Security Plus Cheat Sheet
82 questions across 0 topics. Use the find bar or section chips to jump to what you need.
21
FTP , DMZ
22
SSH
25
SMTP
49
TACACS
53
DNS
67&68
HTTP
110
POP3
143
IMAP4
161
SNMP
389&636
LDAP
443
HTTPS/SSL
UDP 1701
L2TP
TCP 1723
PPTP
CLASS A
1-27, 10.0.0.0 255.0.0.0
CLASS B
128-191, 172.16.0.0-172.31.0.0, 255.255.0.0, 65,00
CLASS C
192-223, 192.168.0.0, 255.255.255.0
SQL
actions, objects, users
ISAKMP
(internet security association and key management protocol)used to negotiate and provide authenticated keying material for security associations in a protected manner
SSL
the secure sockets layer protocol has two parts. First, the SSL Handshake protocol establishes the secure channel. Next, the SSL Application data protocol is used to exchange data over the channel. 6 steps in the handshaking process
X5.09
users public key, the CA distinguished name and the type of symmetric algorithm used for encryption
CHAP
exchange of hashed values
Certificates
used w/i a PKI for asymmetric key
token based
requires possession of token
Biometric
authentication
Key generation
a public key pair is created and held by the CA
Identity submission
the CA creates a certificate signed by its own digital certificate
Distribution
the CA publishes the generated certificate
Usage
the receiving entity is authorized to use the certificate only for its intended use
Renewal
If needed a new key pair can be generated and the cert renewed
Recovery
possible if a verifying key is compromised but the holder is still valid and trusted
smurf
Based on the icmp echo reply
Fraggle
smurf like attack based on UDP packets
Ping flood
repeated SYN requests w/o ack
Land
exploits TCP/IP stacks using spoofed SYNS
Teardrop
an attack using overlapping, fragmented UDP packets that cant be reassembled correctly
Bonk
an attack of port 53 using fragmented UDP packets w/ bogus reassembly information
Boink
bonk like attack but on multiple ports
Spoofing
process of making data look like it was from someone else
Man in the Middle
intercepting traffic between 2 systems and using a third system pretending to be one of the others
Mathematical attacks
key guessing, password guessing, brute force, dictionary attacks
Viruses
infect systems and spread copies of themselves
Trojan horse
disguise malicious code within apparently useful applications
Logic Bombs
trigger on a particular condition
worm
self replicating forms of other types of malicious code
java and active x control
automatically executes when sent via e-mail
Cryptography
scrambling information so it appears unreadable to the attackers
stenography
Hides the existence of data
encryption
changing original text into a secret message
Decryption
changing secret message back to original form
cleartext data
data stored or transmitted without encryption
Plaintext
data to be encrypted
ciphertext
data that has been encrypted
key
mathematical value entered into the algorithim to produce ciphertext
Hash Algorithims
process for creating a unique digital fingerprint for a set of data
HMAC (hashed messafe authentication code
uses secret key possessed by sender and receiver. receiver uses key to decrpy the hash
Common hash algorithims
MD, SHA, Whirlpool, RIPEMD, Password hashes
MD2
creates 128 bit hash
MD4
has flaws not widely accepted
MD5
creates 512 bits
SHA
more secure than MD
whirlpool
512 bit hash
RIPEMD
two different and parallel chains of computation
Password hashes
used by Microsoft Windows operating systems
Stream Cipher
takes a character and replaces it with a character. Substitution cipher
Homoalphabetic Substitution Cipher
Single plaintext character mapped to multiple cipher text character
Transposition cipher
rearranges letters without changing them
One-time pad
creates a truly random key to combine with the plaintext
Block cipher
works on entire block of plaintext at a time
Data Encryption standard (DES)
based on product originally designed in early 1970's. Adopted as a standard by U.S government
Triple Data Encryption Standard 3DES
Uses three rounds of encryption
AES (Advanced encryption standard)
symmetric cipher approved by NIST 2000 as replacement for DES
Rivest Cipher (RC)
Block cipher operating on 64-bit blocks with key lengths from 32-448 bits
Blowfish
available to everyone and freely distributed
Public key
known only to individual to whom it belongs
Private key
verifies the sender, prevents sender from disowning the message, Proves message integrity
Digital signature
MIT
RSA
users share one elliptic curve and one point on the curve. Uses less computing power, used for mobile and wireless devices
ECC (Elliptic curve cryptography)
exploits the properties of microscopic objects such as photons.
Quantam cryptography
uses lattice based cyptography
NTRUEncypt
used for files and e-mails on windows systems
PGP (pretty good privacy)
runs on windows, unix and linux
GNU privacy guard (gpg
cryptography scrambles a message so that it cannot be viewed
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials