Exam 1 Flashcards

(27 cards)

1
Q

What is a “passive foot print”

A

Learning as much as your can from open sources like social media, web sites, reedit,dumpster diving etc..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A third party is going to gather information about your company from open sources

A

Passive footprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is TLS

A

“Transport layer security”
A cryptographic protocol used to encrypt network communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is HTTPS

A

“Hypertext Transfer Protocol Secure”
It is a protocol that secures communication and data transfer between a user’s web browser and a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ftps

A

“File transfer protocol secure” uses tls to provide secure communication also https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SSH and what is it used for

A

“Secure shell”

secure protocol user to connect to computers remotely using a secure connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SRTP

A

“Secure real time protocol”
Adds encryption when talking over a company phone, the encryption used for this is called (aes) to encrypt voice in video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DNSSEC

A

“Domain name system security extensions” a way to validate with the information you’re getting from the DNS server is actually coming from the devil server by using a public key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What kind of actor is organize crime

A

Usually does things for money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Hacktivist?

A

Focus or political agenda not commonly on financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is partition data in temporary file systems part of

A

The file storage subsystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “MFD”

A

“Multifunction device”

An all in one printer that can print, scan and fax is a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IoT

A

“Internet of things”

Wearable technology and home automation devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is RTOS

A

“Real time operating systems “

Are used in manufacturing and automobiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is SoC

A

“System on a chip”

Multiple component is the one on the single chip or categorize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SOAR

A

“Security orchestration automation and response”

SOAR seeks to alleviate the strain on IT teams by incorporating automated responses to a variety of events

17
Q

What is PKI

A

“Public key infrastructure”

PKI uses cryptographic public keys that are connected to a digital certificate, which authenticates the device or user sending the digital communication

18
Q

What is IaaS

A

“Infrastructure as a service”

A cloud service that provides the hardware required for deploying, application, instances, and other cloud-based applications

delivers IT infrastructure like compute, storage, and network resources on a pay-as-you-go basis over the internet

Amazon, Google

19
Q

What is a another word for “on path attack”

A

Man in the middle

20
Q

Federation

A

Would allow one member of organization to use credentials of another organization

21
Q

What is MTBF

A

“Mean time between failures”

Is a prediction of how often a repairable system will fail

22
Q

What is RTO

A

“Recovery time objectives”

A set of objectives needed to restore a particular service level

23
Q

What is MTTR

A

“Mean time to restore”

The amount of time it takes to repair a component

24
Q

What is MTTF

A

“Mean time to failure”

The expected lifetime of a non-repairable product or system

25
What is EAP-TTLS
“Extensible authentication protocol tunneled transport layer security” Allows the use of multiple authentication protocols transported inside of an encrypted TLS tunnel
26
What is a CASB
“Cloud, excess security broker” Can be used to apply security policies to cloud based implementations
27
Common functions of CASB
visibility into application used in data security policy use, Verification of compliance with formal standards, and the monitoring, and identification of threats