100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
GIAC GFACT Exam Review Book 3 Questions And Verified Answers $10.99   Add to cart

Exam (elaborations)

GIAC GFACT Exam Review Book 3 Questions And Verified Answers

 4 views  0 purchase
  • Course
  • GIAC GFACT Book 3
  • Institution
  • GIAC GFACT Book 3

GIAC GFACT Exam Review Book 3 Questions And Verified Answers ...

Preview 2 out of 13  pages

  • October 31, 2024
  • 13
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • GIAC GFACT Book 3
  • GIAC GFACT Book 3
avatar-seller
Stetson
GIAC GFACT Exam Review Book 3 Questions And
Verified Answers 2024-2025


Authentication - The recipient can identify the origin of the message.

Integrity - Accuracy, reliability and completeness of answer systems; Proof the message
has not been modified since it was sent

Non-repudiation -The sender cannot deny sending the message

Encoding -Transformation of data into another form



Symmetric encryption-a type of encryption that is considered to be the simplest form
there is; the encryption key used to encrypt a message is the very same encryption key
that is required in order to decrypt the message.



Caesar Cipher-a form of encryption, named so because it was once utilized by the
ancient Romans, in which the letters of the alphabet would be shifted a certain number
of places.



AES (Advanced Encryption Standard) - Answer A strong symmetric block cipher,
encrypts data in 128-bit blocks. The keys used by AES can be 128 bits, 192 bits, or 256
bits long.



Asymmetric encryption - An answer to a relatively new advance in the encryption world.
In simplistic form, each party creates two encryption keys: one is private and one is
public.



public encryption key - Answer one you send to whoever needs to communicate with
you securely



private encryption key - Answer remain private only to you

, Hashing - Answer a form of one-way encryption. That means, once you encrypt some
data, you cannot reverse the process to go from the encrypted data back to the
plaintext



Types: MD5, SHA1, SHA2/3/256/512



Red Team-ONE: This is an offensive operation. They will be tasked with attempting to
breach a network for the purpose of testing the effectiveness of deployed security
controls or to identify vulnerabilities in a web application or other software.



Blue Team-ONE: The defenders will be tasked with setting up a secure network
infrastructure, monitoring and responding to an attack, and recovering from an attack.



Deep zone defense, on the other hand, was an idea where lines of defense were to be
prepared at numerous locations. In the event of an attack, defenders had to fall back
before the strong onslaughts and retreat to the defensive line already prepared and
force the enemy to destroy the landscaping enemy at each of the prepared positions
slowly took the steam out of an attack before it ever reached the most significant areas.



Confidentiality - Answer access to systems should be shared only amongst authorised
persons or organisations



Availability - Answer systems should be accessible when needed



Slingshot - Answer a distribution packaged by the SANS institute. It features a rich array
of security and testing tools, but without being so cumbersome that it would be difficult
to take it in to restricted environments



SIFT-the answer has a lot more forensic focus, and I would say, is simply the go-to tool
suite for forensics purposes.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Stetson. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79223 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart