PKI utilizes what type of encryption?
Asymmetric Encryption
What are the 4 types of MFA factors we discussed in class?
This type of firewall inspects individual data packets as they pass through. It makes decisions based on source/destination/ports/protocols
What is Packet Filtering (stateless)
What is a program or device designed to intercept and capture network traffic called?
In your Hash_1 directory, what file has the hash containing: "0a2d84ff2e3f54acf516"
posions.pdf
What is submitted to a CA?
Certificate Signing Request (CSR)
What is a temporary authentication code valid for a single use or a short period?
One time password (OTP) or single-use code
This type of firewall can prevent session hijacking by keeping track of active connections.
What is Stateful or Dynamic Firewall.
Those programs or devices designed to intercept and capture network traffic, typically operate ACTIVELY or PASSIVELY?
What is Passively
What a snort header that will alert you when someone from the 10.50.22.13/18 network tries to connect to your internal network utilizing IMAP.
alert tcp 10.50.22.13/18 any -> $Home_net 143
What are 3 advantages PKI offers?
Authentication, Encryption, Non-repudiation, Data Integrity
"Collecting and storing only the minimum amount of information necessary for authentication purposes, and ensuring that any unnecessary data is promptly deleted."
Defines what?
Data Minimization
This type of firewall acts as an intermediary and allows you to "remain anonymous"
What is a proxy firewall
One method to detect a sniffer is Local Host Method which involves running the command "ifconfig" this will tell you which mode the NIC is running in. Which mode will indicate a potential sniffer on the device/network?
What is Promiscuous Mode
in your Practical_Hash_00 directory, what file matches the following hash:
407b9dacef6cb90c81797d0842c3290cdcd941207ed05c893d10dc53a4720904
300.129.jpeg
SSH is comprised of what 3 main components?
Transport Layer, User Authentication Layer, Connection Layer
Having to change your password every 30 days might be considered what type of additional security control?
Procedural Control
A Next-Generation Firewall (NGFW) is far more advanced and costly than other options. It offers deep packet inspection and advanced threat detection.
Which layers of the OSI model does it operate on?
What is ONE potential disadvantage of it?
3 - network / 4 - transport / 7 - application
Expensive / specialized knowledge required / may impact network performance / resource heavy
If you send a ping request to a suspected machine using its IP but NOT its MAC. The packet should go unnoticed because the Ethernet adapter would reject it. However, if that machine responds, what would this likely indicate?
What is the presence of a Sniffer (utilizing the Ping Method)
Two members of the team must create a NetCat connection and successfully send "Hello, World" from one member of the team to the other.
Congrats on the 400 points
In the TLS handshake what phase includes everything from ClientHello to creation on the "master secret"?
Negotiation Phase
What is Mr. Leone's favorite movie?
Wolf of Wall Street
Boondock Saints
The Departed
Full Metal Jacket
Boondock Saints
What 4 things did we say Nessus does?
Nessus is a powerful vulnerability scanner that helps organizations identify and remediate vulnerabilities before they can be exploited.
DAILY DOUBLE!!!
Mr. R was once was a Team USA athlete, although in my heart he always will be, what sport did he compete in?
Using the UTC time of day (01:23:45. 67890123) format, what time was the 1994th packet of the PCAP Scan_222.pcap sent?
13:56:54.247816