This command uses ICMP to determine if a host on the network is alive.
What is PING?
This encryption type uses the SAME key for both encrypting and decrypting messages.
What is symmetric encryption?
This strategy gives users access to what they need to perform their job duties but nothing more.
What is least privileged access?
Job rotation, separation of duties, and mandatory vacation policies.
What are examples of security best practices that help prevent employees from committing fraud or abuse?
This protocol is used to keep the time synchronized across devices.
What is NTP?
This command supports troubleshooting by showing the path a packet takes through the network.
What is TRACERT or TRACEROUTE?
This is a password-based authentication protocol used by Point-to-Point Protocol (PPP) to validate users
Merchants in the US must follow this information security standard used to handle credit cards from major card brands.
What is PCI DSS?
A process of finding weaknesses in cryptographic algorithms and using these weaknesses to decipher the ciphertext without knowing the secret key.
What is Cryptanalysis?
This protocol allows provides a means to transfer files.
What is FTP?
This command allows a user to lookup the IP ADDRESS that corresponds to a domain name.
What is NSLOOKUP or DIG?
This term refers to the number of bits in a key used by a cryptographic algorithm. An increase in this typically means better security.
What is "key length" or "key size"?
This framework provides a process that integrates security, privacy, and cyber supply chain risk management activities into the system development life cycle. It includes 6 phases including CATEGORIZE>SELECT> IMPLEMENT> ASSESS>AUTHORIZE>MONITOR.
What is the NIST Risk Management Framework?
SAML and OATH2 are used by these systems to enable single sign on and designed to allow a website or application to access resources hosted by other web apps on behalf of a user .
This network process makes setting up secure wireless networks in small businesses and homes easier.
What is WPS (Wifi Protected Setup)?
This command line utility for Linux and Unix-like operating systems has the primary purpose to convert and copy files.
What is dd?
What is SALT?
Controlling who has access to evidence, labeling and cataloging, and logging who has access to evidence are examples of this.
What is ensuring proper Chain of Custody?
An approach to public-key (asymmetric) cryptography based on the algebraic structure of elliptic curves over finite fields.
What is elliptic curve cryptography (ECC)?
This is the preferred encryption type used on wireless networks today.
What is WPA2 (wifi protected access 2)?
This program dumps system memory to the standard output stream, skipping over holes in memory maps. By default, the program dumps the contents of physical memory.
What is memdump?
This term is used to describe the result of putting plaintext through an encryption algorism do its not readable without the key.
What is ciphertext?
This procedures outlines steps of what an organization should do in the event of an incident. Steps include Detect & Analysis, Containment, Eradication, Recovery, and Post Incident Activity.
What is the NIST Computer Security Incident Handling Guide?
This computer software that makes it simpler to deploy many of the open source programs and plugins used in The Sleuth Kit. The graphical user interface displays the results from the forensic search of the underlying volume, making it easier for investigators to flag pertinent sections of data.
Name, email, employee ID are examples of what these when working with IdP (Identity Providers).
What are attributes?