CyberBook2 Flashcards
(30 cards)
Following log is an example of
https://www.comptia.org/contact-us/%3file..%324322fpasswd
what attack is this?
Directory transversal
What is a known security risk associated with data archives that contain financial information?
Data becomes a liability if archived longer than required by regulatory guidance.
Policy that provides greater depth and breadth of knowledge across an orgnaization?
Job rotation policy.
Tokenization of credit card information of a public cloud proider.
Cloud Access Security Broker (CASB)
Two subnets that should be able to communicate with each other directly. What should be deployed so server admins can access these devices?
Jump Servers
Security analysis required deploy workstations in a room where data cannot be stored. File share is in local data center. What should be implemented?
VDI and thin clients.
What prevents employees from visiting inappropriate websites?
AUP
What tool can be used to scan a network to perform vulnerability checks and compliance auditing.
Nessus
Which of the following protocols is commonly used to collect information about CPU utilization and memory usage from network devices?
Simple Network Management Protocol (SNMP)
A type of report that shows controls are in place to protect customer data. Usally from third-party vendors and CISO may request this report.
Soc 2 Type Report
A type of scan that provides calculated value for known vulnerabilities.
CVSS; Common Vulnerability Scoring System
What provides a current state or image of VM’s state.
Snapshot
Command to see which ports on a network are in a listening state.
Netstat
Tool used to facilitate incident response threat hunting and security configuration both standalone and integrated with SIEM.
SOAR; Security Orchestration Automation Response.
What is something that redirects you when clicking on a link that you didnt intend to go to, for instance (bank payments)
XSRF-CSRF
A company wants to do buissness with global markeys, what international standard should the data protection officer be concerned about.
ISO 2701
a Chief Information Security Officer wants to ensure zone transfers and integrity is validated, what should be implemented
DNSSEC
What do you refer to if OS-leve configurations are not in compliance due too outdated hardening?
CIS benchmark; Center for Internet Security controls.
Cloup computing concept is BEST described as focusing on the replacement of physical hardware at a customer’s location with cloud-based resources?
IaaS; Infrastructure as a service.
Cloud computing concept BEST described as focusing on the replacement of hardware and software required when creating and testing new applications?
PaaS; Platform as a Service, rent fully configured systems for specific tasks.
Data rentention policy is mainly used for what?
Min, Max and Description of information. There is no need for classification or security techniques in such a policy.
Data retention policy is mainly used for what?
Min, Max and Description of information. There is no need for classification or security techniques in such a policy.
What type of cloup service BEST describes using it for their programming environment?
PaaS; Platform as a service
What type of cryptographic algorithms is PGP?
Asymmetric.