CompTIA Security+

Flash cards f or CompTIA Security+ 2008 Ed.

63 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
Most current encryption shcemes are based on?
Algorithms
DMZ (Demilitarized Zone)
A network segment created using two firewalls; exists between the internet & an internal network.
What is a One-Way Function algorithm?
Algorithm that cannot be reversed to decode data.
What is a hash?
Type of cryptography used to provide an ingegrity check.
What is a Rootkit?
Set of programs & codes that allow an undectable presence on a system with Admin rights.
What is Kerberos?
Authentication method based upon an authentication server that distributes tickets to clients; default port is 88; requires computers have time sources synchronized.
Security of an encryption scheme depends on the security of the?
Key
Sniffing / Sniffer
Network monitoring used to obtain plaintext usernames & passwords; program that constantly observes data traveling over a network.
PGP (Pretty Good Privacy)
Uses 3DES & SHA-1 for symmetric encryptions of message data & hashing methods; replaced SLIP (Serial Line Internet Protocol); uses symmetric scheme to encrypt data; uses pre-shared keys;
Certificate
A credential digitally signed by a trusted authority.
SNMP (Simple Network Management Protocol)
Used to determine equipment status & modify configuration or settings of network devices; supplies passwords & data over the network.
Audit log information can be best protected by?
1) Access controls that restrict usage; 2) recording to write-once media (CD-R).
AES (Advanced Encryption Standard)
MOST secure form of encryption.
Symmetric
BEST type of encryption for a large amount of data; uses secret or private keys; DES, AES, 3DES, RC5, IDEA.
ESM (Enterprise System Management)
BEST method for deploying third party application security updates on a network with 1000+ computers.