CIA - CORRECT ANSWERS Confidentiality
Integrity
Authentication
DH (Diffie-Hellman) - CORRECT ANSWERS An asymmetric encryption
algorithm used to create a symmetric key pair.
DH group
(group 1 = 768 bits, group 2 = 1024 bits) - CORRECT ANSWERS Defines the
length of the key (modulus size) to use for the DH key exchange.
Asset - CORRECT ANSWERS An _____ is an item that is to be protected and
can include property, people, and information/data that have value to the company.
This includes intangible items such as proprietary information or trade secrets and
the reputation of the company. The data could include company records, client
information, proprietary software, and so on.
Vulnerability - CORRECT ANSWERS A __________ is an exploitable weakness
of some type. That exploitation might result from a malicious attack, or it might be
accidentally triggered because of a failure or weakness in the policy,
implementation, or software running on the network.
Threat - CORRECT ANSWERS This is what you are protecting against. A
______ is anything that attempts to gain unauthorized access to, compromise,
destroy, or damage an asset. ______ are often realized via an attack or exploit that
takes advantage of an existing vulnerability.
, CCNA Security 210-260 Questions and Answers
2024 with complete solution(Graded A+)
Today they come in many varieties and spread more rapidly than ever before. They
can also morph and be modified over time, and so you must be ever diligent to keep
up with them.
Risk - CORRECT ANSWERS ______ is the potential for unauthorized access to,
compromise, destruction, or damage to an asset. If a threat exists, but proper
countermeasures and protections are in place (it is your goal to provide this
protection), the potential for the threat to be successful is reduced.
Countermeasure - CORRECT ANSWERS A ______________ is a device or
process (a safeguard) that is implemented to counteract a potential threat, which
thus reduces risk.
Covert channel - CORRECT ANSWERS This method uses programs or
communications in unintended ways. For example, if the security policy says that
web traffic is allowed but peer-to-peer messaging is not, users can attempt to
tunnel their peer-to-peer traffic inside of HTTP traffic. An attacker may use a similar
technique to hide traffic by tunneling it inside of some other allowed protocol to
avoid detection. An example of this is a backdoor application collecting keystroke
information from the workstation and then slowly sending it out disguised as
Internet Control Message Protocol (ICMP). This is a _____________.
Trust exploitation - CORRECT ANSWERS If the firewall has three interfaces,
and the outside interface allows all traffic to the demilitarized zone (DMZ) but not to
the inside network, and the DMZ allows access to the inside network from the DMZ,
an attacker could leverage that by gaining access to the DMZ and using that
location to launch his attacks from there to the inside network. Other trust models,
if incorrectly configured, may allow unintentional access to an attacker including
active directory and NFS (Network File System in UNIX).
Brute-force (password guessing) attacks
Password-guessing attacks can also be done through malware, man-in-the-middle
attacks using packet sniffers, or by using key loggers. - CORRECT ANSWERS
____________ types of attacks are performed when an attacker's system attempts
thousands of possible passwords looking for the right match. This is best protected
against by specifying limits on how many unsuccessful authentication attempts can
occur within a specified time frame.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller NURSINGGRADER2012. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.19. You're not tied to anything after your purchase.