100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

SBOLC Security Plus Study Guide 100% Solved By Experts!

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A
Geüpload op
07-12-2024
Geschreven in
2024/2025

Goals of Crypto - ANSWERSConfidentiality (encryption),Integrity (Hashing),Authentication (Prove yourself), Non-repudiation (can't deny it happened-digital signatures) TCP vs UDP - ANSWERSUDP is "best effort" delivery with to nodes on a network. Little overhead and is often used for streaming audio or video traffic. TCP is reliable one-to-one connection between two hosts. Uses 3-way handshake (SYN-SYN ACK- ACK) Network access control (NAC) - ANSWERSgoal is to prevent computers with suboptimal security from potentially infecting other systems in the network. Enforces policy. Quarantine portal - ANSWERSredirects user to a quarantine area where fixes can be accessed. Usually a web page with hyperlinks to the fixes. Once necessary software is installed the system is then in compliance. Captive Portal - ANSWERSCaptures or redirects the users initial traffic because something more is needed from the user, such as a credit card, or user name and password. Identification vs Authentication - ANSWERSIdentification is the claim of who we are. Authentication is the most critical step in the identification process. It is proving of a subjects claim to identification. - ANSWERS Authentication types - ANSWERSSomething you know (password or PIN), Something you have (smart card, token, or device), Something you are (fingerprints or retinal pattern), Something you do (keystroke authentication), Somewhere you are (location) Virus (spam) - ANSWERSreplicates itself on a system. Requires a host to move from system to system

Meer zien Lees minder
Instelling
SBOLC Security Plus
Vak
SBOLC Security Plus









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
SBOLC Security Plus
Vak
SBOLC Security Plus

Documentinformatie

Geüpload op
7 december 2024
Aantal pagina's
8
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

SBOLC Security Plus Study Guide 100%
Solved By Experts!
Goals of Crypto - ANSWERSConfidentiality (encryption),Integrity
(Hashing),Authentication (Prove yourself), Non-repudiation (can't deny it happened-
digital signatures)

TCP vs UDP - ANSWERSUDP is "best effort" delivery with to nodes on a network. Little
overhead and is often used for streaming audio or video traffic. TCP is reliable one-to-
one connection between two hosts. Uses 3-way handshake (SYN-SYN ACK- ACK)

Network access control (NAC) - ANSWERSgoal is to prevent computers with
suboptimal security from potentially infecting other systems in the network. Enforces
policy.

Quarantine portal - ANSWERSredirects user to a quarantine area where fixes can be
accessed. Usually a web page with hyperlinks to the fixes. Once necessary software is
installed the system is then in compliance.

Captive Portal - ANSWERSCaptures or redirects the users initial traffic because
something more is needed from the user, such as a credit card, or user name and
password.

Identification vs Authentication - ANSWERSIdentification is the claim of who we are.

Authentication is the most critical step in the identification process. It is proving of a
subjects claim to identification. - ANSWERS

Authentication types - ANSWERSSomething you know (password or PIN), Something
you have (smart card, token, or device), Something you are (fingerprints or retinal
pattern), Something you do (keystroke authentication), Somewhere you are (location)

Virus (spam) - ANSWERSreplicates itself on a system. Requires a host to move from
system to system

Worms - ANSWERS(adware) self-contained

Logic bombs - ANSWERS(spyware) Inserted into a system which sets off an action
when specific conditions are met

Trojan Horse - ANSWERS(ransomware) Social engineering. Included as an attachment
or as part of an installation program

, Backdoor - ANSWERSAllows access to a system without having to authenticate

Denial of Service (DOS) attack - ANSWERSsystem/service is unavailable for use

Ping of Death - ANSWERSmassive ping packet to crash server

Teardrop - ANSWERSfragment the packets

Man in middle - ANSWERS(redirection attacks)

Distributed Denial of Service (DDoS) - multiple attackers prevents access to resources
for authorized users - ANSWERS

Smurf -amplification attack (attacker uses router to broadcast attack). ICMP -
ANSWERS

Fraggle - ANSWERSamplification attack. UDP

Security control types - ANSWERSmanagerial, technical, operational

Managerial - ANSWERSpolicies and procedures put into place to define and guide
employees actions in dealing with sensitive info.

Technical - ANSWERSdevices, processes, protocols, and other measures use to
protect the CIA of sensitive info. (technical measures)

Operational define how people in the organization should handle data, software and
hardware. should include environmental and physical security. - ANSWERS

exception handling - ANSWERSensures the code can handle the error conditions

error handling - ANSWERSanticipation, detection and resolution of any errors

OS hardening techniques - ANSWERSprocess of securely configuring the system
against security vulnerabilities

Stream Cipher - ANSWERSusually found in hardware. Data encrypted bit by bit.
Example is RC4. Fast

Block Cipher - ANSWERSfound in software. Applied to block data (64 contiguous bits)
at once as a group. Very slow but more secure than Stream

Confidentiality goal - ANSWERSrandom ppl cant see your messages, only the intended
receiver

Integrity goal - ANSWERSmessage sent has not been changed
€13,13
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
papersmaster01 Howard Community College
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
281
Lid sinds
2 jaar
Aantal volgers
106
Documenten
14087
Laatst verkocht
1 week geleden
PAPERSMASTER01

On this page you will find documents , package deals, flashcards offered by seller PAPERSMASTER01.With our documents on your side you"ll be well equipped to tackle you exams and achieve the grades you need.

3,9

71 beoordelingen

5
22
4
33
3
9
2
3
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen