問題一覧
1
DEFINE: Whaling
an email-based or web-based form of phishing that targets senior executives or wealthy individuals.
2
DEFINE: Spear phishing
fraudulent practice of sending emails from a seemingly known or trusted sender to induce targeted individuals to reveal confidential information.
3
DEFINE: Phishing
an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
4
DEFINE: Vishing
social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services (VolP).
5
DEFINE: an email-based or web-based form of phishing that targets senior executives or wealthy individuals.
Whaling
6
DEFINE: fraudulent practice of sending emails from a seemingly known or trusted sender to induce targeted individuals to reveal confidential information.
Spear phishing
7
DEFINE: an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
Phishing
8
DEFINE: social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services (VolP).
Vishing
9
What is “CDFS” short for:
CD File System / ISO 9660
10
DEFINE: CD File System (CDFS or ISO 9660)
legacy file system used for CD optical disc media (CD-ROM and CD-R).
11
What does “UDF” stand for:
Universal Disk Format / ISO 13346
12
DEFINE: Universal Disk Format (UDF or ISO 13346)
an updated file system for optical media supporting multisession writing. It is the standard used by Windows, referred to as the Live File System.
13
What does “NTFS” stand for?
NT File System
14
DEFINE: NT File System (NTFS)
a Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.
15
What does “FAT 32” stand for:
File Allocation Table 32bit FAT32
16
DEFINE: File Allocation Table 32-bit (FAT 32)
32-bit file system supported by Windows, macOS, and Linux computers.
17
DEFINE: legacy file system used for CD optical disc media (CD-ROM and CD-R)
CD File System (CDFS or ISO 9660)
18
DEFINE: an updated file system for optical media supporting multisession writing. It is the standard used by Windows, referred to as the Live File System.
Universal Disk Format (UDF or ISO 13346)
19
DEFINE: a Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.
NT File System (NTFS)
20
DEFINE: 32-bit file system supported by Windows, macOS, and Linux computers.
File Allocation Table 32bit FAT32
21
DEFINE: TACACS+
an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco.
22
What does “TACACS” stand for:
Terminal Access Controller Access Control System
23
What does “RADIUS” stand for:
Remote Authentication Dial in User Service
24
DEFINE: The Remote Authentication Dial-In User Service (RADIUS)
a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.
25
DEFINE: Kerberos
is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT.
26
What does “CHAP” stand for:
Challenge Handshake Authentication Protocol
27
DEFINE: Challenge-Handshake Authentication Protocol (CHAP)
used to authenticate a user or network host to an authenticating entity.
28
DEFINE: an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco.
TACACS+
29
DEFINE: a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.
The Remote Authentication Dial-In User Service (RADIUS)
30
DEFINE: is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT.
Kerberos
31
DEFINE: used to authenticate a user or network host to an authenticating entity.
Challenge-Handshake Authentication Protocol (CHAP)
32
DEFINE: Missing patches
the most common vulnerability found on both Windows and Linux systems. When a security patch is released, attackers begin to reverse engineer the security patch to exploit the vulnerability.
33
DEFINE: Cross-Site Scripting (XSS)
type of injection in which malicious scripts are injected into otherwise benign and trusted websites.
34
DEFINE: CRLF injection
a software application coding vulnerability that occurs when an attacker injects a CRLF character sequence where it is not expected.
35
DEFINE: SQL injection
placement of malicious code in SQL statements via web page input. Commonly used against databases, but they are not useful when attacking file servers.
36
DEFINE: the most common vulnerability found on both Windows and Linux systems. When a security patch is released, attackers begin to reverse engineer the security patch to exploit the vulnerability.
Missing patches
37
DEFINE: type of injection in which malicious scripts are injected into otherwise benign and trusted websites.
Cross-Site Scripting (XSS)
38
DEFINE: a software application coding vulnerability that occurs when an attacker injects a CRLF character sequence where it is not expected.
CRLF injection
39
DEFINE: placement of malicious code in SQL statements via web page input. Commonly used against databases, but they are not useful when attacking file servers.
SQL injection
40
DEFINE: Character
stores a single character, such as J, D, or Z. A character data type usually consumes one byte (8 bits) of storage.
41
DEFINE: String
stores a group of characters, such as Hello, PYTHON, or JasonDion.
42
DEFINE: Boolean
stores a value of TRUE (1) or FALSE (0). It usually consumes only 1 bit of storage (a zero or a one).
43
DEFINE: Integer
stores a whole number, such as 21, 143, or 1024. This data type usually consumes 8 bytes of storage.
44
DEFINE: stores a single character, such as J, D, or Z. A character data type usually consumes one byte (8 bits) of storage.
Character
45
DEFINE: stores a group of characters, such as Hello, PYTHON, or JasonDion.
String
46
DEFINE: stores a value of TRUE (1) or FALSE (0). It usually consumes only 1 bit of storage (a zero or a one).
Boolean
47
DEFINE: stores a whole number, such as 21, 143, or 1024. This data type usually consumes 8 bytes of storage.
Integer
48
What does “WEP” stand for:
Wired Equivalent Privacy
49
DEFINE: Wired Equivalent Privacy (WEP)
encryption system based on the RC4 encryption cipher. This system uses a 40-bit encryption key and a 24-bit initialization vector by default, creating a 64-bit key.
50
What does “WPA” stand for:
WiFi protected access
51
DEFINE: Wi-Fi protected access (WPA)
improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This scheme uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.
52
What does “WPA2” stand for:
WiFi Protected Access Version 2
53
DEFINE: Wi-Fi protected access version 2 (WPA2)
replaced the original version of WPA after the completion of the 802.11i security standard. It features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks.
54
DEFINE: Open Network
does not use an encryption key or preshared key to protect the network
55
DEFINE: encryption system based on the RC4 encryption cipher. This system uses a 40-bit encryption key and a 24-bit initialization vector by default, creating a 64-bit key.
Wired Equivalent Privacy (WEP)
56
DEFINE: improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This scheme uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.
Wi-Fi protected access (WPA)
57
DEFINE: replaced the original version of WPA after the completion of the 802.11i security standard. It features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks.
Wi-Fi protected access version 2 (WPA2)
58
DEFINE: does not use an encryption key or preshared key to protect the network.
Open Network
59
What does “sfc” stand for:
System File Checker
60
DEFINE: Group Policy
primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization.
61
DEFINE: gpupdate command-line tool
used to update the group policy settings on a Windows system.
62
DEFINE: gpresult command-line tool
used to display the Resultant Set of Policy (RSoP) information for a remote user and computer. Because you can apply overlapping policy settings to any computer or user, the Group Policy feature generates a resulting set of policy settings when the user logs on. This command displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.
63
What does “DISM” stand for:
Deployment Image Servicing and Management
64
DEFINE: Deployment Image Servicing and Management command-line tool (DISM)
used to mount and service Windows images before deployment.
65
DEFINE: primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization.
Group Policy
66
DEFINE: used to update the group policy settings on a Windows system.
gpupdate command-line tool
67
DEFINE: used to display the Resultant Set of Policy (RSoP) information for a remote user and computer. Because you can apply overlapping policy settings to any computer or user, the Group Policy feature generates a resulting set of policy settings when the user logs on. This command displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.
gpresult command-line tool
68
DEFINE: used to mount and service Windows images before deployment.
Deployment Image Servicing and Management command-line tool (DISM)
69
DEFINE: Brute Force Attack
attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The passcode or password is incrementally increased by one letter number each time until the right passcode/password is found.
70
DEFINE: Dictionary Attack
a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.
71
DEFINE: Rainbow Table
a precomputed list of possible hashes used when trying to speed up the process of password cracking.
72
DEFINE: Hybrid Password Cracking Attack
combines the use of a brute-force attack with a dictionary attack by using words from the dictionary's list as the basis for the brute-force attack.
73
DEFINE: attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The passcode or password is incrementally increased by one letter number each time until the right passcode/password is found.
Brute Force Attack
74
DEFINE: a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities.
Dictionary Attack
75
DEFINE: a precomputed list of possible hashes used when trying to speed up the process of password cracking.
Rainbow Table
76
DEFINE: combines the use of a brute-force attack with a dictionary attack by using words from the dictionary's list as the basis for the brute-force attack.
Hybrid Password Cracking Attack
77
DEFINE: Explicit allow
a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule.
78
DEFINE: Implicit allow
a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it.
79
DEFINE: robocopy tool
used to mirror or synchronize directories and their contents. This tool, will check the destination directory and remove files no longer in the main tree. It also checks the files in the destination directory against the files to be copied and doesn't waste time copying unchanged files.
80
DEFINE: xcopy tool
copies all of the files from one directory to another.
81
DEFINE: copy command
used to copy one or more files from one location to another. This command cannot copy files that are 0 bytes long or for copying all of a directory's files and subdirectories.
82
DEFINE: cp command
used in Linux to copy one or more files and directories from one location to another.
83
DEFINE: used to mirror or synchronize directories and their contents. This tool, will check the destination directory and remove files no longer in the main tree. It also checks the files in the destination directory against the files to be copied and doesn't waste time copying unchanged files.
The robocopy tool
84
DEFINE: copies all of the files from one directory to another
The xcopy tool
85
DEFINE: used to copy one or more files from one location to another. This command cannot copy files that are 0 bytes long or for copying all of a directory's files and subdirectories.
The copy command
86
DEFINE: used in Linux to copy one or more files and directories from one location to another
The cp command
87
What does “SAE” stand for:
Simultaneous Authentication of Equals
88
The SAE handshake is also known as:
the dragonfly handshake
89
What does “TKIP” stand for:
Temporal Key Integrity Protocol
90
What does “WPA3” stand for:
WiFi Protected Access Version 3
91
What does “WPA2” stand for:
WiFi Protected Access Version 2
92
What does “WPA” stand for:
WiFi Protected Access
93
What does “WEP” stand for:
Wired Equivalent Privacy
94
DEFINE: Wi-Fi Protected Access Version 3 (WPA3)
has replaced WPA2 as the most secure wireless encryption method. This access version uses the simultaneous authentication of equals (SAE) to increase the security of preshared keys.
95
DEFINE: Wi-Fi Protected Access Version 2 (WPA2)
replaced the original version of WPA after the completion of the 802.11i security standard. WPA2 features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.
96
DEFINE: Wi-Fi Protected Access (WPA)
an improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This system uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.
97
DEFINE: Wired Equivalent Privacy (WEP)
an older mechanism for encrypting data sent over a wireless connection. This is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key.
98
Define: has replaced WPA2 as the most secure wireless encryption method. This access version uses the simultaneous authentication of equals (SAE) to increase the security of preshared keys.
Wi-Fi Protected Access Version 3 (WPA3)