Cryptography and PKI Flashcards
(94 cards)
as the security administrator in your
PFX
P12
Your company has recently implemented
public key
private key
which security measure is implemented to help detect fraud
mandatory vacations
job rotation
your company operates with a strict no byod
network scanner
which type of standalone
worm
you’re busy with the setup of a wireless
thin
Its important that you know how to use the windows command line interface
A Used to test a connection to a remote device
B Opens a port on a system and sends data
C Performs port scans on a network
D troubleshoots DNS name
E displays the TCP/IP config
F follows the path a packet takes to travel through the network
Which concept is based on determining how much date an
RPO
Your company requires the strongest AAA
TACACS+
As part of your Risk assessment you are
Privacy considerations
Supply chain assessment
You are in the process of configuring a wireless access point
CCMP
Your organization wants to ensure they are not using any weak
AES
You are an IT security admin
Obtain management’s explicit authorization
Network switches can be configured to operate ate layer 2 or 3
Layer 2 BDC
Layer 3 A
You are reviewing the work done by a security
Improper certificate and key management
The secure sockets layer or SSL protocal
firewalls
Which diffle-hellman
DH group 20
you need to provide a username ,pin,
hardware token
as a developer you need to protect code
xor
which of the following network devices can be used for these confi
router
you are attending a concert for a local band
replay attack
nfc
when a lack of original vendor
end . of life systems
both the secure sockets layer, ssl, and transport security, or tls protocols can be used to encrypt
load balancers
when talking about open-source intelligence
open-source intelligence is data that has been collected from publicly available sources