GIAC GFACT Exam Review Book 3 Questions And
Verified Answers 2024-2025
Authentication - The recipient can identify the origin of the message.
Integrity - Accuracy, reliability and completeness of answer systems; Proof the message
has not been modified since it was sent
Non-repudiation -The sender cannot deny sending the message
Encoding -Transformation of data into another form
Symmetric encryption-a type of encryption that is considered to be the simplest form
there is; the encryption key used to encrypt a message is the very same encryption key
that is required in order to decrypt the message.
Caesar Cipher-a form of encryption, named so because it was once utilized by the
ancient Romans, in which the letters of the alphabet would be shifted a certain number
of places.
AES (Advanced Encryption Standard) - Answer A strong symmetric block cipher,
encrypts data in 128-bit blocks. The keys used by AES can be 128 bits, 192 bits, or 256
bits long.
Asymmetric encryption - An answer to a relatively new advance in the encryption world.
In simplistic form, each party creates two encryption keys: one is private and one is
public.
public encryption key - Answer one you send to whoever needs to communicate with
you securely
private encryption key - Answer remain private only to you
, Hashing - Answer a form of one-way encryption. That means, once you encrypt some
data, you cannot reverse the process to go from the encrypted data back to the
plaintext
Types: MD5, SHA1, SHA2/3/256/512
Red Team-ONE: This is an offensive operation. They will be tasked with attempting to
breach a network for the purpose of testing the effectiveness of deployed security
controls or to identify vulnerabilities in a web application or other software.
Blue Team-ONE: The defenders will be tasked with setting up a secure network
infrastructure, monitoring and responding to an attack, and recovering from an attack.
Deep zone defense, on the other hand, was an idea where lines of defense were to be
prepared at numerous locations. In the event of an attack, defenders had to fall back
before the strong onslaughts and retreat to the defensive line already prepared and
force the enemy to destroy the landscaping enemy at each of the prepared positions
slowly took the steam out of an attack before it ever reached the most significant areas.
Confidentiality - Answer access to systems should be shared only amongst authorised
persons or organisations
Availability - Answer systems should be accessible when needed
Slingshot - Answer a distribution packaged by the SANS institute. It features a rich array
of security and testing tools, but without being so cumbersome that it would be difficult
to take it in to restricted environments
SIFT-the answer has a lot more forensic focus, and I would say, is simply the go-to tool
suite for forensics purposes.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Stetson. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.