Notes in Day 48 Flashcards - Security Fundamentals

To Subscribe, use this Key


Status Last Update Fields
Published 03/05/2024 What is the C of the CIA triad?
Published 03/05/2024 What is the I of the CIA triad?
Published 03/05/2024 What is the A of the CIA triad?
Published 03/05/2024 CIA Triad: [...] = only authorized users should be able to access data.
Published 03/05/2024 CIA Triad: [...] = data should not be tampered with by unauthorized users.
Published 03/05/2024 CIA Triad: [...] = the network/systems should be operational and accessible to authorized users.
Published 03/05/2024 A [...] is any potential weakness that can compromise the security of a system.
Published 03/05/2024 An [...] is something that can potentially be used to take advantage of a vulnerability.
Published 03/05/2024 A [...] is the potential of a vulnerability to be exploited.
Published 03/05/2024 A [...] technique is something that can protect against threats.
Published 03/05/2024 What does DoS attack stand for?
Published 03/05/2024 What does DDoS attack stand for?
Published 03/05/2024 A TCP [...] attack exploits the TCP three-way handshake.
Published 03/05/2024 A TCP SYN flood results in a [...] on the target.
Published 03/05/2024 To [...] an address is to use a fake source address (IP/MAC)
Published 03/05/2024 In a [...] attack, an attacker floods the target with DHCP Discover messages.
Published 03/05/2024 In a [...] attack, an attacker causes a reflector to send traffic to the target.
Published 03/05/2024 An [...] attack is a more dangerous kind of reflection attack.
Published 03/05/2024 In a [...] attack, the attacker intercepts communications between two devices.
Published 03/05/2024 ARP spoofing is also known as [...].
Published 03/05/2024 In an [...] attack, an attacker sends fraudulent ARP replies.
Published 03/05/2024 [...] attacks are used to gather information about a target.
Published 03/05/2024 [...] refers to a variety of harmful programs that can infect a computer.
Published 03/05/2024 [...] are malware that infect other software, called a host program.
Published 03/05/2024 [...] are standalone malware that spread on their own, without user interaction.
Published 03/05/2024 [...] are malware that is disguised as legitimate software.
Published 03/05/2024 [...] attacks involve pyschological manipulation to make the target reveal confidential information or perform some other action.
Published 03/05/2024 [...] is a kind of social engineering which typically involves fraudulent emails that try to appear legitimate.
Published 03/05/2024 [...] is a more targeted form of phishing, for example aimed at employees of a certain company.
Published 03/05/2024 [...] is a kind of phishing targeted at high-profile individuals.
Published 03/05/2024 [...] is phishing performed over the phone.
Published 03/05/2024 [...] is phishing using SMS text messages.
Published 03/05/2024 [...] attacks compromise sites that the target victim frequently visits.
Published 03/05/2024 [...] attacks involve entering restricted, secured areas by walking in behind an authorized person as they enter.
Published 03/05/2024 A [...] attack runs through a list of common words or passwords to find the target's password.
Published 03/05/2024 A [...] attack tries every possible combination of letters, numbers, and special characters to guess the target's password.
Published 03/05/2024 What does MFA stand for?
Published 03/05/2024 What are the three factors of multi-factor authentication?
Published 03/05/2024 [...] are a form of authentication often used to prove the identity of a website.
Published 03/05/2024 What does AAA stand for?
Published 03/05/2024 AAA: [...] is the process of verifying a user's identity.
Published 03/05/2024 AAA: [...] is the process of granting a user the appropriate access and permissions.
Published 03/05/2024 AAA: [...] is the process of recording the user's activities on the system.
Published 03/05/2024 Cisco's AAA server is [...]
Published 03/05/2024 What does Cisco ISE stand for?
Published 03/05/2024 Which AAA protocol is an open standard?
Published 03/05/2024 Which AAA protocol is Cisco proprietary?
Published 03/05/2024 RADIUS uses UDP ports [...] and [...].
Published 03/05/2024 RADIUS uses [...] ports 1812 and 1813.
Published 03/05/2024 TACACS+ uses TCP port [...]
Published 03/05/2024 TACACS+ uses [...] port 49
Published 03/05/2024 [...] programs are designed to make employees aware of potential security threats and risks.
Published 03/05/2024 [...] programs are formal sessions which educate users on corporate security policies and issues.
Published 03/05/2024 [...] protects equipment and data from potential attackers by only allowing authorized users into protected areas such as network closets.
Status Last Update Fields