Security utilities combined into a single tool.
What is a Security Suite?
Type of encryption algorithm in which the encryption key is the same as the decryption key
What is Symmetric encryption?
The severity level of 0.(Syslogs)
What is an Emergency?
The 3rd phase of the incident response?
What is containment?
what do you need to do at the end of class?
What is clock out?
Type of training that teaches personnel the skills they need to perform their jobs in a secure manner.
What is Security Training?
Consists of software, protocols, algorithms and keys. (DAILY DOUBLE)
What is a cryptosystem?
Can be used to provide message integrity.
What is Hashing?
Ensures that more than one person can perform the job tasks of a single position within an organization.
What is Cross-training?
Stands for WWW.
What is the World Wide Web?
The concept in which a person initiates a request for a payment and another person authorizes the same payment.
What is Dual Control?
Being able to determine the a sender's identity and validity through...
What is Authentication?
CSIRT
What is Computer Security Incident Response Team
More expensive to implement than symmetric algorithms.
What are Asymmetric Algorithms?
Classless Inter-Domain Routing
A scenario where two bank employees who individually know only part of the combination for the safe and must both be present to open the safe.(Type of Knowledge) ***DAILY DOUBLE***
What is Split Knowledge?
Ensures that no party can deny that it sent or received a message via encryption and/or digital signatures
What is Non-repudiation?
plan to continue business in case of disaster
Business Continuity Plan
In what phase is lessons learned?
Post-Incident
How many hours are needed at the end of this course?
What is 96
Type of report that is a complete analysis of all vulnerabilities found and a tool for network administrators, security officers, and IT managers to assess network security.
What is a Technical report?
Performs encryption by breaking the message into fixed-length units.
What is a block cipher?
The destination IP address and port number of this Syslog entry
Sep 2 23:02:27.143: %SEC-6-IPACCESSLOGP: list ACL-IPv4-E0/0-IN permitted tcp 192.168.1.3(1026) -> 192.168.2.1(80), 1 packet (DAILY DOUBLE)
What is 192.168.2.1 port 80?
An application and a protocol that is used to remotely log in to another computer using a secure tunnel.
What is SSH?(Secure Shell)
He said this: "Stay hungry. Stay foolish."
Who is Steve Jobs?