Shared Flashcard Set

Details

Security+
Based on practice exams for CompTIA Security+ SY0-601
267
Computer Networking
Not Applicable
08/15/2022

Additional Computer Networking Flashcards

 


 

Cards

Term
XMAS tree attack
Definition
a packet that turns on the urgent, push, and fin flags

Can be used as a DoS attack.
Term
Smurf attack
Definition

[image]

 

Uses a single ping with a spoofed source address sent to a broadcast address. This causes every device to reply to the spoofed source address, causing a DoS attack. 

Term
RIPEMD
Definition
Hash function based upon the Merkle-Damgard construction

160-bit fixed output
Term
SHA-1 vs SHA-2 bit output
Definition
SHA-1 creates a 160-bit fixed output

SHA-2 creates a 256-bit fixed output
Term
MD-5
Definition
Message Digest 5

128-bit hash value
Term
UEFI
Definition
Unified Extensible Firmware Interface

Newer kind of BIOS

Contains a pre-boot environment with its own shell, drivers, and applications (not an OS)
Term
MAC
Definition
Mandatory Access Control

Define security clearance levels and associate every object in the organization to a specific level

Defined by admins
Term
DAC
Definition
Discretionary Access Control

Owners control access. Common in most OS.
Term
RBAC
Definition
Role Based Access Control

Admins define roles
Term
ABAC
Definition
Attribute-based access control

Grants access based on a set of admin define parameters (IP address, time of day, desired action, relationship to data, etc)
Term
ISA
Definition
Interconnection Security Agreement

Defines security controls between a federal agency and external system
Term
BPA
Definition
Business Partners Agreement

Between manufacturers and resellers
Term
SLA
Definition
Service Level Agreement

Terms of provided services (uptime, response time, etc.)
Term
MOU
Definition
Memorandum of understanding

Legal basis for protecting information assets
Term
Diamond Model of Intrusion Analysis
Definition

Illustrates that an "adversary" uses a "capability" over an "infrastructure" against a "victim"

 

[image]

Term
Lockheed Martin cyber kill chain
Definition
[image]
Term
OpenIOC
Definition

Open Indicators of Compromise

 

An open framework meant for sharing threat intelligence information in a machine-readable format.

Term
MITRE ATT&CK framework
Definition
Globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
Term
LDAP
Definition
Lightweight directory access protocol

Used for communication between applications and directory services servers

389
Term
IMAP
Definition
Internet Message Access Protocol

Internet protocol that lets you sync your email inbox across multiple devices.

993 (over SSL)
Term
MySQL
Definition
Database management system

3306
Term
Defense in depth
Definition
Concept of layering various network appliances and configurations to create a more secure and defensible architecture
Term
UTM
Definition
Unified Threat Management

A single piece of hardware or software that provides multiple security functions
Term
Hypervisor
Definition
Process that creates and runs VMs
Term
RSA
Definition
Rivest, Shamir, Adelman

Old (1977)

Public key cryptography (encrypt, decrypt, digital signatures)
Term
PGP
Definition
Pretty Good Privacy

Asymmetric encryption
Term
ECC
Definition
Elliptic-curve cryptography

Allows for smaller public-keys to provide the same amount of security
Term
Blowfish
Definition
Symmetric-key block cipher
Term
Diffie-Hellman
Definition
Asymmetric cryptographic method that's used to decide on a symmetric key between 2 devices

Used for Perfect Forward Secrecy
Term
Cloud solutions graphic
Definition
[image]
Term
password spraying
Definition
brute force attack using a large number of usernames and one password
Term
PCI-DSS
Definition
Payment Card Industry Data Security Standard
Term
PHI
Definition
Protected health information
Term
GDPR
Definition
General Data Protection Regulation

regulation created in the European Union that creates provisions and requirements to protect the personal data of European Union (EU) citizens
Term
PII
Definition
Personally identifiable information
Term
NAC
Definition
Network Access Control

Unifies endpoint security technology (such as anti-virus, host intrusion prevention, and vulnerability assessment), user/system authentication, and network security enforcement.

NACs wills can new devices in a sandbox environment before allowing them onto the network.
Term
SPF
Definition

Sender Policy Framework 

 

email authentication protocol and part of email cybersecurity used to stop phishing attacks

 

It allows your company to specify who is allowed to send email on behalf of your domain.

Term
DSUA
Definition
Data Sharing and Use Agreement

States that personal data can only be collected for a specific purpose
Term
AES
Definition
Advanced Encryption Standard

Symmetric

Very popular
Term
3DES
Definition
Triple Data Encryption Standard

Symmetric algorithm using 3 keys
- 1st key encrypts
- 2nd key decrypts
- 3rd key encrypts

Replaced by AES
Term
MTTR
Definition
Mean Time To Repair
Term
RPO
Definition
Recovery Point Objectives

(Think: how far back in time is the backup that I want to be able to restore from?)
Term
MTBF
Definition
Mean Time Between Failures
Term
RTO
Definition
Recovery Time Objectives
Term
MTTD
Definition
Mean Time To Detect

Average time it takes to discover a security incident
Term
Difference between full, incremental, and differential backups
Definition
[image]
Term
PCI
Definition
Peripheral Component Interconnect

Bus used to provide low-speed connectivity to expansion cards.

Mostly replaced by the faster PCIe bus.
Term
Cain and Abel
Definition
Popular password cracking tool
Term
Nessus
Definition
Vulnerability scanner
Term
netcat
Definition
used to create reverse shells for remote access
Term
reverse shell
Definition
allows attackers to bypass network security mechanisms like firewalls

Basically the attacker initiates an outgoing connecter to themselves from the victim's computer for command and control
Term
wildcard certificate
Definition
public key certificate that can be used with multiple subdomains of a domain

ex: *.skykick.com
Term
WEP
Definition
Wired Equivalent Privacy

Security algorithm for 802.11 wireless networks

Obsolete
Term
reverse proxy
Definition
positioned at cloud network edge and lets proper traffic in

listens to the outside internet
Term
permissions propogation
Definition
assigning permissions to the top of a folder tree, which then automatically assigns every folder in the tree underneath to inherit the same permissions
Term
L2TP
Definition
Layer 2 Tunneling Protocol

1701
Term
kerberos
Definition
88

network authentication protocol that allows for communication over a non-secure network
Term
active vs. passive scanning
Definition
passive: gathering open-source or publicly available information

active: direct probing
Term
CYOD
Definition
User chooses from list of approved devices chosen by the company
Term
COPE
Definition
Company-Owned / Personally Enabled

company provides the device and places some restrictions on functionality
Term
FTP
Definition
File Transfer Protocol

21 control port
20 used to transfer files
Term
SSH
Definition
Secure Shell

22

Designed to transmit data through a remote connection
Term
TACACS+
Definition

Terminal Access Controller Access Control System

 

Cisco proprietary protocol used for AAA services

 

49

Term
DNS
Definition
Domain Name System

Used to associate IP addresses with domain names

53
Term
DHCP
Definition
Dynamic Host Configuration Protocol

67/68
Term
HTTP
Definition
Hypertext Transfer Protocol

80
Term
POP
Definition
Post Office Protocol

E-mail protocol that allows e-mail clients to communicate with e-mail servers

Only one-way communication

110
Term
IMAP
Definition
Internet Message Access Protocol

E-mail protocol used by e-mail clients to communicate with e-mail servers

2 way communication

143, 993
Term
SNMP
Definition
Simple Network Management Protocol

Protocol used to monitor and manage network devices on IP networks

161/162
Term
LDAP
Definition
Lightweight Directory Access Protocol

Used to manage and communicate with directories

389
Term
LDAPS
Definition
Lightweight Directory Access Protocol Secure

Secure version of LDAP that uses TLS for encryption

Mutual authentication between client and server.

636, 3269
Term
FTPS
Definition
File Transfer Protocol Secure

can run on ports 20/21 or 989/990
Term
IMAPS
Definition
Internet Message Access Protocol Secure

993
Term
POP3S
Definition
995
Term
RADIUS
Definition
Remote Authentication Dial-In User Service

used to provide AAA for network services

1812,1813
Term
Diameter
Definition
developed as an upgrade to RADIUS

3868
Term
SRTP
Definition
Secure Real Time Protocol

replaced RTP and is a protocol used to stream audio and video communication using UDP

5004
Term
L2TP
Definition
Layer 2 Tunneling Protocol

Used to create point to point connections, like VPNs over a UDP connection.

1701
Term
TCP
Definition
Transmission Control Protocol

Provides error checking
Term
UDP
Definition
User Datagram Protocol

fire and forget
Term
PPTP
Definition
Point to Point Tunneling Protocol

Deprecated protocol for VPNs

1723
Term
EAP
Definition
Extensible Authentication Protocol

framework that allows for numerous different mechanisms of authentication, including things like simple passwords, digital certificates, and public key infrastructure
Term
MS-CHAP v2
Definition
Microsoft Challenge Handshake Authentication Protocol version 2

Password based authentication protocol that is widely used as an authentication method in PPTP-based VPNs

Can be used with EAP
Term
Diffie-Hellman (DH)
Definition
used to exchange cryptographic keys over a public channel securely

Asymmetric (public key)
Term
CRC
Definition
Cyclic Redundancy Check

error-detecting code used in storage devices to detect accidental changes in raw data

blocks of data get a short check value attached based on the remainder of their contents' polynomial division
Term
EDM
Definition
Exact Data Match

Pattern matching technique

ex: find SSNs using xxx-xx-xxxx
Term
XSS
Definition
Cross-Site Scripting

injection of malicious scripts into trusted websites, and using the web app to send these scripts to a different end-user
Term
MSSP
Definition
Managed Security Service Provider

Security as a service
Term
pharming
Definition
redirect traffic from legitimate website to a bogus website (usually combined with phishing)

ex: redirect facebook.com to a malicious site that has the same login page and phish peoples' login creds
Term
LDAP injection
Definition
code injection on web apps to reveal sensitive data or modify data
Term
FERPA
Definition
The Family Educational Rights and Privacy Act

Protects the privacy of student educational records
Term
GLBA
Definition
Gramm-Leach-Bliley Act

Protects the privacy of individual financial information.
Term
SOX
Definition
Sarbanes-Oxley Act

Dictates requirements for storing and retaining an organization's financial and business documents.

Must be publicly-traded with a market value of at least 75M.
Term
HIPAA
Definition
Health Insurance Portability and Accountability Act

rules and regulations around medical records
Term
swap file
Definition
temporary files on a hard disk used as virtual memory
Term
Metasploit
Definition
pen testing tool
Term
CUI
Definition
Controlled Unclassified Information

Federal non-classified information that must be protected with a set of regulations
Term
yellow team
Definition
creates tools and environments for exercises to be performed
Term
banner grabbing tools
Definition
telnet
netcat
Term
cryptographic erase
Definition
the hard drive is encrypted by default, and the key is destroyed during the erasing operation
Term
one-time-use pad
Definition
a system in which a randomly generated private key is used only once to encrypt a message that is then decrypted by the receiver using a matching one-time pad and key
Term
Ptunnel
Definition
An application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets (ping request and replies).
Term
Hping
Definition
Sends custom ICMP, UDP, or TCP packets and displays any replies.

Handy when trying to probe hosts behind a firewall.
Term
Broadcast ping
Definition
Pinging the subnet's broadcast IP.
Term
Traceroute
Definition
Uses ICMP
Term
Nping
Definition
Like Hping but supports IPv6
Term
purging
Definition
eliminating hard drive info
ex: cryptographic erasure
Term
Information Assurance (IA)
Definition
managing risks related to the handling of data
Term
CRL
Definition
Certificate Revocation List

a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their actual or assigned expiration date
Term
private IP address spaces
Definition
10.x.x.x
172.16-31.x.x
192.168.x.x
Term
Heuristic analysis
Definition
Method of detecting unknown new viruses or modified old viruses.
Term
DSA
Definition
Digital Signature Algorithm

Asymmetric algorithm
Term
RC4
Definition
stream cipher
Term
syslog
Definition
the Syslog server is a centralized log management solution
Term
TPM
Definition
Trusted Platform Module

A secure cyrptoprocessor that is attached to the motherboard. Protects computer data through encryption/decryption.
Term
PAM
Definition
Pluggable Authentication Module

looks like a USB; used as a software key
Term
FDE
Definition
Full Disk Encryption
Term
FISMA
Definition
Federal Information Security Management Act

US law to protect government info against threats
Term
COPPA
Definition
Children's Online Privacy Protection Act

US law that defines regulations around collecting data on children under 13
Term
OAuth
Definition
Facilitates the sharing of information within a user profile between sites
Term
OIDC
Definition
Open ID Connect

Authentication protocol that can be implemented as special types of OAuth flows with precisely defined token fields
Term
ADFS
Definition
Active Directory Federation Services

From Microsoft; provides SSO access to users
Term
SAML
Definition
Security Assertion Markup Language

Open standard for exchanging authentication and authorization data between parties
Term
SLE
Definition
Single Loss Expectancy
Term
AV
Definition
Asset Value
Term
EF
Definition
Exposure Factor
Term
RF
Definition
Risk factor
Term
ARO
Definition
Annual Rate of Occurrence
Term
ALE
Definition
Annual Loss Expectancy
Term
Aircrack-ng
Definition
Complete suite of wireless exploitation tools
Term
John the Ripper
Definition
Password cracking tool
Term
net use (command)
Definition
used to connect to shared resources (i.e. network printers)
Term
telnet
Definition
23

Not secure; sends all data in cleartext
Term
key escrow
Definition
method of sorting cryptographic keys
Term
order of volatility (forensics)
Definition
1. CPU, cache, and register contents
2. routing tables, ARP caches, process tables, kernel statistics
3. live network connections and data flows
4. RAM
5. temporary file system / swap space
6. data on hard disk
7. remotely logged data
8. data stored on archival media / backups
Term
CRLF injection
Definition
Injecting a Carriage Return / Line Feed character (\r or \n)
Term
TFTP
Definition
Trivial File Transfer Protocol

69
Term
Data owner responsibilities
Definition
Integrity, confidentiality, availability, and privacy

Directs data stewards and data custodians
Term
Data steward
Definition
responsible for data quality
Term
data custodian
Definition
Managing the system on which the data assets are stored
Term
privacy officer
Definition
responsible for oversight of PII/SPI/PHI assets
Term
polymorphic virus
Definition
alters its binary code to change its signature and avoid detection by antimalware scanners
Term
IR
Definition
Infrared

Require a direct line of sight
Term
RAID
Definition
Redundant Array of Independent Disks
Term
RAID 0
Definition
Data is striped across multiple disks
Term
RAID 1
Definition
Data is mirrored
Term
RAID 5
Definition
Data is striped across multiple disks along with parity

Parity is used to rebuild the drives if there is a disk failure
Term
RAID 10
Definition
Minimum of 4 disks

Striped and mirrored
Term
transference
Definition
when an organization decides to deflect a risk to another organization
Term
data controller
Definition
determines the purposes and means by which personal data is processed
Term
DaaS
Definition
Desktop as a Service

Virtualized desktop environment from within a cloud-based service

Also known as VDI
Term
Rogue anti-virus
Definition
Fraud claiming that there is malware on computer and that the user must buy their fake malware removal tool (which is actually malware)
Term
WPA
Definition
Wi-Fi protected access
Term
How to find buffer overflows
Definition
Static code analysis tools
Term
XML vs SQL
Definition
SQL is a lot more loose on syntax
Term
XML
Definition
Extensible Markup Language
Term
control categories
Definition
managerial
operational
technical
Term
managerial control
Definition
based on overall risk management
Term
operational control
Definition
people-executed procedures
Term
technical control
Definition
automated technoligies
Term
control types
Definition
preventative
detective
corrective
deterrent
compensating
physical
Term
corrective control
Definition
used after the event to minimize the extent of the damage

i.e. backups
Term
compensating control
Definition
used when there is no way to directly address the threat

i.e. fire suppression systems
Term
FM-200
Definition
fire extinguishing system used in data centers and server rooms
Term
credential stuffing
Definition
brute force attack where large numbers of leaked credentials are entered into websites until they are matched to an existing account
Term
retinal scan
Definition
infrared shines into the eye to identify the pattern of blood vessels
Term
SP
Definition
Service Provider
Term
IdP
Definition
Identity Provider
Term
RP
Definition
Relying Party

Provide services to members of a federation
Term
How does SAML provide SSO?
Definition
Allows the SP to establish a trust relationship with an IdP so the SP can trust the user without the user needing to authenticate with the SP. The User Agent (browser of user) requests a resource from the SP or RP (resource host). If the user agent does not already have a valid session, the SP redirects the user agent to the IdP, which requests the user's creds. If correct, the IdP sends verification to the SP and the SP establishes a session for the user and provides them with access to the resource.
Term
proprietary breach
Definition
trade secrets
Term
integrity breach
Definition
data is modified or altered
Term
User acceptance testing
Definition
process of verifying that a created solution/software works for the user
Term
security regression testing
Definition
ensures that changes made to a system do not harm its security
Term
EIGRP
Definition
Enhanced Interior Gateway Routing Protocol

routing protocol
Term
BGP
Definition
Border Gateway Protocol

routing protocol
Term
SOAR
Definition
Security Orchestration, Automation, and Response

Uses runbooks
Term
uncredentialled scan
Definition
do not require credentials and do not get trusted access to the systems they are scanning

miss most vulnerabilities
Term
FTK Imager
Definition
creates perfect copies or forensic images of computer data without making changes to the original evidence

proprietary
Term
dd
Definition
open-source tool used to create forensic images
Term
memdump
Definition
used to collect RAM content
Term
Autopsy
Definition
cross-platform, open-source forensic tool suite
Term
purging
Definition
eliminates data from being feasibly recovered, even in a lab environment

i.e. CE, degaussing
Term
degaussing
Definition
destroys the data on a HDD by eliminating the magnetic field

does not destroy the drive

does not work on an SSD
Term
Header manipulation
Definition
inserting malicious data into an HTTP response header
Term
separation of duties
Definition
more than one person is required to complete a task
Term
CSR
Definition
Certificate Signing Request

Submitted to a CA to request a digital certificate
Term
OCSP
Definition
Online Certificate Status Protocol

used to obtain the revocation status of a digital certificate
Term
PAP
Definition
Password Authentication Protocol

does not encrypt the data and sends the password and username to the authentication server as plain text
Term
net flow
Definition
shows where communications occurred, by what protocol, to which devices, and how much content was sent
Term
VPN concentrator
Definition
provides the secure creation of VPN connections and the delivery of messages between VPN nodes
Term
SPI
Definition
Sensitive Personal Information

opinions, beliefs, and nature of a person
Term
SMTP
Definition
Simple Mail Transfer Protocol

25, 465
Term
golden ticket
Definition
a Kerberos ticket that can grant other tickets in an AD environment

attackers can create golden tickets to grant admin access to other domain members
Term
pivoting
Definition
compromise one central host (the pivot) that allows the attacker to spread to other hosts that would otherwise be inaccessible
Term
UEBA
Definition
User and Entity Behavior Analytics

system that detects suspicious activity from user accounts and computer hosts
Term
dereferencing
Definition
making the application point to a null point in memory (crashes the app)
Term
SOW
Definition
Statement of Work

What will and will not be performed during a pen test
Term
MSA
Definition
Master Service Agreement

Defines terms of future transactions between two parties.
Term
NTLM
Definition
Network Technology LAN Manager

SSO tool from Microsoft

128-bit fixed output
Term
COSO
Definition
Committee of Sponsoring Organizations of the Treadway Commission

Guides governance-related topics
Term
data minimization
Definition
limiting data collection to only what is required to fulfill a specific purpose
Term
What is required for evidence to be admissible in a court of law?
Definition
A chain of custody
Term
Anomaly detection
Definition
Used in environments that enable you to set rules.
Term
hybrid attack
Definition
combining dictionary and brute force methods

ex: using passwords from a dictionary and adding numbers to the end (000, 001, ...)
Term
secure erase
Definition
used to sanitize flash-based devices (SSD and USBs) when CE is not available
Term
HOTP
Definition
HMAC-based One-time Password Algorithm

Algorithm for token-based authentication. The auth server and client token are configured with the same shared secret.
Term
HMAC
Definition
Hash based Message Authentication Code
Term
smart card
Definition
PIV/CAC

Inserted into the smart card reader, then the PIN unlocks the card and allows the digital certificate to be presented to the system.
Term
AlienVault (AT&T Cybersecurity) Cyber Kill Chain
Definition
Specifically designed to avoid the rigidity of the Lockheed Martin cyber kill chain
Term
bluejacking
Definition
sending unsolicited messages over Bluetooth
Term
bluesnarfing
Definition
unauthorized access of information from a wireless device through a Bluetooth connection
Term
IV attack
Definition
Initialization Vector attack

An attack on wireless networks
Term
ICS SCADA
Definition
Command and control networks and systems designed to support industrial processes
Term
Proximity card
Definition
contactless card that utilizes RFID
Term
TOTP
Definition
Time-based one-time password
Term
Risk appetite
Definition
Willingness to tolerate risk
Term
Incident response process
Definition
1. preparation
2. detection and analysis
3. containment, eradication, and recovery
4. post-incident activity
Term
armored virus
Definition
virus that protects itself from being reverse engineered

ex: changes its code during execution and encrypts its payloads
Term
MIB
Definition
Management Information Base

Database used for managing the entities in a communication network
Term
DRM
Definition
Digital Rights Management

Copyright protection technology for digital media
Term
DMCA
Definition
Digital Millennium Copyright Act

United States copyright law
Term
which auth protocol uses a shared secret?
Definition
RADIUS
Term
CSRF or XSRF
Definition
Cross-Site Request Forgery

Unauthorized commands are transmitted from a user that the web application trusts.
Term
Do Apache web servers run as an admin by default?
Definition
No. Apache web servers run as a limited user by default.
Term
Dual control
Definition
Requires both people to act together to accomplish some duty.
Term
nslookup
Definition
Display and troubleshoot DNS records
Term
netstat
Definition
display network statistics
Term
SCADA
Definition
Supervisory Control And Data Acquisition
Term
ICS
Definition
Industrial Control Systems
Term
BeEF
Definition
Browser Exploitation Framework

Pen testing tool that focuses on web browsers.
Term
Transitive trust
Definition
A trusts B, and B trusts C, therefore A trusts C
Term
Which access control provides the strongest level of protection?
Definition
MAC
Term
GPG
Definition
Related to PGP

Asymmetric
Term
DeepScan
Definition
Static code analysis tool
Term
fault injection
Definition
testing technique to understand how a system behaves when stressed in unusual ways
Term
bluesnarfing
Definition
theft of information through Bluetooth
Term
prepending
Definition
attaching to the beginning of data

used in URL phishing
Term
Is a PUP downloaded with the user's consent?
Definition
Yes
Term
fileless virus
Definition
exists only in RAM
Term
MaaS
Definition
Metal as a Service

Offers cloud style provisioning for physical servers
Term
skimming
Definition
theft of personal data from a payment card
Term
cloning
Definition
making an unauthorized copy of a payment card
Term
KPA
Definition
Known Plaintext Attack
Term
SSRF
Definition
Server-Side Request Forgery

Access info from server
Term
memory leak
Definition
failure in a program to release discarded memory
Term
disassociation attack
Definition
DOS

Sends disassociation packets to a mobile device so it's disconnected from an access point
Term
LDAP code example
Definition
uses lots of parenthesis

search.aspx?name=userName)(zone=*)

administrator)(&))
Term
DLL
Definition
Dynamic Link Library

shared libraries of functions
Term
INI
Definition
config file for software

text-based content
Term
shimming
Definition
used to obtain payment card info
Term
PED
Definition
Programmable Encryption Device

Used in payment cards
Term
SPIM
Definition
Spam through Instant Messaging
Term
WAF
Definition
Web Application Firewall
Term
WTLS
Definition
Wireless Transport Layer Security
Term
sideloading
Definition
installing an app on a mobile device without using the device's official application-distribution method
Term
refactoring
Definition
altering an app's source code without changing its external behavior
Term
OT
Definition
Operational Technology
Term
jumpbox
Definition
hardened machine used for admin access to servers
Term
bastion host
Definition
special-purpose computer on a network designed to withstand attacks

ex: a proxy server with no other services running
Term
air gap
Definition
isolating a network from outside networks
Term
wget
Definition
command line tool used to download files from the internet
Term
passive network monitoring
Definition
capturing traffic via network tap or span port or mirror port
Term
active network monitoring
Definition
injecting test traffic into a network and monitoring the route it takes
Term
what does the secure flag on a cookie do?
Definition
Prevents the browser from sending the cookie over an unencrypted channel
Term
Tripwire
Definition
File integrity monitoring program
Term
geotagging
Definition
embedding location coordinates into a piece of data (i.e. photo or video)
Supporting users have an ad free experience!