Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Which is the strongest implementation class of WTLS? |
Class 3 - client and server |
|
What is the default port used by HTTPS? |
443 |
|
What is Internet Security Association and Key Management Protocol (ISAKMP)? |
A method for implementing a key exchange protocol and for negotiating a security policy |
|
What is CMP? |
This protocol defines the messages and operations required to provide certificate management services
|
|
Certificates that should no longer be used due to compromise should be |
Revoked |
|
What is PKCS? |
A group of standards used in implementing a public key infrastructure |
|
SSL provides secure connections for web transfers using encryption. |
True |
|
What are the documents developed by the government to aid in the development of a standard for use in areas such as security or system interoperability? |
FIPS, Federal Information Processing Standards |
|
What is Wired Equivalent Privacy (WEP)? |
A method that is used to encrypt wireless communications in an 802.11 environment
|
|
What is XKMS? |
A Key Management Specification that defines services to manage PKI operations within the Extensible Markup Language (XML) environment |
|
What is PKIX? |
A group of the standards used in implementing a public key infrastructure
|
|
Scanning is when an attacker attempts to crash the system with programs such as ping sweep or superscan. |
False |
|
An attack that takes advantage of bugs or weaknesses in the software is referred to as what? |
Software exploitation |
|
In a _______________ attack, the attacker observes all traffic before relaying it and can actually modify or block traffic. |
man-in-the-middle |
|
What is the automated downloading of malware that takes advantage of a browsers' ability to download different files that compose a web page called? |
Drive-by download |
|
What is the term used to describe a hacker's attempt to discover unprotected modem connections to computer systems and networks called? |
War-dialing |
|
An attack where the attacker captures a portion of a communication between two parties and retransmits it at another time is called a ___________ attack. |
replay |
|
What is it called when a person registers a domain name, relinquishes it in less than five days, and then gets the same name again, repeating this cycle over and over again? |
DNS kiting |
|
The activity where hackers wander throughout an area with a computer with wireless capability, searching for wireless networks they can access is referred to as which of the following? |
War-driving |
|
In a ___________ attack, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all systems on that network. |
smurf |