A _______ is a value that can be used to ensure that plaintext, when hashed, will not consistently result in the same digest.
What is salt.
This attack occurs when an attacker manipulates a process and attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.
What is a buffer overflow attack
This type of network virtualizes parts of the physical network so that it can be more quickly and easily reconfigured. This is largely accomplished by separating the control plane from the data plane.
What is a Software Defined Network (SDN)
This is an AP that is set up by an attacker to mimic an authorized AP on the victims network.
What is an evil twin
This policy defines actions that users may perform while accessing systems.
What is an Acceptable Use Policy (AUP)
A PKI system handles the creation, storage, distribution, and _________ of certificates.
What is revocation.
In a ____ - ______ ______ ( _ _ _ ) attack, the threat actor takes advantage of web applications that accept user input without validating it before presenting it back to the user.
What is cross-site scripting (XSS)
Which version of this network management protocol uses usernames and passwords instead of a 'community string'?
What is SNMPv3, or v3
There are two modes of WPA2: Personal and Enterprise. In Enterprise mode, a _________ server is used to provide user authentication.
What is RADIUS.
This is the average amount of time that it will take a device to recover from a failure that is not a terminal failure.
What is MTTR or Mean Time To Recovery
“_____ ______” is the resiliency of a crypto key to attacks.
What is "Key strength".
In a _ _ _ _______ ________ an attacker uses a publicly accessible DNS server to flood a victim by redirecting valid responses.
What is a DNS amplification attack.
These things allow the administrator to configure a switch to copy traffic that occurs on some or all ports to a designated port on the switch.
What are Port mirrors
This protocol was originally developed for wired networks but is used often in IEEE 802.11 networks to provide ‘port-based authentication’. It accomplishes this by implementing an authentication process that uses an “authentication server”, an “authenticator”, and a “supplicant”.
What is is 802.1X
A security control is any device or process that is used to reduce risk. There are two levels of security controls:
(1) Administrative controls – processes for developing and ensuring that policies and procedures are carried out
(2) __________ controls – security controls carried out or managed by devices
What is technical
The _______ ________ ________ ________ is a request/response protocol that performs a real-time lookup of a certificate’s status
What is “Online Certificate Status Protocol” (or OCSP)
In this attack, the attacker uses the user’s web browser settings to impersonate that user.
What is a Cross-Site Request Forgery (X S R F)
This short but sturdy vertical post is used as a vehicular traffic barricade to prevent a car from “ramming” into a secured area.
What is a bollard
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection.
What is Bluesnarfing
Business Continuity is an organization’s ability to maintain operations after a disruptive event. Preparing for this involves the following three things:
(1) Business continuity planning
(2) Business impact analysis
(3) ________ ________ ________
What is Disaster recovery planning
A ________ is an input value that must be unique within some specified scope.
What is a nonce.
In this attack, an attacker broadcasts a network request to all computers on the network but changes the address from which the request came from (called IP spoofing).
What is a smurf attack
This type of attack (or infection) occurs when malware is planted in the ROM firmware of a device, it can difficult or impossible to clean an infected device.
What is a supply chain attack, or infection(s)
This encryption protocol is used for WPA2 and specifies the use of CCM with AES. (It is also one of the longest representations of a four letter acronym :)
What is Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
________ _________ refers to a system’s ability to deal with malfunctions. To achieve this, redundancy is often built into the system.
What is Fault tolerance