Show:
Questions
Responses
Print
Forensics
Cryptography
Attacks
Controls
Appliances
100
forensic analyst's first actions
What is capture volatile memory contents?
100
DHCP requests with spoofed MAC addresses
What is a DHCP starvation attack?
100
best way to prevent social-engineering attacks
What is employee training?
100
hides data in ICMP traffic
What is covert channels?
100
IPS
What is an intrusion protection system?
200
forensic details that offer information about web browsing behavior
What is browser history and cookies?
200
power-monitoring attack
What is a side-channel attack?
200
fake public hotspot that is a clone of the real hotspot
What is an evil twin?
200
deny icmp any any
What is an access control list?
200
ACL
What is a firewall?
300
records who has handled evidence
What is chain of custody?
300
Heartbleed bug leaves which type of key exposed
What is a private key?
300
best way to defeat brute force or dictionary attacks
What is an account lockout policy?
300
posts made of cement and steel
What is a bollard?
300
CAM
What is a switch?
400
sequential copy of every bit of information
What is bit stream copy?
400
different messages that produce the same message digest
What is a birthday attack?
400
15 minutes
What is the time it takes to crack a WEP signal?
400
requires use of carbon dioxide as a fire suppresent
What is electrical fire?
400
RIP
What is a router?
500
information registry files and settings shows an investigator
What is dhw the computer was used and what software is installed on the system?
500
an attacker looks for patterns in order to break the code
What is frequency analysis methods?
500
possible attack(s) on WPA-PSK
What is Dictionary-based and Rainbow Tables?
500
number of windows allowed in a data center
What is none?
500
TOR
What is a proxy?