SBOLC Security Plus Study Guide Questions with complete solution
6 views 0 purchase
Course
SBOLC
Institution
SBOLC
SBOLC Security Plus Study Guide Questions with complete solution SBOLC Security Plus Study Guide
Goals of Crypto - correct answer Confidentiality (encryption),Integrity (Hashing),Authentication (Prove yourself), Non-repudiation (can't deny it happened-digital signatures)
TCP vs UDP - corr...
SBOLC Security Plus Study Guide
Goals of Crypto - correct answer ✔Confidentiality (encryption),Integrity
(Hashing),Authentication (Prove yourself), Non-repudiation (can't deny it
happened-digital signatures)
TCP vs UDP - correct answer ✔UDP is "best effort" delivery with to nodes on
a network. Little overhead and is often used for streaming audio or video
traffic. TCP is reliable one-to-one connection between two hosts. Uses 3-way
handshake (SYN-SYN ACK- ACK)
Network access control (NAC) - correct answer ✔goal is to prevent
computers with suboptimal security from potentially infecting other systems in
the network. Enforces policy.
Quarantine portal - correct answer ✔redirects user to a quarantine area
where fixes can be accessed. Usually a web page with hyperlinks to the fixes.
Once necessary software is installed the system is then in compliance.
Captive Portal - correct answer ✔Captures or redirects the users initial traffic
because something more is needed from the user, such as a credit card, or
user name and password.
Identification vs Authentication - correct answer ✔Identification is the claim of
who we are.
Authentication is the most critical step in the identification process. It is
proving of a subjects claim to identification. - correct answer ✔
, Authentication types - correct answer ✔Something you know (password or
PIN), Something you have (smart card, token, or device), Something you are
(fingerprints or retinal pattern), Something you do (keystroke authentication),
Somewhere you are (location)
Virus (spam) - correct answer ✔replicates itself on a system. Requires a host
to move from system to system
Worms - correct answer ✔(adware) self-contained
Logic bombs - correct answer ✔(spyware) Inserted into a system which sets
off an action when specific conditions are met
Trojan Horse - correct answer ✔(ransomware) Social engineering. Included
as an attachment or as part of an installation program
Backdoor - correct answer ✔Allows access to a system without having to
authenticate
Denial of Service (DOS) attack - correct answer ✔system/service is
unavailable for use
Ping of Death - correct answer ✔massive ping packet to crash server
Teardrop - correct answer ✔fragment the packets
Man in middle - correct answer ✔(redirection attacks)
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Academia199. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.