100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SBOLC Security Fundamentals Exam Review 100% Accurate!!

Rating
-
Sold
-
Pages
7
Grade
A
Uploaded on
07-12-2024
Written in
2024/2025

Onboarding Process - ANSWERSProcedures for new employees -Signing of NDAs, AUPs, and signing for equipment MD5 - ANSWERS-a hashing algorithm that results in a 128-bit output. -bit strength is 128 Integer Overflow - ANSWERS-Large number being place into a buffer designed for smaller numbers -Can lead to DoS and data corruption -Countermeasure: bounds checking -Numeric Values X.509 V3 - ANSWERSA digital certificate that contains an extension field that permits any number of additional fields to be added to the certificate. Initialization Vector (IV) - ANSWERS-Random values used in conjunction with algorithms. Applied to plaintext data, the key, or the ciphertext before encryption is completed. -Increases the strength of ciphertext -Mitigates exploitable patterns in the code -Harder to discover the encryption key or password -Can be used as a component to key stretching

Show more Read less
Institution
SBOLC Security Fundamentals
Course
SBOLC Security Fundamentals









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SBOLC Security Fundamentals
Course
SBOLC Security Fundamentals

Document information

Uploaded on
December 7, 2024
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SBOLC Security Fundamentals
Exam Review 100% Accurate!!
Onboarding Process - ANSWERSProcedures for new employees

-Signing of NDAs, AUPs, and signing for equipment

MD5 - ANSWERS-a hashing algorithm that results in a 128-bit output.

-bit strength is 128

Integer Overflow - ANSWERS-Large number being place into a buffer designed for
smaller numbers

-Can lead to DoS and data corruption

-Countermeasure: bounds checking

-Numeric Values

X.509 V3 - ANSWERSA digital certificate that contains an extension field that permits
any number of additional fields to be added to the certificate.

Initialization Vector (IV) - ANSWERS-Random values used in conjunction with
algorithms. Applied to plaintext data, the key, or the ciphertext before encryption is
completed.

-Increases the strength of ciphertext

-Mitigates exploitable patterns in the code

-Harder to discover the encryption key or password

-Can be used as a component to key stretching

-Similar terms: Nonce, salt

Snapshot - ANSWERS-A Virtual Machine rollback capability

-Allows you to revert back to a savepoint or known good state

PKI - ANSWERSPublic Key Infrastructure

, -the set of hardware, software, policies, processes, and procedures required to create,
manage, distribute, use, store, and revoke digital certificates and public-keys.

-overall framework

Change Management - ANSWERS-Policy that defines the formalized manners to
introduce transformations/change within the organization

-Documents and introduces change to the organization
-Change may introduce new risk

-Updates the baselines

Hash - ANSWERS-A hash is a mathematical function that converts an input of arbitrary
length into an encrypted output of a fixed length

-Fixed link output (message digest)

Script Kiddies - ANSWERSAttackers who lack the knowledge of how the protocols and
technologies work

RMF - ANSWERSRisk Management Framework

-Identifies risk in a 7 Step Model

What is the organizational policy that helps to uncover fraud? - ANSWERSMandatory
Vacation

Data Controller - ANSWERSThe person who controls the data being released

-Coud release data to a 3rd party and handles sensitive information internally

Proprietary - ANSWERSInternal to an organization, gives you a competitive edge, a
design concept you do not want leaked

RoT - ANSWERSRoot of Trust

-Trustworthy hardware and trustworthy software promoting security to a higher system

-A source that can always be trusted within a cryptographic system

VPN Tunnel Methods - ANSWERS-Full Tunnel: All network traffic is passed through the
tunnel

-Split Tunnel: Only network traffic destined to the corporate network is passed through
the tunnel, all other traffic goes directly to the internet

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
papersmaster01 Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
281
Member since
2 year
Number of followers
106
Documents
14087
Last sold
1 week ago
PAPERSMASTER01

On this page you will find documents , package deals, flashcards offered by seller PAPERSMASTER01.With our documents on your side you"ll be well equipped to tackle you exams and achieve the grades you need.

3.9

71 reviews

5
22
4
33
3
9
2
3
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions