100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SBOLC Security Plus Study Guide 100% Solved By Experts!

Rating
-
Sold
-
Pages
8
Grade
A
Uploaded on
07-12-2024
Written in
2024/2025

Goals of Crypto - ANSWERSConfidentiality (encryption),Integrity (Hashing),Authentication (Prove yourself), Non-repudiation (can't deny it happened-digital signatures) TCP vs UDP - ANSWERSUDP is "best effort" delivery with to nodes on a network. Little overhead and is often used for streaming audio or video traffic. TCP is reliable one-to-one connection between two hosts. Uses 3-way handshake (SYN-SYN ACK- ACK) Network access control (NAC) - ANSWERSgoal is to prevent computers with suboptimal security from potentially infecting other systems in the network. Enforces policy. Quarantine portal - ANSWERSredirects user to a quarantine area where fixes can be accessed. Usually a web page with hyperlinks to the fixes. Once necessary software is installed the system is then in compliance. Captive Portal - ANSWERSCaptures or redirects the users initial traffic because something more is needed from the user, such as a credit card, or user name and password. Identification vs Authentication - ANSWERSIdentification is the claim of who we are. Authentication is the most critical step in the identification process. It is proving of a subjects claim to identification. - ANSWERS Authentication types - ANSWERSSomething you know (password or PIN), Something you have (smart card, token, or device), Something you are (fingerprints or retinal pattern), Something you do (keystroke authentication), Somewhere you are (location) Virus (spam) - ANSWERSreplicates itself on a system. Requires a host to move from system to system

Show more Read less
Institution
SBOLC Security Plus
Module
SBOLC Security Plus









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SBOLC Security Plus
Module
SBOLC Security Plus

Document information

Uploaded on
December 7, 2024
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SBOLC Security Plus Study Guide 100%
Solved By Experts!
Goals of Crypto - ANSWERSConfidentiality (encryption),Integrity
(Hashing),Authentication (Prove yourself), Non-repudiation (can't deny it happened-
digital signatures)

TCP vs UDP - ANSWERSUDP is "best effort" delivery with to nodes on a network. Little
overhead and is often used for streaming audio or video traffic. TCP is reliable one-to-
one connection between two hosts. Uses 3-way handshake (SYN-SYN ACK- ACK)

Network access control (NAC) - ANSWERSgoal is to prevent computers with
suboptimal security from potentially infecting other systems in the network. Enforces
policy.

Quarantine portal - ANSWERSredirects user to a quarantine area where fixes can be
accessed. Usually a web page with hyperlinks to the fixes. Once necessary software is
installed the system is then in compliance.

Captive Portal - ANSWERSCaptures or redirects the users initial traffic because
something more is needed from the user, such as a credit card, or user name and
password.

Identification vs Authentication - ANSWERSIdentification is the claim of who we are.

Authentication is the most critical step in the identification process. It is proving of a
subjects claim to identification. - ANSWERS

Authentication types - ANSWERSSomething you know (password or PIN), Something
you have (smart card, token, or device), Something you are (fingerprints or retinal
pattern), Something you do (keystroke authentication), Somewhere you are (location)

Virus (spam) - ANSWERSreplicates itself on a system. Requires a host to move from
system to system

Worms - ANSWERS(adware) self-contained

Logic bombs - ANSWERS(spyware) Inserted into a system which sets off an action
when specific conditions are met

Trojan Horse - ANSWERS(ransomware) Social engineering. Included as an attachment
or as part of an installation program

, Backdoor - ANSWERSAllows access to a system without having to authenticate

Denial of Service (DOS) attack - ANSWERSsystem/service is unavailable for use

Ping of Death - ANSWERSmassive ping packet to crash server

Teardrop - ANSWERSfragment the packets

Man in middle - ANSWERS(redirection attacks)

Distributed Denial of Service (DDoS) - multiple attackers prevents access to resources
for authorized users - ANSWERS

Smurf -amplification attack (attacker uses router to broadcast attack). ICMP -
ANSWERS

Fraggle - ANSWERSamplification attack. UDP

Security control types - ANSWERSmanagerial, technical, operational

Managerial - ANSWERSpolicies and procedures put into place to define and guide
employees actions in dealing with sensitive info.

Technical - ANSWERSdevices, processes, protocols, and other measures use to
protect the CIA of sensitive info. (technical measures)

Operational define how people in the organization should handle data, software and
hardware. should include environmental and physical security. - ANSWERS

exception handling - ANSWERSensures the code can handle the error conditions

error handling - ANSWERSanticipation, detection and resolution of any errors

OS hardening techniques - ANSWERSprocess of securely configuring the system
against security vulnerabilities

Stream Cipher - ANSWERSusually found in hardware. Data encrypted bit by bit.
Example is RC4. Fast

Block Cipher - ANSWERSfound in software. Applied to block data (64 contiguous bits)
at once as a group. Very slow but more secure than Stream

Confidentiality goal - ANSWERSrandom ppl cant see your messages, only the intended
receiver

Integrity goal - ANSWERSmessage sent has not been changed
£11.45
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
papersmaster01 Howard Community College
Follow You need to be logged in order to follow users or courses
Sold
281
Member since
2 year
Number of followers
106
Documents
14087
Last sold
1 week ago
PAPERSMASTER01

On this page you will find documents , package deals, flashcards offered by seller PAPERSMASTER01.With our documents on your side you"ll be well equipped to tackle you exams and achieve the grades you need.

3.9

71 reviews

5
22
4
33
3
9
2
3
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions