22 Flashcards

1
Q

A trusted third-party storage solution providing backup source for cryptographic keys is referred to as:

A

** Key escrow **

Key escrow is a method of storing important cryptographic keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Copies of lost private encryption keys can be retrieved from a key escrow by recovery agents. Recovery agent is an individual with access to key database and permission level allowing him/her to extract keys from escrow.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The term “Certificate chaining” refers to the process of verifying authenticity of a newly received digital certificate. Such process involves checking all the certificates in the chain of certificates from a trusted root CA, through any intermediate CAs, down to the certificate issued to the end user. A new certificate can only be trusted if each certificate in that certificate’s chain is properly issued and valid.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called:

A

tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as:

A

traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following answers refer to network administration command-line utilities used for DNS queries? (Select 2 answers)

A
  • dig
  • nslookup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings?

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following command-line tools is used for discovering hosts and services on a network?

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Linux command-line utility for network interface configuration is called:

A

ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A command-line utility used for checking the reachability of a remote network host is known as:

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which network command-line utility in MS Windows combines the features of ping and tracert?

A

pathping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following answers refers to a command-line tool used for security auditing and testing of firewalls and networks?

A

hping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Netstat is a command-line utility used for: (Select 2 answers)

A
  • Displaying active TCP/IP connections
  • Displaying network protocol statistics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following terms is used to describe a text message containing system information details displayed after connecting to a service on a server?

A

banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The practice of connecting to an open port on a remote host to gather more information about its configuration is known as:

A

Banner grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following answers refers to a network debugging and exploration tool that can read and write data across TCP or UDP connections?

A

netcat

15
Q

The arp command can be used to perform what kind of resolution?

A

IP to MAC

16
Q

Which of the following command-line commands in MS Windows are used to display the contents of a routing table? (Select 2 answers)

A
  • route print
  • netstat -r
17
Q

A Linux command-line command for displaying routing table contents is called

A

netstat -r

18
Q

Which of the following answers refers to a command-line tool used to download or upload data to a server via any of the supported protocols, such as FTP, HTTP, SMTP, IMAP, POP3, or LDAP?

A

curl

19
Q

Which of the following tools is used for gathering OSINT?

A

theHarvester

20
Q

Which of the following answers refers to an advanced network exploration and penetration testing tool integrating functionalities from multiple other tools, such as ping, whois, or nmap?

A

sn1per

21
Q

Which of the following tools hides attacker’s identity by utilizing a proxy for port scanning?

A

scanless

22
Q

Which of the following tools would be best suited for gathering information about a domain?

A

dnsenum

23
Q

Which of the following tools offers the functionality of a configuration compliance scanner?

A

nessus