPA3)

    has replaced WPA2 as the most secure wireless encryption method. This access version uses the simultaneous authentication of equals (SAE) to increase the security of preshared keys.

  • 60

    DEFINE: stores a whole number, such as 21, 143, or 1024. This data type usually consumes 8 bytes of storage.

    Integer

  • 61

    DEFINE: stores a single character, such as J, D, or Z. A character data type usually consumes one byte (8 bits) of storage.

    Character

  • 62

    DEFINE: used to update the group policy settings on a Windows system.

    gpupdate command-line tool

  • 63

    DEFINE: used to copy one or more files from one location to another. This command cannot copy files that are 0 bytes long or for copying all of a directory's files and subdirectories.

    The copy command

  • 64

    DEFINE: String

    stores a group of characters, such as Hello, PYTHON, or JasonDion.

  • 65

    DEFINE: Whaling

    an email-based or web-based form of phishing that targets senior executives or wealthy individuals.

  • 66

    DEFINE: is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT.

    Kerberos

  • 67

    DEFINE: 32-bit file system supported by Windows, macOS, and Linux computers.

    File Allocation Table 32bit FAT32

  • 68

    DEFINE: does not use an encryption key or preshared key to protect the network.

    Open Network

  • 69

    DEFINE: Vishing

    social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services (VolP).

  • 70

    DEFINE: gpresult command-line tool

    used to display the Resultant Set of Policy (RSoP) information for a remote user and computer. Because you can apply overlapping policy settings to any computer or user, the Group Policy feature generates a resulting set of policy settings when the user logs on. This command displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.

  • 71

    What does “FAT 32” stand for:

    File Allocation Table 32bit FAT32

  • 72

    DEFINE: The Remote Authentication Dial-In User Service (RADIUS)

    a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.

  • 73

    DEFINE: a precomputed list of possible hashes used when trying to speed up the process of password cracking.

    Rainbow Table

  • 74

    DEFINE: Integer

    stores a whole number, such as 21, 143, or 1024. This data type usually consumes 8 bytes of storage.

  • 75

    DEFINE: Open Network

    does not use an encryption key or preshared key to protect the network

  • 76

    DEFINE: Implicit allow

    a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it.

  • 77

    DEFINE: Group Policy

    primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization.

  • 78

    DEFINE: File Allocation Table 32-bit (FAT 32)

    32-bit file system supported by Windows, macOS, and Linux computers.

  • 79

    What does “RADIUS” stand for:

    Remote Authentication Dial in User Service

  • 80

    DEFINE: Universal Disk Format (UDF or ISO 13346)

    an updated file system for optical media supporting multisession writing. It is the standard used by Windows, referred to as the Live File System.

  • 81

    DEFINE: Spear phishing

    fraudulent practice of sending emails from a seemingly known or trusted sender to induce targeted individuals to reveal confidential information.

  • 82

    DEFINE: improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This scheme uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

    Wi-Fi protected access (WPA)

  • 83

    What does “WPA” stand for:

    WiFi protected access

  • 84

    The SAE handshake is also known as:

    the dragonfly handshake

  • 85

    DEFINE: Wired Equivalent Privacy (WEP)

    encryption system based on the RC4 encryption cipher. This system uses a 40-bit encryption key and a 24-bit initialization vector by default, creating a 64-bit key.

  • 86

    DEFINE: gpupdate command-line tool

    used to update the group policy settings on a Windows system.

  • 87

    DEFINE: encryption system based on the RC4 encryption cipher. This system uses a 40-bit encryption key and a 24-bit initialization vector by default, creating a 64-bit key.

    Wired Equivalent Privacy (WEP)

  • 88

    DEFINE: CRLF injection

    a software application coding vulnerability that occurs when an attacker injects a CRLF character sequence where it is not expected.

  • 89

    DEFINE: copies all of the files from one directory to another

    The xcopy tool

  • 90

    DEFINE: Wi-Fi protected access version 2 (WPA2)

    replaced the original version of WPA after the completion of the 802.11i security standard. It features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks.

  • 91

    DEFINE: stores a group of characters, such as Hello, PYTHON, or JasonDion.

    String

  • 92

    DEFINE: placement of malicious code in SQL statements via web page input. Commonly used against databases, but they are not useful when attacking file servers.

    SQL injection

  • 93

    DEFINE: the most common vulnerability found on both Windows and Linux systems. When a security patch is released, attackers begin to reverse engineer the security patch to exploit the vulnerability.

    Missing patches

  • 94

    DEFINE: used in Linux to copy one or more files and directories from one location to another

    The cp command

  • 95

    DEFINE: Cross-Site Scripting (XSS)

    type of injection in which malicious scripts are injected into otherwise benign and trusted websites.

  • 96

    What does “WPA2” stand for:

    WiFi Protected Access Version 2

  • 97

    DEFINE: copy command

    used to copy one or more files from one location to another. This command cannot copy files that are 0 bytes long or for copying all of a directory's files and subdirectories.

  • 98

    DEFINE: legacy file system used for CD optical disc media (CD-ROM and CD-R)

    CD File System (CDFS or ISO 9660)