Defense in Depth
Cryptography
Manual Review
Consider the Following
R@ND0M
100

Security utilities combined into a single tool.

What is a Security Suite?

100

Type of encryption algorithm in which the encryption key is the same as the decryption key

What is Symmetric encryption?

100

The severity level of 0.(Syslogs)

What is an Emergency?

100

The 3rd phase of the incident response?

What is containment?

100

what do you need to do at the end of class?

What is clock out?

200

Type of training that teaches personnel the skills they need to perform their jobs in a secure manner.

What is Security Training?

200

Consists of software, protocols, algorithms and keys. (DAILY DOUBLE)

What is a cryptosystem?

200

Can be used to provide message integrity.

What is Hashing?

200

Ensures that more than one person can perform the job tasks of a single position within an organization.

What is Cross-training?

200

Stands for WWW.

What is the World Wide Web?

300

The concept in which a person initiates a request for a payment and another person authorizes the same payment.

What is Dual Control?

300

Being able to determine the a sender's identity and validity through...

What is Authentication?

300

CSIRT

What is Computer Security Incident Response Team

300

More expensive to implement than symmetric algorithms.

What are Asymmetric Algorithms?

300
CIDR

Classless Inter-Domain Routing

400

A scenario where two bank employees who individually know only part of the combination for the safe and must both be present to open the safe.(Type of Knowledge) ***DAILY DOUBLE***

What is Split Knowledge?

400

Ensures that no party can deny that it sent or received a message via encryption and/or digital signatures

What is Non-repudiation?

400

plan to continue business in case of disaster

Business Continuity Plan

400

In what phase is lessons learned?

Post-Incident

400

How many hours are needed at the end of this course?

What is 96

500

Type of report that is a complete analysis of all vulnerabilities found and a tool for network administrators, security officers, and IT managers to assess network security.

What is a Technical report?

500

Performs encryption by breaking the message into fixed-length units.

What is a block cipher?

500

The destination IP address and port number of this Syslog entry

Sep 2 23:02:27.143: %SEC-6-IPACCESSLOGP: list ACL-IPv4-E0/0-IN permitted tcp 192.168.1.3(1026) -> 192.168.2.1(80), 1 packet (DAILY DOUBLE)

What is 192.168.2.1 port 80?

500

An application and a protocol that is used to remotely log in to another computer using a secure tunnel.

What is SSH?(Secure Shell)

500

He said this: "Stay hungry. Stay foolish."

Who is Steve Jobs?