GIAC GFACT EXAM REVIEW BOOK
3 QUESTIONS AND ANSWERS
Authentication - ANSWER the sender of the message can be identified to the
receiver.
Integrity - ANSWER systems should be accurate, reliable and complete;
Evidence that the message has not been altered since it was sent
Non-repudiation- ANSWER The sender cannot refute sending the message
Encoding- ANSWER conversion of data from one form to another
Symmetric encryption - Symmetric encryption is the most basic kind of
encryption there is. The encryption key for symmetric encryption used to
encrypt a message is the very same encryption key required for the decryption
of the message.
Caesar Cipher - Caesar cypher is one form of encryption that was utilized by
ancient Romans, where alphabets would be shifted a certain number of places
AES (Advanced Encryption Standard)- ANSWER A strong symmetric block
cipher that encrypts data in 128-bit blocks. AES can use key sizes of 128 bits,
192 bits, or 256 bits.
, Asymmetric encryption- ANSWER a relatively new advance in the encryption
world. Simply put, every party generates two encryption keys: one is private
and one is public
public encryption key - ANSWER one you send to whoever needs to
communicate with you securely
private encryption key - ANSWER remain private only to you
Hashing - ANSWER a form of one-way encryption. That means, once you
encrypt some data, you cannot reverse the process to go from the encrypted data
back to the plaintext
Types: MD5, SHA1, SHA2/3/256/512
Red Team: responsible for offensive operations; it will be tasked with the job of
attacking a network in order to check on efficiency in terms of security controls.
They can also be tasked with finding a web application's vulnerabilities or any
other kind of software.
Blue Team: represents the defenders in general; their job is to set up a secure
network infrastructure and be on watch for any attacks and recover from an
attack.
What is implied by Defense in Depth - ANSWER - is that the concept is for
defensive positions to be prepped at various places. In case of an attack,
defenders would cede territory to the attackers by falling back to the series of
pre-arranged defensive positions, making the enemy pay a price at each of these
places, and gradually destroy the momentum of the attack before it gets to the
most important ones.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller luzlinkuz. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.