100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU - C178 CompTIA Security+ Web Application Exam Questions and Answers 2024/2025 $11.49   Add to cart

Exam (elaborations)

WGU - C178 CompTIA Security+ Web Application Exam Questions and Answers 2024/2025

 3 views  0 purchase
  • Course
  • WGU 178 CompTIA Security
  • Institution
  • WGU 178 CompTIA Security

WGU - C178 CompTIA Security+ Web Application Exam Questions and Answers 2024/2025 Anomaly-based monitoring - correct answer Also known as statistical anomaly based; establishes a performance baseline based on a set of normal network traffic evaluations. Signature-based monitoring - correct an...

[Show more]

Preview 2 out of 10  pages

  • August 29, 2024
  • 10
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU 178 CompTIA Security
  • WGU 178 CompTIA Security
avatar-seller
KieranKent55
WGU - C178 CompTIA Security+ Web
Application Exam Questions and Answers
2024/2025

Anomaly-based monitoring - correct answer Also known as statistical anomaly based;
establishes a performance baseline based on a set of normal network traffic
evaluations.


Signature-based monitoring - correct answer Frames and packets of network traffic are
analyzed for predetermined attack patterns. These attack patterns are known as
signatures.


Behavior-based monitoring - correct answer A monitoring system that looks at the
previous behavior of applications, executables, and/or the operating system and
compares that to current activity on the system.


Simple Network Management Protocol (SNMP) - correct answer A TCP/IP protocol that
monitors network-attached devices and computers. It's usually incorporated as part of a
network management system. Application layer protocol UDP port 161/162


Cipher - correct answer An algorithm used to encrypt and decrypt text.


Cryptography - correct answer The study and use of techniques for securing
communication or hiding information


Algorithms - correct answer Well defined instructions that describe computations from
their initial state to their final state


Steganography - correct answer the art and science of hiding information by
embedding messages within other, seemingly harmless messages. It is a form of
security through obscurity

, Advanced Encryption Standard (AES) - correct answer A symmetric key encryption
standard, used with WPA and WPA2, that is the successor to DES/3DES and is
composed of three different block ciphers: 128, 192, 256


Blowfish - correct answer A 64-bit block cipher designed by Bruce Schneier as an
alternative to DES


Twofish - correct answer A 128-bit block cipher designed by Bruce Schneier and based
on Feistal


RSA (Rivest, Shamir, Adleman) - correct answer A public key cryptography algorithm. It
is commonly used in e-commerce


One-time pad (OTP) - correct answer A cipher that encrypts plaintext with a secret
random key that is the same length as the plaintext


Pretty Good Privacy (PGP) - correct answer An encryption program used primarily for
signing, encrypting, and decrypting e-mails in an attempt to increase the security of e-
mail communications.


GNU Privacy Guard (GPG) - correct answer An open-source version of PGP, used for
encrypting and decrypting e-mail messages, that does not use patented algorithms.


Pseudorandom number generator (PRNG) - correct answer Used by cryptographic
applications that require unpredictable output. Example: SHA2 PRNG. Threat: random
number generator attack. Prevention: additional randomness, AES, SHA256 or higher
and physical control of the system


Pass the hash - correct answer An attack where the password hashes are obtained
from a server and reused in an attempt to trick the server's authentication system


Birthday attack - correct answer An attack on a hashing system that attempts to send
two different messages with the same hash function, causing a collision

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73314 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.49
  • (0)
  Add to cart