AC
AnkiCollab
AnkiCollab
Sign in
Explore Decks
Helpful
Join Discord
Download Add-on
Documentation
Support Us
Notes in
Day 48 Flashcards - Security Fundamentals
To Subscribe, use this Key
arizona-six-july-spring-montana-maryland
Status
Last Update
Fields
Published
03/05/2024
What is the C of the CIA triad?
Published
03/05/2024
What is the I of the CIA triad?
Published
03/05/2024
What is the A of the CIA triad?
Published
03/05/2024
CIA Triad: [...] = only authorized users should be able to access data.
Published
03/05/2024
CIA Triad: [...] = data should not be tampered with by unauthorized users.
Published
03/05/2024
CIA Triad: [...] = the network/systems should be operational and accessible to authorized users.
Published
03/05/2024
A [...] is any potential weakness that can compromise the security of a system.
Published
03/05/2024
An [...] is something that can potentially be used to take advantage of a vulnerability.
Published
03/05/2024
A [...] is the potential of a vulnerability to be exploited.
Published
03/05/2024
A [...] technique is something that can protect against threats.
Published
03/05/2024
What does DoS attack stand for?
Published
03/05/2024
What does DDoS attack stand for?
Published
03/05/2024
A TCP [...] attack exploits the TCP three-way handshake.
Published
03/05/2024
A TCP SYN flood results in a [...] on the target.
Published
03/05/2024
To [...] an address is to use a fake source address (IP/MAC)
Published
03/05/2024
In a [...] attack, an attacker floods the target with DHCP Discover messages.
Published
03/05/2024
In a [...] attack, an attacker causes a reflector to send traffic to the target.
Published
03/05/2024
An [...] attack is a more dangerous kind of reflection attack.
Published
03/05/2024
In a [...] attack, the attacker intercepts communications between two devices.
Published
03/05/2024
ARP spoofing is also known as [...].
Published
03/05/2024
In an [...] attack, an attacker sends fraudulent ARP replies.
Published
03/05/2024
[...] attacks are used to gather information about a target.
Published
03/05/2024
[...] refers to a variety of harmful programs that can infect a computer.
Published
03/05/2024
[...] are malware that infect other software, called a host program.
Published
03/05/2024
[...] are standalone malware that spread on their own, without user interaction.
Published
03/05/2024
[...] are malware that is disguised as legitimate software.
Published
03/05/2024
[...] attacks involve pyschological manipulation to make the target reveal confidential information or perform some other action.
Published
03/05/2024
[...] is a kind of social engineering which typically involves fraudulent emails that try to appear legitimate.
Published
03/05/2024
[...] is a more targeted form of phishing, for example aimed at employees of a certain company.
Published
03/05/2024
[...] is a kind of phishing targeted at high-profile individuals.
Published
03/05/2024
[...] is phishing performed over the phone.
Published
03/05/2024
[...] is phishing using SMS text messages.
Published
03/05/2024
[...] attacks compromise sites that the target victim frequently visits.
Published
03/05/2024
[...] attacks involve entering restricted, secured areas by walking in behind an authorized person as they enter.
Published
03/05/2024
A [...] attack runs through a list of common words or passwords to find the target's password.
Published
03/05/2024
A [...] attack tries every possible combination of letters, numbers, and special characters to guess the target's password.
Published
03/05/2024
What does MFA stand for?
Published
03/05/2024
What are the three factors of multi-factor authentication?
Published
03/05/2024
[...] are a form of authentication often used to prove the identity of a website.
Published
03/05/2024
What does AAA stand for?
Published
03/05/2024
AAA: [...] is the process of verifying a user's identity.
Published
03/05/2024
AAA: [...] is the process of granting a user the appropriate access and permissions.
Published
03/05/2024
AAA: [...] is the process of recording the user's activities on the system.
Published
03/05/2024
Cisco's AAA server is [...]
Published
03/05/2024
What does Cisco ISE stand for?
Published
03/05/2024
Which AAA protocol is an open standard?
Published
03/05/2024
Which AAA protocol is Cisco proprietary?
Published
03/05/2024
RADIUS uses UDP ports [...] and [...].
Published
03/05/2024
RADIUS uses [...] ports 1812 and 1813.
Published
03/05/2024
TACACS+ uses TCP port [...]
Published
03/05/2024
TACACS+ uses [...] port 49
Published
03/05/2024
[...] programs are designed to make employees aware of potential security threats and risks.
Published
03/05/2024
[...] programs are formal sessions which educate users on corporate security policies and issues.
Published
03/05/2024
[...] protects equipment and data from potential attackers by only allowing authorized users into protected areas such as network closets.
Status
Last Update
Fields