with verified answers
3 DES Ans✓✓✓-Triple DES (often abbreviated 3DES) is a symmetric encryption
algorithm that uses the now antiquated DES (data encryption standard) algorithm
three times in a row to encrypt your data. The DES algorithm uses only 56-bit
encryption and can be compromised by brute force software running on modern
hardware in less than a day.
Accounting Ans✓✓✓-Thus, you have a need for the critical nature of accounting
to verify that the restrictions you thought were in place are working as expected
and that there is not attempted or actual unauthorized access. Accounting also
includes verifying the correct access control settings on data files, providing a
forensic trail after a security breach to determine how the attacker got in (to
harden defenses for the future) and what they accessed (for damage control and
potential changes to permissions in the future)
Ad-hoc Ans✓✓✓-In ad-hoc mode, all wireless communication is performed in a
peer-to-peer fashion and does not require or involve a WAP. Ad-hoc wireless
networks are rarely used in homes or offices, but they can be helpful in setting up
a new device, such as a printer by connecting them directly, much as one would
do with a physical cable. Ad-hoc networks are also occasionally used to transfer
files between devices, such as between a camera and a laptop.
Advanced Encryption Standard (AES) Ans✓✓✓-Currently, the most secure
algorithm for storing and encrypting data at rest is the Advanced Encryption
Standard (AES), a symmetric key cipher that makes use of different key and block
sizes and creates a near-impenetrable encryption.
,Advanced Persistent Threat (APT) Ans✓✓✓-A network attack in which an
intruder gains access to a network and stays there undetected with the intention
of stealing data over a long period of time.
AES Ans✓✓✓-The Advanced Encryption Standard (AES) is considered a very
secure form of encryption today, although, with advances in computing power
and quantum computing, it may not be considered secure forever. AES can be
used with a 128-bit, 192-bit, or 256-bit key. Longer key lengths are exponentially
harder to crack, but they also increase the amount of computing power required
to encrypt the data. Today, most devices and websites use the 256-bit version
(AES-256).
Application Layer (Layer 7) Ans✓✓✓-This layer is responsible for network
applications (like HTTP or FTP) and their production of data to be transferred over
the network.
Application Layer Ans✓✓✓-This layer is responsible for the communication
protocols between nodes. The protocols in this layer include hypertext transfer
protocol (HTTP and HTTPS), Secure Shell (SSH), and network time protocol (NTP),
among many others.
Application Level Ans✓✓✓-To combat this potential weakness in security,
network administrators began using proxy servers that could act as a middleman,
reading and parsing the traffic payload and then forwarding it on to the intended
destination if the payload was safe
ARP Ans✓✓✓-Address Resolution Protocol
,Displays the MAC address mapping for the hosts that have been discovered in the
ARP cache
ARP poisoning Ans✓✓✓-Which is a method attackers use to cause an Ethernet
switch to flood all traffic to every port on the switch, including the attacker
computer
Asymmetric Key Encryption Ans✓✓✓-Asymmetric key ciphers rely on two
different keys to encrypt and decrypt the traffic. This is particularly useful on the
internet where the encryption of the data being sent to and from e-commerce
and banking websites is needed. The customers have no reliable and secure
means to exchange a secret key prior to the data transfer, so public key
infrastructure (PKI) is relied upon.
Authentication Ans✓✓✓-When you think of authentication, you may think of a
person gaining access to resources, but authentication is actually just the process
of confirming a person's identity. A system can confirm your identity via
usernames and passwords or with certificates, as is the case with public key
infrastructure (PKI).
Authorization Ans✓✓✓-Once the identity of the user has been confirmed
through authentication, the authorization system steps in to determine what the
user may access. For example, can the user access resources in a particular
subnet? Does the user have access to a particular server or file? If data access is in
question, can the user write to or delete the data, or is the access read-only? The
list of questions (and potential restrictions) goes on almost endlessly.
Availability Ans✓✓✓-The goal of the availability principle is to ensure the data is
always accessible by it's authorized user.
, Black-hat hackers Ans✓✓✓-May or may not be IT professionals but possess the
knowledge and will to breach system for profit
Blue Team Ans✓✓✓-The blue team defends
Bridge {Data link Layer} Ans✓✓✓-Connects two or more networks
Forwards data to next network with analysis
Not widely used in modern networks
Buffer overflow Ans✓✓✓-In this case, the attacker purposefully entered text that
was too large to fit within a region of memory called a "Buffer"
Bus Topology Ans✓✓✓-All the devices are connected to a shared single cable
Bus topologies are uncommon today
Computers in a bus topology physically tap into the network cable using special
adapters
The ends of the cables have terminators
In a bus topology only one computer can communicate at a time