Uses a challenge message during authentication?
-CHAP - Challenge Handshake Authentication Protocol
Which hashing algorithms are NOT secure?
Which hashing algorithms are NOT secure?
Which hashing algorithms are NOT secure?
* list not complete
Which hashing algorithms are NOT secure?
-RIPEMD-160 is secure, but other version maybe not good. SHA-2 is better
EV Certificate
EV Certificate
Extended Validation
-Additional checks have been made to validate site owner
tracerout
tracerout
AAA Framework
-Four phases, and what they need
AAA Framework
Data Steward/Custodian
-What are this role’s responsibilities
Data Steward/Custodian Handles routine tasks to protect data -ensure data backed up -ensure backups properly labeled and stored -Data owners delegate task to custodian
Data Owner
-What are this role’s responsibilities
Data Owner
ICS
ICS
Industrial Control System
-Dedicated network to manage and control manufacturing equipment, power generation equipment, etc
802.1X supports what types of authentication?
Which authentication mechanism does 802.1x usually rely upon?
Which authentication mechanism does 802.1x usually rely upon?
PKCS
PKCS
Public Key Cryptography Standard
-Asymmetric
-A digital signature algorithm
Data Wiping
Data Wiping
Degaussing
Degaussing
Data Purging
Data Purging
Behavior-Based Analysis
Behavior-Based Analysis
ECC
ECC
Elliptic Curve Cryptography
-Asymmetric
FTK Imager
-Open source or proprietary?
FTK Imager
dd
dd
Autopsy
-Open source or proprietary?
Autopsy
SAML
-Roles
SAML Roles
SHA-1 Output Length
SHA-1 Output Length
-160 bit
SHA-2 Output Length
SHA-2 Output Length
256 bit
NTLM Output Length
NTLM Output Length
-128 bit