Cryptography and PKI Flashcards

(94 cards)

1
Q

as the security administrator in your

A

PFX

P12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your company has recently implemented

A

public key

private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which security measure is implemented to help detect fraud

A

mandatory vacations

job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

your company operates with a strict no byod

A

network scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which type of standalone

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

you’re busy with the setup of a wireless

A

thin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Its important that you know how to use the windows command line interface

A

A Used to test a connection to a remote device
B Opens a port on a system and sends data
C Performs port scans on a network
D troubleshoots DNS name
E displays the TCP/IP config
F follows the path a packet takes to travel through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which concept is based on determining how much date an

A

RPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your company requires the strongest AAA

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

As part of your Risk assessment you are

A

Privacy considerations

Supply chain assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are in the process of configuring a wireless access point

A

CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your organization wants to ensure they are not using any weak

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are an IT security admin

A

Obtain management’s explicit authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network switches can be configured to operate ate layer 2 or 3

A

Layer 2 BDC

Layer 3 A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are reviewing the work done by a security

A

Improper certificate and key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The secure sockets layer or SSL protocal

A

firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which diffle-hellman

A

DH group 20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

you need to provide a username ,pin,

A

hardware token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

as a developer you need to protect code

A

xor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

which of the following network devices can be used for these confi

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

you are attending a concert for a local band

A

replay attack

nfc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

when a lack of original vendor

A

end . of life systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

both the secure sockets layer, ssl, and transport security, or tls protocols can be used to encrypt

A

load balancers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

when talking about open-source intelligence

A

open-source intelligence is data that has been collected from publicly available sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
which technology allows users to use the same identification data to gain
federation
26
which of the following technologies can assist with asset tracking
rfid tags
27
you get a call from a user and they state that they called last week
consensus
28
which group policy setting should be configured to ensure that users are forced to use a password
passwords must meet complexity requirements
29
which influence tactic creates a feeling of urgency
scarcity
30
which item is typically used for the implementation of a key
patented cylinders
31
as a security administrator managing the cryptography of your network, you are concerned about the methodology
pseudo-random number generation
32
a system on your network was accessed during working hours and some sensitive
perform usage auditing and review | perform permission audition and review
33
which access control mechanism uses time as a factor to limit
totp
34
a hacker located an unknown
the hacker discovered a zero-day vulnerability
35
keeping a network secure requires a fair amount of administrative oversight
A encrypts all the data sent to and from B secures diagnostic date while C confirms the authenticity of domain name records
36
Spoofing poses a threat to network security
- configure the router or - switch to use RF scan for and deny MAC disable any interfaces that
37
a hacker has just completed their reconnaissance
initial exploitation
38
Your company's security policy has been updated to ensure peripheral devices
disable the built-in web server function for all printers to stop unauthorized access
39
which security practice should you use in an organization to ensure
least privilege
40
with mobile device management
sms,mms, and wifi usb otg microphone recordings camera usage
41
jailbreaking a cell phone is
escalation of privilege
42
what is a minimum requirement when placing mission-critical
use electronic access control with all entry attempts logged
43
e-mail has become the norm in many organizations but brings with it certain risks
data loss prevention server-to-server encryption spam filter
44
you need to install a fence around your company
an 8-foot fence
45
your organization is required to consolidate single-sign on and authorization by extending
cloud access security brokers
46
you have been hired as a security consultant for a small company
create an incident management document
47
which type of attack is carried out using botnets
ddos
48
you oversee a group of developers creating a sales
performing dynamic analysis
49
one of the main security flaws in the company's applications is data exposure
encapsulation
50
as an administrator, you need to be prepared to handle any number
A subscription B DHCP C NTP
51
which type of interoperability
bpa
52
you have been hired by a company and directed to use a non-domain account
vulnerable business processes
53
preventing password crackers from accessing your password
salting passwords setting a maximum number of login attempts enforcing rules for creating strong passwords
54
when speaking about penetration testing, which
installing a backdoor that needs authentication
55
you work for an organization that is reviewing its network topology
ddos mitigation
56
installing and maintaining applications on a network can lead to
ensure that each application uses its own account | use biometrics or one-time access codes
57
which role is responsible for processing
data custodian
58
you have been tasked with setting up a wireless network at a small branch office
limit the signal strength to the minimum required
59
which IDS monitoring
heuristic-based
60
an intruder shows interest in an employee
liking
61
users are reporting that when entering the url of a company website
DNS poisoning
62
you are performing a threat assessment
environmental
63
a new batch of changes hav ebeen
test the code on a virtual machine
64
you have been tasked with implementing security measures to protect your databases from
run security automation tools | implement stored procedures
65
a malicious user disconnects
evil twin
66
which shared authentication scheme allows users to access web-based services
openID connect
67
you are a network administrator of a large company that consists of 30,000 employees
assign group-based privileges | place user accounts into groups
68
which authentication method is commonly used as part of an SSO implementation
Kerberos
69
due to the popularity of the raspberry pi
soc
70
you need to provide a username, pin, and a generated passcode to successfully log in to a computer
hardware token
71
your company has some important clients visiting the office
guest account
72
You are planning to encrypt a file using a symmetric algorithm that encrypts data
stream cipher
73
as the security administrator of you organization you have been asked to identifity
privacy impact assessment
74
which of the following is a form of a smart card
cac
75
as a system administrator there are
capturing traffic traveling on the network
76
which term is described as the ability to
pivoting
77
as a network technician
maximum password age | enforce password history
78
match the cryptographic attacks
A has acces to the crib B the attack is success A advanced encryption standard AB has access to ciphertext
79
which non-persistent solution provdes
use the live boot media
80
which type of malware usually delivers itselfqRAT
RAT
81
your company has recently implemented a PKI
CRL OCSP
82
Which type of malware usually delivers itself via a trojan
RAT
83
You are working for a company that suspects an unauthorized
implemetn SPAN
84
in preparation for the real incident, you schedule an exercise and
cyber-incident response teams roles and responsibilities reporting requirements//escalation
85
which of the following uses a brute force
birthday
86
as a security administrator managing
low latency | resource constraints
87
which option represents the strongest
twofish
88
you are the network professional for a small boutique
800000
89
which option provides port-based
802.1X
90
you need to perform a risk assessment
BIA
91
which of the following are examples of active reconnaissance
a vulnerability scanner the usage of the tool traceroute port scanning
92
when protecting data-in-transit
session key
93
a system administrator is configuring a NIDS
rules
94
which of the following is an example of an environmental control
hot and cold aisles