Front | Back |
Most current encryption shcemes are based on?
|
Algorithms
|
DMZ (Demilitarized Zone)
|
A network segment created using two firewalls; exists between the internet & an internal network.
|
What is a One-Way Function algorithm?
|
Algorithm that cannot be reversed to decode data.
|
What is a hash?
|
Type of cryptography used to provide an ingegrity check.
|
What is a Rootkit?
|
Set of programs & codes that allow an undectable presence on a system with Admin rights.
|
What is Kerberos?
|
Authentication method based upon an authentication server that distributes tickets to clients; default port is 88; requires computers have time sources synchronized.
|
Security of an encryption scheme depends on the security of the?
|
Key
|
Sniffing / Sniffer
|
Network monitoring used to obtain plaintext usernames & passwords; program that constantly observes data traveling over a network.
|
PGP (Pretty Good Privacy)
|
Uses 3DES & SHA-1 for symmetric encryptions of message data & hashing methods; replaced SLIP (Serial Line Internet Protocol); uses symmetric scheme to encrypt data; uses pre-shared keys;
|
Certificate
|
A credential digitally signed by a trusted authority.
|
SNMP (Simple Network Management Protocol)
|
Used to determine equipment status & modify configuration or settings of network devices; supplies passwords & data over the network.
|
Audit log information can be best protected by?
|
1) Access controls that restrict usage; 2) recording to write-once media (CD-R).
|
AES (Advanced Encryption Standard)
|
MOST secure form of encryption.
|
Symmetric
|
BEST type of encryption for a large amount of data; uses secret or private keys; DES, AES, 3DES, RC5, IDEA.
|
ESM (Enterprise System Management)
|
BEST method for deploying third party application security updates on a network with 1000+ computers.
|