100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
SBOLC Security Plus Study Guide with Complete Solutions $10.99   Add to cart

Exam (elaborations)

SBOLC Security Plus Study Guide with Complete Solutions

1 review
 24 views  1 purchase
  • Course
  • SBOLC
  • Institution
  • SBOLC

SBOLC Security Plus Study Guide with Complete Solutions

Preview 2 out of 7  pages

  • August 24, 2024
  • 7
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • SBOLC
  • SBOLC

1  review

review-writer-avatar

By: tsimpkins2010 • 3 weeks ago

avatar-seller
CLOUND
SBOLC Security Plus Study Guide with
Complete Solutions
2Fish - ANSWER-similar to AES

3DES - ANSWER-(old and slow x 3)

Acceptance - ANSWER-Cost of a countermeasure outweighs the loss due to a risk

AES - ANSWER-De facto standard

Asymmetric - ANSWER-DEER, has 2 keys

Authentication is the most critical step in the identification process. It is proving of a
subjects claim to identification. - ANSWER-

Authentication types - ANSWER-Something you know (password or PIN), Something
you have (smart card, token, or device), Something you are (fingerprints or retinal
pattern), Something you do (keystroke authentication), Somewhere you are (location)

Availability goal - ANSWER-continuous operation, available for use

Avoidance - ANSWER-Not performing an activity that could carry risk

Backdoor - ANSWER-Allows access to a system without having to authenticate

Block Cipher - ANSWER-found in software. Applied to block data (64 contiguous bits) at
once as a group. Very slow but more secure than Stream

Blowfish - ANSWER-(fastest, 64bit)

Bot - ANSWER-programs that run on automated tasks. Obeys a master or author of the
code

Botnet - ANSWER-collection of zombies- a network of compromised systems containing
malware which acts as a robot. Controlled by a master

Botnet attack - ANSWER-large number of computers under the control of a single evil
guy, who uses the botnets to ALL conduct a DoS attack at the same time. significant
effect on the target. Distributed DOS.

Captive Portal - ANSWER-Captures or redirects the users initial traffic because
something more is needed from the user, such as a credit card, or user name and
password.

, Cast - ANSWER-128/256

Centralized - ANSWER-PKI. Using centralized server, process can be managed with a
large single system. . large scale system is more vulnerable to attack

Cold Site - - ANSWER-dedicated space, but there is no actual infrastructure inside. This
could be something like an empty warehouse floor.

Cold site, warm site, hot site - ANSWER-used for when a primary site might go down
due to weather, emergencies, explosions, or whatever

Confidentiality goal - ANSWER-random ppl cant see your messages, only the intended
receiver

Configuration baselines - ANSWER-establishes mandatory settings that systems must
have in place to be accepted for use in the network.

Decentralized - ANSWER-WEB PGP/GPG. Allows process to be pushed out into
organization or environment.

Denial of Service (DOS) attack - ANSWER-system/service is unavailable for use

DES - ANSWER-(old and slow, 64 bit-56 effective)

Deterrence - ANSWER-Put something in place that will make it so the attacker will not
want to perform the malicious act because of the consequences.

Diffie Hellman - ANSWER-(only for key exchange)

Directory Services - ANSWER-naming system that stores , organizes, and provides
access to information in a directory

Distributed Denial of Service (DDoS) - multiple attackers prevents access to resources
for authorized users - ANSWER-

DNS attacks - ANSWER-Domain Name Service translates IP addresses and domain
names (such as Google.com). If you try to go to Google.com and someone has
attacked your DNS resolution, he could send you to his malicious site that looks exactly
like Google and steal your information that you put into the site

DOS - ANSWER-floods a server with requests of some type (could be pings, SYNs, etc)
which makes the server unavailable for its normal duties

Dynamic - ANSWER-pool of public IP addresses is shared by an entire private IP
subnet

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller CLOUND. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

62491 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99  1x  sold
  • (1)
  Add to cart