51-100 Flashcards

1
Q

56

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

57

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A

d , Mitigation is the reduction of something harmful that has occurred or the reduction of its harmful effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A

c , Security Assertion Markup Language, or SAML, is a standardized way to tell external applications and services that a user is who they say they are. SAML makes single sign-on (SSO) technology possible by providing a way to authenticate a user once and then communicate that authentication to multiple applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A

c NetFlow is a network protocol developed by Cisco for collecting IP traffic information and monitoring network flow. By analyzing NetFlow data, you can get a picture of network traffic flow and volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A

d spraying - brute force attack, an attacker will brute force logins base on list of usernames with default passwords on the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A

c

18
Q
A

c

19
Q
A

be

20
Q
A

c

21
Q
A

b , segment = divide the NW with firewalls

22
Q
A

a

23
Q
A

d , because of parity , raid 6 can withstand two disk failures at one time

24
Q
A

a

25
Q
A
26
Q
A

a

27
Q
A

a

28
Q
A

b , vm escape is an exploit which the attacker runs code on a VM that allows an OS system running within it to break out and interact directly with the hypervisor

29
Q
A

d

30
Q
A

a

31
Q
A

d

32
Q
A

b

33
Q
A

a

34
Q
A

a

35
Q
A

d

36
Q
A

d

37
Q
A
38
Q
A

bd

39
Q
A

a

40
Q
A

c