What are the four types of attacks?
Passive Online, Active Online, Offline Attacks, Non-Electric Attacks
What are the three A's in AAA security?
Authentication, Authorization, Auditing
LM hashes are more secure than NTLM hashes... (True or False)
False
What does EFS stand for?
Encrypting File System
What type of attack is defined by an attacker altering/relaying information in the packets between communication of two users?
Man-in-the-Middle Attack
What are the three fundamentals of security?
Confidentiality, Integrity, Availability
In Kerberos, what controls the access to getting tickets to server/network resources?
Key Distribution Cener (KDC)
Can your private key be deleted when using EFS encryption?
Yes
What are the three types of DNS queries?
Forward Lookup Brute Force, Reverse Lookup Brute Force, Zone Transfer
What are the three types of security policies?
Administrative, Physical, Technical
When a password is lost, which Database should you run against a password cracker?
SAM or Security Accounts Manager
Transport Layer Security Involves which 3 steps?
Peer Negotiation, Key Exchange, Symmetric Cipher Encryption
When using Kali to crack a password, what type of table is needed to be extracted and loaded in OPH Crack?
Rainbow
What are the five steps of MSF?
Envisioning, Planning, Developing, Stabilizing, Deploying
In RSA, what are the two factors that the authentication is based on?
PIN/Password, Authenticator
Who is the designated Recovery Agent in the domain?
Administrative Account
What are the six anatomical steps to an attack?
Reconnaissance, Deeper Reconnaissance, Plan, Implement, Consolidate, Cover Up Tracks
Which service allows authentication to be moved as a centralized location?
RADIUS or Remote Access Dial in User Service
What is the side effect of password salting?
Defeats pre-computed hash attacks.
How many bits are needed to encrypt the Network Security policies?
128 bits