Created by marc.maranon
about 9 years ago
|
||
Caeser Chipher
Drive by download
trojan
rootkit
Hot site
cold site
warm site
Cryptography
cryptanalysis
AES cipher standard
2 types of hypervisor (virtualization)
SNMP
Password cracking software
In order to identify abnormal traffic, establish a baseline
EAL (Evaluation Assurance Level) range
OVAL
Security Labels
14. Vulnerability scanner ex
stateful
Exposure Factor
key storage
4 classes of fire extinguishers
Protect against EMI and RFI...
Social Engineering
RISK
Qualitative risk analysis
vs
Quantitative risk analysis
Exclusive OR – same values = 0; different values = 1
Procedures and guidelines make up a policy
3 types of
Policy
Chain of evidence (custody)–
Change Control
Service level agreements (SLA)
3DES
How many parity bits are associated with 3DES?
Methods to provide redundancy in power –
Reciprocal agreement
BIA
RAID levels
LDAP
Best Evidence
Secondary Evidence
Penetration (pen) testing
Bastion Host
Residual data
fault tolerant
Difference between PAT and NAT
Ways to detect employee fraud
biometric error rates
weakness
Physical Access
password hacking
difference between Virus and Worm
Purpose of hashing algorithm
spear phishing and pharming are...
stateless