GIAC GFACT 2024 Exam Questions and Answers All Correct
139 views 0 purchase
Module
GIAC GFACT
Institution
GIAC GFACT
GIAC GFACT 2024 Exam Questions and Answers All Correct
Authentication - Answer-The origin of the message can be verified by the recipient.
Integrity - Answer-systems should be accurate, trustworthy and complete; Proof that the message hasn't been changed since it was sent
Non-repudiation - ...
GIAC GFACT 2024 Exam Questions and Answers All Correct Authentication - Answer -The origin of the message can be verified by the recipient. Integrity - Answer -systems should be accurate, trustworthy and complete; Proof that the message hasn't been changed since it was sent Non-repudiation - Answer -The sender cannot deny sending the message Encoding - Answer -the transformation of data from one form to another Symmetric encryption - Answer -the simplest form of encryption there is; encryption key that is used to encrypt a message is the same encryption key that is needed to decrypt the message. Caesar Cipher - Answer -a form of encryption which was used by the ancient Romans, in which the letters of the alphabet would be shifted a certain number of places AES (Advanced Encryption Standard) - Answer -A strong symmetric block cipher that encrypts data in 128 -bit blocks. AES can use key sizes of 128 bits, 192 bits, or 256 bits. Asymmetric encryption - Answer -a relatively new advance in the encryption world. Simply put, every party generates two encryption keys: one is private and one is public public encryption key - Answer -one you send to whoever needs to communicate with you securely private encryption key - Answer -remain private only to you Hashing - Answer -a form of one -way encryption. That means, once you encrypt some data, you cannot reverse the process to go from the encrypted data back to the plaintext Types: MD5, SHA1, SHA2/3/256/512 Red Team - Answer -responsible for offensive operations; they'll be assigned the task of attacking a network to test the effectiveness of security controls, or of finding vulnerabilities in a web application or other software. Blue Team - Answer -acts as the defenders; they are responsible for setting up a secure network infrastructure, watching out for and responding to attacks and recovering from an attack. Defense in Depth - Answer -idea was for defensive positions to be prepared at several locations. During an attack, the defenders would yield space to the attackers by falling back to the series of pre -arranged defensive positions, causing the enemy to pay a price at each location and slowly destroying the momentum of the attack before it could reach the most important locations. Confidentiality - Answer -Access to systems should only be shared amongst authorised persons or organisations Availability - Answer -systems should be accessible when needed Slingshot - Answer -a distribution packaged by the SANS institute. It features a rich array of security and testing tools, but without being so cumbersome that it would be difficult to take it in to restricted environments SIFT - Answer -provided with a much more forensic focus, and I would argue is just the go-to for tools for forensics purposes Features: Better memory utilization Auto-DFIR package update and customizations Latest forensic tools and techniques VM Appliance ready to tackle forensics Cross compatibility between Linux and Windows Option to install stand -alone system via SIFT -CLI installer Expanded Filesystem Support Kali Linux - Answer -a distribution of Linux made by a company called Offensive Security. It's intended for security professionals to use and comes with a variety of useful tools pre -installed Metagoofil - Answer -a tool that, when given a domain, can find files of a certain type using Google, automatically download them and then look at the metadata to find people and email addresses. Crawling/Spidering - Answer -Search engines work by first visiting a page, then visiting all links available on the page, and following all links available on those pages, etc... 'Robots.txt' file - Answer -a text file with a list of pages on a site you don't want to be indexed by a search engine WHOIS system - Answer -responsible for keeping track of who is responsible for a domain name. It is intended to provide contact details for the owners of a domain in cases of abuse or other circumstances
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £10.42. You're not tied to anything after your purchase.