IT Questions and Answers :)

Thursday, May 23, 2019

An often secret or hidden method of bypassing security mechanisms is known as a:

An often secret or hidden method of bypassing security mechanisms is known as a:

  • Backdoor
  • Trick door
  • Secret passage
  • Pass through 

An often secret or hidden method of bypassing security mechanisms is known as a:

EXPLANATION

A backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device, or its embodiment, e.g. as part of a cryptosystem, an algorithm, a chipset, or a "homunculus computer". Backdoors are often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems.



Share:

What kind of attack comes from many sources and overwhelms a server, making it unavailable?

What kind of attack comes from many sources and overwhelms a server, making it unavailable?

  • Man in the middle
  • DDoS
  • Identity spoofing
  • Watering hole 


EXPLANATION

A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.


$150 can buy a week-long DDoS attack on the black market. TrendMicro Research
 
More than 2000 daily DDoS Attacks are observed world-wide by Arbor Networks. ATLAS Threat Report
 
1/3 of all downtime incidents are attributed to DDoS attacks. Verisign/Merril Research

Building Capacity

Attackers build networks of infected computers, known as 'botnets', by spreading malicious software through emails, websites and social media. Once infected, these machines can be controlled remotely, without their owners' knowledge, and used like an army to launch an attack against any target. Some botnets are millions of machines strong. 
 

 

Share:

What type of software monitors networks or systems for malicious activities or policy violations?

What type of software monitors networks or systems for malicious activities or policy violations?

  • Anti-malware
  • Antivirus
  • Intrusion detection system
  • Home security system 
What type of software monitors networks or systems for malicious activities or policy violations?

EXPLANATION

Intrusion Detection Systems

 An intrusion detection system is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.

An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Any malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management system. A SIEM system combines outputs from multiple sources, and uses alarm filtering techniques to distinguish malicious activity from false alarms.

 

Share:

What technology is used to monitor and manage Windows servers?

What technology is used to monitor and manage Windows servers?

  • POP3
  • WMI
  • LMP
  • IMAP 
What technology is used to monitor and manage Windows servers?

EXPLANATION

 About WMI

Windows Management Instrumentation (WMI) is the Microsoft implementation of Web-Based Enterprise Management (WBEM), which is an industry initiative to develop a standard technology for accessing management information in an enterprise environment. WMI uses the Common Information Model (CIM) industry standard to represent systems, applications, networks, devices, and other managed components. CIM is developed and maintained by the Distributed Management Task Force (DMTF).
Note
The next-generation of WMI, known as the Windows Management Infrastructure (MI), is currently available. MI is fully compatible with previous versions of WMI, and provides a host of features and benefits that make designing and developing providers and clients easier than ever. For example, many newer providers are written using the MI framework, but can be accessed using WMI scripts and applications. For more information about the differences between the two technologies, see Why Use MI?

Managing Remote Computer Systems with WMI

The ability to obtain management data from remote computers is what makes WMI useful. Remote WMI connections are made through DCOM. An alternative is to use Windows Remote Management (WinRM), which obtains remote WMI management data using the WS-Management SOAP-based protocol.
Share:

What protocol is commonly used to connect to and monitor Linux servers?

What protocol is commonly used to connect to and monitor Linux servers?

  • SSH
  • SSL
  • SMS
  • PGP 

EXPLANATION

 SSH, or Secure Shell, is a protocol used to securely log onto remote systems. It is the most common way to access remote Linux and Unix-like servers. In this guide, we will discuss how to use SSH to connect to a remote system. Basic Syntax. The tool on Linux for connecting to a remote system using SSH is called, unsurprisingly, ssh.

Basic Syntax

The tool on Linux for connecting to a remote system using SSH is called, unsurprisingly, ssh.
The most basic form of the command is:
  • ssh remote_host
The remote_host in this example is the IP address or domain name that you are trying to connect to.
This command assumes that your username on the remote system is the same as your username on your local system.
If your username is different on the remote system, you can specify it by using this syntax:
  • ssh remote_username@remote_host
Once you have connected to the server, you will probably be asked to verify your identity by providing a password.
Later, we will cover how to generate keys to use instead of passwords.
To exit back into your local session, simply type:
  • exit
Share:

Which of these is NOT a core function of a mobile device management product?

Which of these is NOT a core function of a mobile device management product?

  • Authentication
  • Remote wipe of device
  • Device location
  • Anti-malware 
Which of these is NOT a core function of a mobile device management product?

EXPLANATION

 Anti-malware is any resource that protects computers and systems against malware, including viruses, spyware and other harmful programs. 

Anti-malware resources are comprehensive solutions that maintain computer security and protect sensitive data that is transmitted by a network or stored on local devices. Anti-malware tools often include multiple components, including anti-spyware and phishing tools, as well as antivirus solutions for prominent viruses, which are isolated and identified by security resources.

Anti-malware tools may employ scanning, strategies, freeware or licensed tools to detect rootkits, worms, Trojans and other types of potentially damaging software. Each type of malware resource carries its own interface and system requirements, which impact user solutions for a given device or system.
Share:

Which of the following would you use to allow your users to discuss information on their mobile devices without having to travel to secure locations?

Which of the following would you use to allow your users to discuss information on their mobile devices without having to travel to secure locations?

  • Remote wipe
  • Voice encryption
  • Passcode policy
  • GPS tracking 

Which of the following would you use to allow your users to discuss information on their mobile devices without having to travel to secure locations?


EXPLANATION

Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP.

The implementation of voice encryption dates back to World War II when secure communication was paramount to the US armed forces. During that time, noise was simply added to a voice signal to prevent enemies from listening to the conversations. Noise was added by playing a record of noise in synch with the voice signal and when the voice signal reached the receiver, the noise signal was subtracted out,
leaving the original voice signal. In order to subtract out the noise, the receiver need to have exactly the same noise signal and the noise records were only made in pairs; one for the transmitter and one for the receiver. Having only two copies of records made it impossible for the wrong receiver to decrypt the signal. To implement the system, the army contracted Bell Laboratories and they developed a system called SIGSALY. With SIGSALY, ten channels were used to sample the voice frequency spectrum from 250 Hz to 3 kHz and two channels were allocated to sample voice pitch and background hiss. In the time of SIGSALY, the transistor had not been developed and the digital sampling was done by circuits using the model 2051 Thyratron vacuum tube. Each SIGSALY terminal used 40 racks of equipment weighing 55 tons and filled a large room. This equipment included radio transmitters and receivers and large phonograph turntables. The voice was keyed to two 16-inch vinyl phonograph records that contained a Frequency Shift Keying (FSK) audio tone. The records were played on large precise turntables in synch with the voice transmission.
From the introduction of voice encryption to today, encryption techniques have evolved drastically. Digital technology has effectively replaced old analog methods of voice encryption and by using complex algorithms, voice encryption has become much more secure and efficient. One relatively modern voice encryption method is Sub-band coding. With Sub-band Coding, the voice signal is split into multiple frequency bands, using multiple bandpass filters that cover specific frequency ranges of interest. The output signals from the bandpass filters are then lowpass translated to reduce the bandwidth, which reduces the sampling rate. The lowpass signals are then quantized and encoded using special techniques like, Pulse Code Modulation (PCM). After the encoding stage, the signals are multiplexed and sent out along the communication network. When the signal reaches the receiver, the inverse operations are applied to the signal to get it back to its original state.[1] A speech scrambling system was developed at Bell Laboratories in the 1970s by Subhash Kak and Nikil Jayant.[2] In this system permutation matrices were used to scramble coded representations (such as Pulse Code Modulation and variants) of the speech data. Motorola developed a voice encryption system called Digital Voice Protection (DVP) as part of their first generation of voice encryption techniques. DVP uses a self-synchronizing encryption technique known as cipher feedback (CFB). The basic DVP algorithm is capable of 2.36 x 1021 different "keys" based on a key length of 32 bits."[3] The extremely high number of possible keys associated with the early DVP algorithm, makes the algorithm very robust and gives a high level of security. As with other symmetric keyed encryption systems, the encryption key is required to decrypt the signal with a special decryption algorithm.


Share:

Popular Posts