SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Third Edition
Rate it:
21%
Flag icon
TCP is connection-oriented and establishes sessions with a three-way handshake.
23%
Flag icon
Switched Port Analyzer (SPAN), or the newer Remote SPAN (RSPAN) and Encapsulated RSPAN (ERSPAN).
23%
Flag icon
Secure Real-time Transport Protocol (SRTP), which provides confidentiality, message authentication, and replay protection for audio and video traffic, including VoIP.
24%
Flag icon
Cisco
24%
Flag icon
split tunnel
25%
Flag icon
Password Authentication Protocol (PAP)
25%
Flag icon
Challenge Handshake Authentication Protocol (CHAP) is more secure than PAP because the actual password is never sent over the wire.
25%
Flag icon
a nonce (a number used once) is combined with a shared secret known only to the client and the remote access server. The result of combining the nonce and the shared secret is then hashed with Message Digest 5 (MD5).
25%
Flag icon
A primary improvement of MS-CHAPv2 is mutual authentication.
26%
Flag icon
such as servers and networking infrastructure, and the vendor maintains the hardware.
26%
Flag icon
Electronic discovery (e-discovery) refers to any process that searches data with the goal of using it as evidence.
26%
Flag icon
A service level agreement (SLA) is an agreement between an organization and a vendor.
26%
Flag icon
Auditing
28%
Flag icon
Cracker   Someone who is proficient with computers and uses these skills to attack systems. A cracker does attack systems with malicious
28%
Flag icon
gray hats are individuals who have exceptional computer and networking skills, but they don’t use them for personal gain or with malicious intentions. However, their activities may cross ethical boundaries.
29%
Flag icon
Countermeasures are security controls that reduce risks.
29%
Flag icon
Data theft refers to any attack that allows the attacker to exfiltrate data from an internal network.
29%
Flag icon
In a SYN flood attack (also called a TCP SYN, TCP flood, and TCP half-open attack), the attacker floods a system with SYN packets but withholds the third packet in the TCP handshake process.
30%
Flag icon
Sniffers can work in either promiscuous mode or nonpromiscuous mode.
30%
Flag icon
In nonpromiscuous mode, the sniffer will capture only data sent directly to or from the computer’s IP address.
30%
Flag icon
Attackers often use a ping sweep (sometimes called a ping scan) as part of an reconnaissance attack to identify active IP addresses. A ping sweep uses ICMP to identify what systems are operational within a range of IP addresses. This is similar to sending a ping to a system and waiting for a response.
30%
Flag icon
A fingerprinting attack attempts to gather information on specific computers, such as what protocols are running on the system or what specific functions the server performs.
30%
Flag icon
a reconnaissance attack is a broad-based attack that attempts to identify systems on a network. For example, a ping sweep can identify computers based on their response to ping requests. A port scan on these computers provides more information on them.
31%
Flag icon
Firesheep
31%
Flag icon
DNS cache poisoning (sometimes called simply DNS poisoning) is an attack that attempts to redirect traffic away from legitimate servers.
31%
Flag icon
A smurf attack broadcasts ICMP ping packets to multiple computers on a network but spoofs the source address using the IP address of the attacked system. An ICMP packet normally includes the IP address of the sender in the source IP address field. However, by replacing the IP address with the victim’s IP address, the ICMP packet appears to come from the victim’s computer. By broadcasting the ping, all systems on the subnet receive the echo and respond by flooding the attacked system with echo replies.
31%
Flag icon
Input validation checks data before using it within the application. The goal is to verify that the data is valid and ensure that an application does not use invalid data. This prevents potential problems within the application and helps prevent attacks.
31%
Flag icon
Input validation doesn’t verify the accuracy of the data. Instead, it only determines if it is valid.
31%
Flag icon
Sandboxing runs computer programs in isolated areas of memory as a security control.
31%
Flag icon
no operation (NOOP)
31%
Flag icon
A buffer overflow problem starts as a programming error.
32%
Flag icon
Database developers also use stored procedures instead of dynamic SQL statements.
32%
Flag icon
RainbowCrack
33%
Flag icon
A spear phishing attack targets a specific organization or group.
33%
Flag icon
In a whaling attack, the attacker attempts to identify an executive such as a chief executive officer (CEO), president, vice president, or manager.
33%
Flag icon
Smishing is another variation of a phishing attack, but it uses text messages such as Short Message Service (SMS) messages commonly used with many smartphones.
33%
Flag icon
Wi-Fi Protected Access 2 (WPA2) provides strong protection against attacks. WPA2-Enterprise uses an 802.1x authentication server and is more secure
34%
Flag icon
MAC spoofing,
34%
Flag icon
Do not install software from the public wireless network.
34%
Flag icon
Wardriving is the practice of looking for wireless networks, typically from a car.
34%
Flag icon
WPA2-Enterprise
34%
Flag icon
WPA handshake.
34%
Flag icon
Pretexting is the practice of using gathered information to create another scenario and collect additional information.
34%
Flag icon
black hats
34%
Flag icon
A botnet is a group of computers (called zombies) controlled by an attacker through a command and control center.
34%
Flag icon
Reconnaissance attacks (such as ping sweeps) attempt to discover active IP addresses on a network.
35%
Flag icon
Man-in-the-middle (MITM) attacks capture traffic sent between two systems, typically with a sniffer or protocol analyzer.
37%
Flag icon
A Trojan horse is an application that looks like it’s one thing but is actually something different. It presents itself as a useful or legitimate program, but includes a malicious component.
37%
Flag icon
A remote access Trojan or remote access tool (RAT) provides an attacker with control over a target computer via the Internet. Many Trojans install RATs, and then attackers can use the RAT to do anything on the target computer. This includes using the RAT to install malware, install keyloggers, and join the compromised computer to a botnet.
37%
Flag icon
Software-based keyloggers are more common. They simply run as an additional piece of software when the computer starts.