Security + Cram Guide

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

What port does HTTPS use?

443

2
New cards

What port does SSH use?

22

3
New cards

What port does FTP use for data transfer?

20

4
New cards

What port does FTP use for control?

21

5
New cards

Which protocol uses port 53?

DNS

6
New cards

What port is used for SMTP?

25

7
New cards

What port does IMAP use?

143

8
New cards

What port does POP3 use?

110

9
New cards

What port does RDP use?

3389

10
New cards

What port is used for Telnet?

23

11
New cards

What encryption algorithm is most common for symmetric encryption?

AES

12
New cards

What is the primary purpose of RSA?

Asymmetric encryption

13
New cards

Which hashing algorithm is considered weak?

MD5

14
New cards

What does HMAC provide?

Integrity and authenticity

15
New cards

What type of encryption uses the same key for encryption and decryption?

Symmetric encryption

16
New cards

What does AAA stand for?

Authentication, Authorization, Accounting

17
New cards

What is the purpose of SAML?

Single Sign-On (SSO)

18
New cards

Which factor of authentication is a fingerprint?

Something you are

19
New cards

What is the principle of Least Privilege?

Users only get access to what they need

20
New cards

What is MFA?

Multi-Factor Authentication

21
New cards

What type of attack injects malicious SQL statements?

SQL Injection

22
New cards

What is the difference between DoS and DDoS?

DDoS uses multiple systems to attack

23
New cards

What is a Man-in-the-Middle attack?

An attacker intercepts communication between two parties

24
New cards

What attack sends malicious scripts via websites?

Cross-Site Scripting (XSS)

25
New cards

What is phishing?

Fraudulent attempt to obtain sensitive info via email or messages

26
New cards

What does CIA Triad stand for?

Confidentiality, Integrity, Availability

27
New cards

What is the role of an IDS?

Detect malicious activity

28
New cards

What is the role of an IPS?

Prevent malicious activity

29
New cards

What does DMZ stand for in networking?

Demilitarized Zone

30
New cards

What is a honeypot?

A decoy system to lure attackers

31
New cards

Which wireless encryption is most secure?

WPA3

32
New cards

What is a brute force attack?

Trying all possible passwords until one works

33
New cards

What is rainbow table attack?

Using precomputed hashes to crack passwords

34
New cards

What is the function of a VPN?

Encrypt network traffic between devices

35
New cards

What does SIEM stand for?

Security Information and Event Management