Intro Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

What are golden rules for information security

Authentication, access control, and keeping records of activities

What is the ethics of responsible disclosure based on?

Educating both the software owner as well as the public

What does CIA stands for in the computer security context?

Confidentiality, Integrity, and Availability

TCP SYN Scanning is also known as

Half Open

When performing a network mapping for a company, what one seeks to discover?

IP addresses of gateways, routers, servers, and databases as well as network topology as well as their geo-locations

Removal and/or alteration of data, installing "backdoors", and hiding the tracks of attack activities is known as

Operational attacks

Here is how you can use the kill chain model for better security

Put counter measures in place to stop the progression of the kill chain

Discover network interconnection and configuration, and look for network vulnerabilities:

Reconnaissance

What are steps in the kill chain model

Reconnaissance, Network scanning, Weaponize, Delivery, Exploit, Installation, Command and Control, action on Objective

The port scanning technique is used to discover what ports?

TCP

The three way TCP handshake is established using which of the TCP scanning sessions?

TCP SYN

According the responsible disclosure

The owner of the system must acknowledge the security research who found the vulnerability when the vulnerability is fixed


Conjuntos de estudio relacionados

States of Matter 1.14: Phase Diagrams Wiva k12 Chemistry

View Set

Chapter 12. Nervous System III: Senses cancel save

View Set

Chapter 17 - Red Giants and Star Death

View Set

nursing terms Exam 1 specialties ch. 2

View Set

Spanish 2 - Lección 7 - Estructura 7.4

View Set

Chapter 3- Life Insurance Policies

View Set

Contemporary Marketing 18e Ch. 1,2,3,4,

View Set