Questions & Answers 2025
3DES (Triple Data Encryption Standard) - ✔✔✔Symmetric encryption algorithm that uses the now
antiquated DES algorithm 3 times in a row to encrypt your data.
A server administrator is tasked to harden the database servers, and one of the requirements is to
document any firewall ports that are open and closed. Which native Windows command line utility
should the administrator use? finger, tcpdump, dig, netstat - ✔✔✔netstat
AD-hoc mode - ✔✔✔all wireless communication is performed in a peer-to-peer fashion and does not
require or involve a WAP. Rare in home networks or offices but can be helpful by connecting a printer or
such directly. AD-hoc is like connecting a physical cable and is uses in file transfer between devices like a
GoPro and laptop.
Advanced Encryption Standard (AES) - ✔✔✔Symmetric key algorithm. can be used with 128-bit, 192-bit,
or 256-bit key. longer key lengths are exponentially harder to crack, but also require a higher amount of
computing power to encrypt. Today most devices and websites use 256-bit.
An organization needs to perform an analysis to identify vulnerabilities such as open firewall ports,
unauthorized operating systems or device types, and weak passwords. Which tool is recommended?
nslookup, nmap, tracepath, finger - ✔✔✔nmap
Application Level Firewall - ✔✔✔To combat potential weakness in security, network admins began using
proxy servers that could act as a middleman, reading and parsing the traffic payload, and then
forwarding it on to the intended destination if the payload was safe. Layer-7 firewalls.
APT (Advanced persistent Threat) - ✔✔✔a virus that is injected and sits dormant until a preordained
time or trigger from an outside source, at which point it releases its attack. The virus/malware remains
undetected while it sits for long periods, perhaps even months, just waiting for the right time. Sits long
enough at also effect backup restores, so you must comply with the attacker or everything's gone.
ARP (Address Resolution Protocol) - ✔✔✔displays the IP to physical (MAC) address mappings for hosts
that have been discovered in the ARP cache. ARP can be used to add, remove, or modify entries in the
ARP cache.
, Asset - ✔✔✔A person, device, location, or information that SecOps (security operations) aims to protect
from an attack.
Asymmetric Key encryption - ✔✔✔relies on two different keys to encrypt and decrypt traffic. This is
particularly useful on the internet where the encryption of the data being sent to and from e-commerce
and banking websites is needed.
Attack - ✔✔✔An action taken by a threat that exploits a vulnerability that attempts to either block
authorized access to an asset, or to gain unauthorized access to an asset.
Authentication, Authorization and Accounting (AAA) - ✔✔✔describes the process of granting or denying
access to data and network resources as well as verifying that the security that the security controls are
working properly. Authentication-they are who they say; Authorization-what they should have access to;
Accounting-account for and report on the access that a user was granted and how often they access it.
Black Hat Hackers - ✔✔✔may or may not be an IT professional but possess the knowledge and will
breach systems for profit. They do not ask permission and are not interested in helping their targets
improve security.
Blue, Red, White, and Purple teams - ✔✔✔Red tried to compromise the security and Blue tries to
defend. White observes and acts as a Ref. Purple is when blue and red join to train each other and make
improvements to the system.
Bridge - ✔✔✔Similarly to a router, it connects two or more networks. The difference is that a router
analyzes data packets to determine where to send the packet next, while a bridge simply forwards the
data to the next network without analysis.
Buffer overflow - ✔✔✔attacker purposefully enters text that is too large to fit within a region of
memory called a buffer. The overflow often overwrites neighboring, potentially executable areas of
memory. The buffer is code with instruction that grant the hacker control of the server.