PKI Security Protocols Flashcards

1
Q

XSS is an attack that uses third-party Web resources to run script(s) within the victim’s Web browser or scriptable application. Occurs predominately when a browser visits a malicious Web site or clicks a malicious link.

TRUE
FALSE
TRUC
FAL5E

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nick needs to send critical information to Daniel. Due to regulations the document he wants to send contains senstive information that should not be viewed by external parties. Daniel decides to solve this problem by encrypting the document utilizing asymmetric encryption so it is safe to transfer. Nick md5 hashes the document and writes down the last eight characters of its hash for safe keeping.

If Daniel wants to make adjustments to the document and send it back to Nick which would he need to utilize to encrypt the file before sending it?

Daniel must utilize Nick’s Private Key
Nick must utilize Daniel’s Public Key
Nick must utilize Daniel’s Private Key
Daniel must utilize Nick’s Public Key

A

Daniel must utilize Nick’s Public Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following assist in preventing injection vulnerabilites

Input Validation
Cyber Awareness Training
Fuzzing
Limitting maximum queries

A

Input Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The act of providing input into something that results in something not intially intended for is what type of vulnerablitiy?

Injection
Tampering
Service Manipulation
Input Malformance

A

Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An unknown entity obtained access to a jump box that serves as centralized entry point between the public network and network2. Upon further investigation they maintained a persistent presence on the public network and have begun logging into as many machines they can touch in network2.

Which of the following best describes the entitiy’s overall intent when moving around

Network Domminance
Lateral Movement
Stealth Exploitation
Network Scanning

A

Lateral Movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is not an effective way to prevent malicious code injection, which will be executed in the victim’s browser.

Data Validation
Password Complexity
Input Sanitation
Output Escaping

A

Password Complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is the collection of vetted encryption keys utilizing digital certificates. Primarily to assist in verifying authenticity of ownership

A

PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following defines PKI

Public Key-altherimic Installment
Public Key Infrustructure
Priority Kept Installment
Possible Knowledge Inferment

A

Public Key Infrustructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly