暗記メーカー
ログイン
ID: C2 Deep Pt.2
  • Mixtapes øf Hanna

  • 問題数 98 • 6/4/2024

    記憶度

    完璧

    14

    覚えた

    37

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    DEFINE: Whaling

    an email-based or web-based form of phishing that targets senior executives or wealthy individuals.

  • 2

    DEFINE: Spear phishing

    fraudulent practice of sending emails from a seemingly known or trusted sender to induce targeted individuals to reveal confidential information.

  • 3

    DEFINE: Phishing

    an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.

  • 4

    DEFINE: Vishing

    social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services (VolP).

  • 5

    DEFINE: an email-based or web-based form of phishing that targets senior executives or wealthy individuals.

    Whaling

  • 6

    DEFINE: fraudulent practice of sending emails from a seemingly known or trusted sender to induce targeted individuals to reveal confidential information.

    Spear phishing

  • 7

    DEFINE: an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.

    Phishing

  • 8

    DEFINE: social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services (VolP).

    Vishing

  • 9

    What is “CDFS” short for:

    CD File System / ISO 9660

  • 10

    DEFINE: CD File System (CDFS or ISO 9660)

    legacy file system used for CD optical disc media (CD-ROM and CD-R).

  • 11

    What does “UDF” stand for:

    Universal Disk Format / ISO 13346

  • 12

    DEFINE: Universal Disk Format (UDF or ISO 13346)

    an updated file system for optical media supporting multisession writing. It is the standard used by Windows, referred to as the Live File System.

  • 13

    What does “NTFS” stand for?

    NT File System

  • 14

    DEFINE: NT File System (NTFS)

    a Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.

  • 15

    What does “FAT 32” stand for:

    File Allocation Table 32bit FAT32

  • 16

    DEFINE: File Allocation Table 32-bit (FAT 32)

    32-bit file system supported by Windows, macOS, and Linux computers.

  • 17

    DEFINE: legacy file system used for CD optical disc media (CD-ROM and CD-R)

    CD File System (CDFS or ISO 9660)

  • 18

    DEFINE: an updated file system for optical media supporting multisession writing. It is the standard used by Windows, referred to as the Live File System.

    Universal Disk Format (UDF or ISO 13346)

  • 19

    DEFINE: a Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.

    NT File System (NTFS)

  • 20

    DEFINE: 32-bit file system supported by Windows, macOS, and Linux computers.

    File Allocation Table 32bit FAT32

  • 21

    DEFINE: TACACS+

    an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco.

  • 22

    What does “TACACS” stand for:

    Terminal Access Controller Access Control System

  • 23

    What does “RADIUS” stand for:

    Remote Authentication Dial in User Service

  • 24

    DEFINE: The Remote Authentication Dial-In User Service (RADIUS)

    a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.

  • 25

    DEFINE: Kerberos

    is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT.

  • 26

    What does “CHAP” stand for:

    Challenge Handshake Authentication Protocol

  • 27

    DEFINE: Challenge-Handshake Authentication Protocol (CHAP)

    used to authenticate a user or network host to an authenticating entity.

  • 28

    DEFINE: an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco.

    TACACS+

  • 29

    DEFINE: a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.

    The Remote Authentication Dial-In User Service (RADIUS)

  • 30

    DEFINE: is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT.

    Kerberos

  • 31

    DEFINE: used to authenticate a user or network host to an authenticating entity.

    Challenge-Handshake Authentication Protocol (CHAP)

  • 32

    DEFINE: Missing patches

    the most common vulnerability found on both Windows and Linux systems. When a security patch is released, attackers begin to reverse engineer the security patch to exploit the vulnerability.

  • 33

    DEFINE: Cross-Site Scripting (XSS)

    type of injection in which malicious scripts are injected into otherwise benign and trusted websites.

  • 34

    DEFINE: CRLF injection

    a software application coding vulnerability that occurs when an attacker injects a CRLF character sequence where it is not expected.

  • 35

    DEFINE: SQL injection

    placement of malicious code in SQL statements via web page input. Commonly used against databases, but they are not useful when attacking file servers.

  • 36

    DEFINE: the most common vulnerability found on both Windows and Linux systems. When a security patch is released, attackers begin to reverse engineer the security patch to exploit the vulnerability.

    Missing patches

  • 37

    DEFINE: type of injection in which malicious scripts are injected into otherwise benign and trusted websites.

    Cross-Site Scripting (XSS)

  • 38

    DEFINE: a software application coding vulnerability that occurs when an attacker injects a CRLF character sequence where it is not expected.

    CRLF injection

  • 39

    DEFINE: placement of malicious code in SQL statements via web page input. Commonly used against databases, but they are not useful when attacking file servers.

    SQL injection

  • 40

    DEFINE: Character

    stores a single character, such as J, D, or Z. A character data type usually consumes one byte (8 bits) of storage.

  • 41

    DEFINE: String

    stores a group of characters, such as Hello, PYTHON, or JasonDion.

  • 42

    DEFINE: Boolean

    stores a value of TRUE (1) or FALSE (0). It usually consumes only 1 bit of storage (a zero or a one).

  • 43

    DEFINE: Integer

    stores a whole number, such as 21, 143, or 1024. This data type usually consumes 8 bytes of storage.

  • 44

    DEFINE: stores a single character, such as J, D, or Z. A character data type usually consumes one byte (8 bits) of storage.

    Character

  • 45

    DEFINE: stores a group of characters, such as Hello, PYTHON, or JasonDion.

    String

  • 46

    DEFINE: stores a value of TRUE (1) or FALSE (0). It usually consumes only 1 bit of storage (a zero or a one).

    Boolean

  • 47

    DEFINE: stores a whole number, such as 21, 143, or 1024. This data type usually consumes 8 bytes of storage.

    Integer

  • 48

    What does “WEP” stand for:

    Wired Equivalent Privacy

  • 49

    DEFINE: Wired Equivalent Privacy (WEP)

    encryption system based on the RC4 encryption cipher. This system uses a 40-bit encryption key and a 24-bit initialization vector by default, creating a 64-bit key.

  • 50

    What does “WPA” stand for:

    WiFi protected access

  • 51

    DEFINE: Wi-Fi protected access (WPA)

    improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This scheme uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

  • 52

    What does “WPA2” stand for:

    WiFi Protected Access Version 2

  • 53

    DEFINE: Wi-Fi protected access version 2 (WPA2)

    replaced the original version of WPA after the completion of the 802.11i security standard. It features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks.

  • 54

    DEFINE: Open Network

    does not use an encryption key or preshared key to protect the network

  • 55

    DEFINE: encryption system based on the RC4 encryption cipher. This system uses a 40-bit encryption key and a 24-bit initialization vector by default, creating a 64-bit key.

    Wired Equivalent Privacy (WEP)

  • 56

    DEFINE: improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This scheme uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

    Wi-Fi protected access (WPA)

  • 57

    DEFINE: replaced the original version of WPA after the completion of the 802.11i security standard. It features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks.

    Wi-Fi protected access version 2 (WPA2)

  • 58

    DEFINE: does not use an encryption key or preshared key to protect the network.

    Open Network

  • 59

    What does “sfc” stand for:

    System File Checker

  • 60

    DEFINE: Group Policy

    primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization.

  • 61

    DEFINE: gpupdate command-line tool

    used to update the group policy settings on a Windows system.

  • 62

    DEFINE: gpresult command-line tool

    used to display the Resultant Set of Policy (RSoP) information for a remote user and computer. Because you can apply overlapping policy settings to any computer or user, the Group Policy feature generates a resulting set of policy settings when the user logs on. This command displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.

  • 63

    What does “DISM” stand for:

    Deployment Image Servicing and Management

  • 64

    DEFINE: Deployment Image Servicing and Management command-line tool (DISM)

    used to mount and service Windows images before deployment.

  • 65

    DEFINE: primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization.

    Group Policy

  • 66

    DEFINE: used to update the group policy settings on a Windows system.

    gpupdate command-line tool

  • 67

    DEFINE: used to display the Resultant Set of Policy (RSoP) information for a remote user and computer. Because you can apply overlapping policy settings to any computer or user, the Group Policy feature generates a resulting set of policy settings when the user logs on. This command displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.

    gpresult command-line tool

  • 68

    DEFINE: used to mount and service Windows images before deployment.

    Deployment Image Servicing and Management command-line tool (DISM)

  • 69

    DEFINE: Brute Force Attack

    attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The passcode or password is incrementally increased by one letter number each time until the right passcode/password is found.

  • 70

    DEFINE: Dictionary Attack

    a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.

  • 71

    DEFINE: Rainbow Table

    a precomputed list of possible hashes used when trying to speed up the process of password cracking.

  • 72

    DEFINE: Hybrid Password Cracking Attack

    combines the use of a brute-force attack with a dictionary attack by using words from the dictionary's list as the basis for the brute-force attack.

  • 73

    DEFINE: attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The passcode or password is incrementally increased by one letter number each time until the right passcode/password is found.

    Brute Force Attack

  • 74

    DEFINE: a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities.

    Dictionary Attack

  • 75

    DEFINE: a precomputed list of possible hashes used when trying to speed up the process of password cracking.

    Rainbow Table

  • 76

    DEFINE: combines the use of a brute-force attack with a dictionary attack by using words from the dictionary's list as the basis for the brute-force attack.

    Hybrid Password Cracking Attack

  • 77

    DEFINE: Explicit allow

    a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule.

  • 78

    DEFINE: Implicit allow

    a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it.

  • 79

    DEFINE: robocopy tool

    used to mirror or synchronize directories and their contents. This tool, will check the destination directory and remove files no longer in the main tree. It also checks the files in the destination directory against the files to be copied and doesn't waste time copying unchanged files.

  • 80

    DEFINE: xcopy tool

    copies all of the files from one directory to another.

  • 81

    DEFINE: copy command

    used to copy one or more files from one location to another. This command cannot copy files that are 0 bytes long or for copying all of a directory's files and subdirectories.

  • 82

    DEFINE: cp command

    used in Linux to copy one or more files and directories from one location to another.

  • 83

    DEFINE: used to mirror or synchronize directories and their contents. This tool, will check the destination directory and remove files no longer in the main tree. It also checks the files in the destination directory against the files to be copied and doesn't waste time copying unchanged files.

    The robocopy tool

  • 84

    DEFINE: copies all of the files from one directory to another

    The xcopy tool

  • 85

    DEFINE: used to copy one or more files from one location to another. This command cannot copy files that are 0 bytes long or for copying all of a directory's files and subdirectories.

    The copy command

  • 86

    DEFINE: used in Linux to copy one or more files and directories from one location to another

    The cp command

  • 87

    What does “SAE” stand for:

    Simultaneous Authentication of Equals

  • 88

    The SAE handshake is also known as:

    the dragonfly handshake

  • 89

    What does “TKIP” stand for:

    Temporal Key Integrity Protocol

  • 90

    What does “WPA3” stand for:

    WiFi Protected Access Version 3

  • 91

    What does “WPA2” stand for:

    WiFi Protected Access Version 2

  • 92

    What does “WPA” stand for:

    WiFi Protected Access

  • 93

    What does “WEP” stand for:

    Wired Equivalent Privacy

  • 94

    DEFINE: Wi-Fi Protected Access Version 3 (WPA3)

    has replaced WPA2 as the most secure wireless encryption method. This access version uses the simultaneous authentication of equals (SAE) to increase the security of preshared keys.

  • 95

    DEFINE: Wi-Fi Protected Access Version 2 (WPA2)

    replaced the original version of WPA after the completion of the 802.11i security standard. WPA2 features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.

  • 96

    DEFINE: Wi-Fi Protected Access (WPA)

    an improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. This system uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

  • 97

    DEFINE: Wired Equivalent Privacy (WEP)

    an older mechanism for encrypting data sent over a wireless connection. This is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key.

  • 98

    Define: has replaced WPA2 as the most secure wireless encryption method. This access version uses the simultaneous authentication of equals (SAE) to increase the security of preshared keys.

    Wi-Fi Protected Access Version 3 (WPA3)