More on this book
Community
Kindle Notes & Highlights
Started reading
June 27, 2019
tracert command lists the routers between two systems. In this context, each router is referred to as a hop. Tracert identifies the IP address and sometimes the host name of each hop in addition to the round-trip times (RTTs) for each hop.
Windows-based systems use tracert and Linux-based systems use traceroute, but they both function similarly.
Arp is a command-line tool that is related to the Address Resolution Protocol (ARP); however, arp (the command) and ARP (the protocol) are not the same thing.
You can also use arp to identify the MAC address of other systems on your local network.
B. Encrypt it before sending.
B. Supporting integrity
A. To support steganography
D. To support obfuscation
D. Supporting non-repudiation
C. Ensure systems are not susceptible to unauthorized changes.
B. Cable locks
A. Most physical servers within the organization are currently utilized at close to 100 percent.
D. Most physical servers within the organization are currently underutilized.
A. Take a snapshot of the VM before deploying the new application.
A. ifconfig
C. netstat
C. VM sprawl
D. Type II hypervisor
A. VDE
C. Non-persistence
A. Container virtualization
A. arp
D. netstat
D. ping
identification occurs when users claim (or profess) their identity with identifiers such as usernames or email addresses.
authentication, such as with a password.
Marge knows her username and password, and an authenticating server knows her username and password. Marge presents her credentials to the authenticating server, and the server authenticates her.
Services, processes, workstations, servers, and network devices all use authentication to prove their identities.
Authentication, authorization, and accounting (AAA) work together with identification to provide a comprehensive access management system.
authorization to access resources based on their proven identity. This can be as simple as granting a user permission to read data in a shared folder.
Accounting methods track user activity and record the activity in logs.
audit trail allows security professionals to re-create the events that preceded a security incident.
something you know authentication factor typically refers to a shared secret, such as a password or even a PIN.
Although this looks like a high number of possibilities, there are password-cracking tools that can test more than 20 billion passwords per second on desktop computers with a high-end graphics processor.

