Recent content by Trevor Chandler

  1. Trevor Chandler

    RSA Encryption

    RSA encryption is still part of the team roster, but it's getting on in age. What's the up-and-coming successor to this once-upon-a-time perennial all-star? If you do provide a response to this query, some evidence to support your input would be most appreciated. Opinions and feelings don't...
  2. Trevor Chandler

    ECDHE_ECDSA vs RSA

    Okay, here's my second question in this latest series: Question: Why is using ECDHE_ECDSA stronger than using RSA? A. ECDHE_ECDSA provides both data authenticity and confidentiality. B. ECDHE_ECDSA uses a pseudorandom function to generate the keying materials. C. If the server's...
  3. Trevor Chandler

    Malware on Windows system

    Mr. Butler, you're attempt to drop a lump of coal in my Christmas stocking will not succeed. You're too late - Santa was extremely kind to me :-) Now, because we're in the season of "Peace on Earth", I'm going to leave my lightsaber powered off. However, as sooooooooooon as the season is...
  4. Trevor Chandler

    PASSED XK0-005

    Five CompTIA certs in 2023 - Wow! That's a special achievement! Congratulations!!!!
  5. Trevor Chandler

    Malware on Windows system

    And the correct answer is: B. Because services run in the background and do not interact with the users
  6. Trevor Chandler

    Malware on Windows system

    Greg, you must be a disciple of Mr. Rick Butler! Providing a response, outside of choices that were listed is definitely something that Mr. Butler would do. Anyway, in addition to your response being incorrect, you've earned an additional week of detention for coloring outside the lines :)
  7. Trevor Chandler

    Malware on Windows system

    Question: Why is malware that runs as a Windows service more difficult for the average end user to detect? Choices: A. Because services run in the User mode B. Because services run in the background and do not interact with the users C. Because all services run automatically when the...
  8. Trevor Chandler

    Most "Effective" Cybersecurity Defense

    What do you think is the most effective Cybersecurity Defense? 1. MFA 2. Continuous Monitoring 3. Security Awareness Training 4. Encryption
  9. Trevor Chandler

    Phishing

    Wow! Insane numbers!!! It appears to me that the underground (aka hackers) know something that the rest of us don't.. I'm just sayin'!
  10. Trevor Chandler

    No link for Session 12 TTT Security+ TestOut

    If and when you receive it, would you mind sharing it. Thank you!
  11. Trevor Chandler

    InfoSec Quiz Question 4

    Which type of password attack makes use of extensive wordlists to hash and run against a captured password hash? A. Character B. Brute Force C. Rainbow Tables D. Dictionary
  12. Trevor Chandler

    InfoSec Quiz Question 3

    What is the command to launch METASPLOIT ? A. Msconsole B. Msfconsole C. Msadmin D. Msfadmin
  13. Trevor Chandler

    InfoSec Quiz Question - 2

    Which of the following refers to an attacker exploiting vulnerabilities before the vendor has a patch or mitigation for them? A. Day 1 attack B. Zero-day attack C. Exploit D. Category I attack Note: Consulting any additional resources constitutes a lack of integrity...
  14. Trevor Chandler

    InfoSec Quiz Question

    Thanks for your response Mark.
  15. Trevor Chandler

    InfoSec Quiz Question

    I'm going to report you to the authorities!!!!