FINAL FOREAL CYBER

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/347

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

348 Terms

1
New cards

Cryptography

The science of encrypting and hiding information.

2
New cards

Cyphers

Methods of moving letters around or jumbling them in a different sequence.

3
New cards

Cryptanalysis

The process of analyzing available information to retrieve the encrypted message.

4
New cards

Differential cryptanalysis

Analyzing differences between input plaintext and output ciphertext to determine the key used.

5
New cards

Linear cryptanalysis

A method that uses plaintext and ciphertext together to deduce the encryption key.

6
New cards

Cryptographic operations

Actions to hide data, resist forgery, prevent unauthorized changes, enforce policy, and exchange keys.

7
New cards

Algorithm and key

Components used to perform cryptographic operations.

8
New cards

Encryption

A cryptographic operation that converts plaintext into ciphertext.

9
New cards

Hashing

A process that takes input and reduces it to a unique, irreversible number known as a hash.

10
New cards

Digital signatures

A cryptographic technique for verifying the authenticity and integrity of a message.

11
New cards

Substitution

The replacement of items with different items in the encryption process.

12
New cards

Transposition

The rearrangement of the order of items in the encryption process.

13
New cards

Keyspace

The set of all possible key values for a cryptographic system.

14
New cards

Diffusion

A property where a change in plaintext results in multiple changes in ciphertext.

15
New cards

Confusion

The randomization of output where each ciphertext character relies on various parts of the key.

16
New cards

Obfuscation

The process of masking an item to make it unreadable but still usable.

17
New cards

Perfect forward secrecy

A property that ensures a derived key remains secure even if the originating key is compromised.

18
New cards

Security through obscurity

A security principle that relies on keeping the design or implementation secret.

19
New cards

Transposition cipher

A cipher that changes the order of letters with the same letters.

20
New cards

Plaintext

The original unencrypted data.

21
New cards

Ciphertext

The output data that has been encrypted.

22
New cards

Algorithm

A step-by-step procedure for solving a problem in a finite number of steps.

23
New cards

Symmetric algorithm

An algorithm where the same key is used for both encryption and decryption.

24
New cards

Asymmetric algorithm

An algorithm that uses a pair of keys (public and private) for encryption and decryption.

25
New cards

Key

A special piece of data used in the encryption and decryption processes.

26
New cards

Exclusive OR (XOR)

A bitwise function applied to data that relies on the secrecy of the key.

27
New cards

Shift cipher

A cipher where a letter is shifted a specified number of places in the alphabet.

28
New cards

ROT 13

A letter rotation of 13 positions in the alphabet.

29
New cards

Vigenere cipher

A polyalphabetic substitution cipher that depends on a password.

30
New cards

Key management

The processes of exchange, storage, safeguarding, and revocation of keys.

31
New cards

Salting

A technique that provides sufficient input for low entropy items to hash functions.

32
New cards

Hashing function

A mathematical function that produces a unique output for a given input.

33
New cards

One way function

A function where retrieving the plaintext from ciphertext is not feasible.

34
New cards

Hash

The output of a hashing algorithm for a specific input.

35
New cards

MAC (Message Authentication Code)

A code used to verify the integrity and authenticity of a message.

36
New cards

HMAC

Hash-based message authentication code, a specialized type of MAC.

37
New cards

Collision attack

A method where an attacker finds two different inputs that produce the same hash value.

38
New cards

Message digest

The output hash created from data input into a hashing algorithm.

39
New cards

MD2

A hashing algorithm that produces a 128-bit hash from input data of any length.

40
New cards

MD4

A fast hashing algorithm that is vulnerable to attacks.

41
New cards

MD5

A hashing algorithm known for its vulnerability to collision attacks.

42
New cards

SHA (Secure Hash Algorithm)

A set of hash algorithms designed by NIST.

43
New cards

SHA-1

A hashing function that produces a 160-bit hash and is used in DSA.

44
New cards

SHA-2

An improved hashing algorithm with no known collision attacks against SHA-256.

45
New cards

SHA-3

A hashing algorithm different from previous versions, resistant to known attacks.

46
New cards

RIPEMD

A hashing function designed for integrity evaluation, known for collision problems.

47
New cards

DES (Data Encryption Standard)

A symmetric block cipher that segments data into specified block sizes.

48
New cards

3DES

An encryption method that applies the DES algorithm three times with three keys.

49
New cards

AES

An advanced encryption standard that supports message authentication.

50
New cards

RC4

A fast stream cipher that encrypts plaintext bit by bit.

51
New cards

Blowfish

A block cipher that encrypts a 64-bit input block into 32-bit words.

52
New cards

Twofish

A block cipher using 128-bit blocks and variable length keys.

53
New cards

ECB (Electronic Codebook)

The simplest cipher operation mode, encrypting each block separately.

54
New cards

CBC (Cipher Block Chaining)

A block mode where each block is XORed with the previous ciphertext before encryption.

55
New cards

Counter Mode (CTM)

Uses a counter function to generate a nonce for each block encryption.

56
New cards

What are two main types of intrusion detection systems

Network based and host based

57
New cards

Which of the following is not a capability of network based IDS

It cannot decrypt or read encrypted traffic

58
New cards

What are honeypots

A system simulating traffic to attract attackers

59
New cards

Connecting to a server and sending a request to identify a version is what?

Banner grabbing

60
New cards

What is IPS

Intrusion Prevention system

61
New cards

NIDS

Network intrusion Detection System, this collects traffic

62
New cards

System used to consolidate security analytics from several sources and identity pattterns

SIEM - Security and Information Event Systems

63
New cards

What is wireshark?

A protcol analyzer

64
New cards

Software that merely listens to traffic and does not create traffic is what

Passive

65
New cards

Anomalies in privilaged user account activity are

Indicators of compromise

66
New cards

Small software update to address an urgent or specific problem is called

Hotfix

67
New cards

In a UNIX OS, which runlevel describes single user mode?

1E

68
New cards

File permissions under UNIX consists of what three types?

Read, write, executeE

69
New cards

What is the mechanism that allows for centrailized mamagnment and configuration of computers and remote users in AD evniorment called?

Group policies

70
New cards

Updating software loaded on a nonvolatile RAM is called

Firmware update

71
New cards

Shadow file on a UNIX system contains what

Password associated with user account

72
New cards

Firmware implementation on modern PC hardware is

UEFI - Unified extensible firmware Interface

73
New cards

Software designed to prevent damage from malicous software or files

Antivirus software

74
New cards

SYN Flood is example of what attack

Denial of service attack

75
New cards

An attack which attaker listens to traffic across a network, wants to view passwords or user id’s

Sniffing attack

76
New cards

Which attack takes advantage of trusted relationship between two systems

Spoofing

77
New cards

What type of attack does an attacker re-send series of commands and codes used in a finacial transaction to cause transaction to be conducted multiple times

Replay

78
New cards

An attack which attacker attemps to lie and misrepresent themselves in order to gain access to info that can be useful in an attack

Social engineering

79
New cards

Attack that is designed to deny system access to its files and spread across a network causing destruction

Ransomware

80
New cards

Example of attack that can compromise confidentiality of communications following exchange of public keys over an untrusted network

Man in the middle attack

81
New cards

Best way to minimize possible avenues of attack for your system

ensure all patches have been downloaded that system offers

82
New cards

War driving attack is a attempt to exploit what

Wireless networks

83
New cards

Malicious code that is set to execute its payload on specific date or time is known as

A time bomb

84
New cards

To secure communications during remote access use..

SSH

85
New cards

Which of the following is not a packet capture tool

dd

86
New cards

If performing tests of system with no knowledge of internal workings of system

Black box testing

87
New cards

Tool not used for ip investigations

Chmod, linux permissions

88
New cards

to search system to find files containing a phrase, what tool what be best to use?

Grep

89
New cards

routine audits do not typically audit

Virus code

90
New cards

Used to anazlyze previosly collected packets data on a network, editing some data as well

tcpreplay

91
New cards

Not used in penetration testing

Cuckoo

92
New cards

Kind of vulnerability is never mitigated by patching software

Zero Day

93
New cards

Biggest reasons why spam is prevalent today

The use of zombie botnets

94
New cards

What does keyword secure in a cookie do

Prevents the cookie from passing over HTTP connections

95
New cards

Why is an open email relay bad

It will allow anyone to send spam through the server

96
New cards

Code signing

Provides method to demonstrate code integrity

97
New cards

Why is HTML e-mail dangerous

Allows the launching of malicous code from preview pane

98
New cards

What kind of attack might a client use agianst other clients of a bulltin board web aplication that does not validate input

Cross-site Scripting attack

99
New cards

A protocol encrypted by default

SFTP (Secure Shell File Transfer Protocol)

100
New cards

Used to determine type of contents of an email message

MIME