This is the practice of intercepting and analyzing data packets transmitted over a wireless network.
What is Wi-Fi Sniffing?
This is the encryption used on all common access cards.
What is 2048-bit?
Having multiple routers, low memory space, poorly optimized backend databases, a mixture of transmission mediums, and/or DNS server errors can lead to this issue.
What is network latency?
This method of social engineering involves a malicious actor offering services with the expectation that the victim will reciprocate in some capacity.
What is Quid Pro Quo?
This security concept is used to compare the state of a system between two different points in time, potentially identifying a difference that might indicate the presence of malware.
What is establishing a baseline?
These are the four main threats to mobile device security.
What are application-based, web-based, network-based, and device-based?
This component of a CAC contains the PIN and one or more PKI certificates.
What is the integrated circuit chip (ICC)?
This indicator measures how long it takes a packet to travel from it source to its destination and then back to the source.
What is Round Trip Time (RTT)?
Without my knowledge, an individual followed me into a secure facility by catching the door before it closed behind me. This term represents the technique used by the unauthorized individual.
Changes to personal files, common applications, wallpapers, and/or AutoStarts are all forms of this.
What are user specific changes?
Implemented by Apple on iOS and macOS devices, this security feature enforces secure connections between apps and web services.
What is App Transport Security (ATS)?
Featured on the back of the CAC, this barcode type contains 40 possible characters with one being used for a stop/start pattern.
What is Code 39?
This layer 2 protocol is not very secure, and is very susceptible to spoofing and MITM attacks.
What is Address Resolution Protocol (ARP)?
A person either with malicious intent, or who might simply be negligent, that has access to assets within an organization that may carry a significant impact if compromised.
What is an insider threat?
On Windows machines, this command will display active TCP connections.
What is netstat?
This cryptographic key can be securely erased or deleted from a device's memory when it is no longer needed or when there is a risk of unauthorized access.
What is an effaceable key?
This individual is considered to have created the first smart card.
Who is Roland Moreno?
This DNS query type will traverse it's way up the DNS hierarchy until the domain is resolved.
What is recursive?
This attack involves sending ICMP broadcasts with spoofed IP addresses to various hosts, causing an overload of ICMP responses to the victim machine.
What is a smurf attack?
This external tool is useful for identifying the presence of difficult to find malware that has burrowed itself deep within the system and actively hides it's presence.
What is chkrootkit?
This is the default encryption method for most Android devices.
What is 128 Advanced Encryption Standard (AES) w/ Cipher-Block Chaining (CBC) (and ESSIV:SHA256) // aes-cbc-essiv:sha256?
Featured on the front of a CAC, this barcode type uses a base 929 encoding.
What is PDF417?
The following is displayed when investigating a network interface on a local Linux host:
UP BROADCAST RUNNING PROMISC MULTICAST
indicating the possible presence of this network threat.
What is a sniffer?
This common attack is represented by the following scenario:
While browsing the internet for a recipe on how to make a peanut butter and jelly sandwich, I click on an article for the recipe I was looking for. Unbeknownst to me, this website was compromised and there is now malware being installed on my machine silently in the background.
What is a drive-by-download?
This event ID is triggered when a user has successfully logged in.
What is 528?