Failed on 2nd practice exam Flashcards

1
Q

a cloud network hub that allows users to interconnect virtual private clouds (VPC) and on-premises networks through a central console.

A

A transit gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which value is the result of a quantitative or qualitative risk analysis?

A

Inherent risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which control types does a systems engineer implement when an initial locking mechanism does not perform as expected?

A

Compensating
Preventatve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

control acts to eliminate or reduce the impact of an intrusion event.

A

A corrective control is used after an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

detective control

A

may not prevent or deter access, but it will identify and record any attempted or successful intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An organization remodels an office which results in the need for higher security during construction. Placing a security guard by the data center utilizes which control types?

A

Operational
Preventative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A control that acts to eliminate or reduce the likelihood that an attack can succeed.

A

A preventative control acts to eliminate or reduce the likelihood that an attack can succeed. A preventative control operates before an attack can take place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A control implemented primarily by people rather than systems.

A

Operational control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What authentication protocol uses MSCHAP?

A

LEAP uses MSCHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What authentication protocl uses MSCHAPv2

A

PEAPv0 also known as EAP-MSCHAPv2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can assist in routing information on an attack to a honeynet?

A

Domain Name Service (DNS) sinkhole is used to intercept DNS requests attempting to connect to known malicious or unwanted domains and returning a fake IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What authentication method does 802.1x framework use

A

EAP or extensible authentication protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a TAP?

A

A test access point (TAP) is a hardware device that copies signals from the physical layer and the data link layer
Test access points (TAPs) can be either active or passive.
Avoids frame loss
More reliable than SPAN
Can be active or passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SPAN

A

SPAN (switched port analyzer) is simply mirroring ports.
Can only be active.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one way to protect against SSL stripping

A

HTTP Strict Transport Security (HSTS) forces browsers to connect using HTTPS only, mitigating downgrade attacks, such as Secure Socket Layer (SSL) stripping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What replaced RC4/TKIP to make WPA2 significantly more secure than WPA?

A

For WPA2, AES (Advanced Encryption Standard) deploys within CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol). AES replaces RC4, and CCMP replaces TKIP. AES is for encryption, and CCMP is for message integrity

17
Q

Devices deployed in a network and that send data to the local area network (LAN) level and process it with an Internet of things (IoT) sensor are which of the following?

A

Fog computing provides decentralized local access by deploying fog nodes throughout the network

18
Q

OCSP stapling

A

Stapling addresses the privacy issues surrounding Online Status Certificate Protocol (OCSP) by having the SSL/TLS web server periodically obtain a time-stamped response from the Certificate Authority. Then, when a client submits an OCSP request, the web server returns the time-stamped response.

19
Q

How does the General Data Protection Regulations (GDPR) classify data that can prejudice decisions, such as sexual orientation?

A

The sensitive classification is used in the context of personal data about a subject that could harm them if made public and could prejudice decisions made about them if referred to by internal procedures.

20
Q

What could a hacker use to extract passwords from a database file?

A

Hashcat is a popular password cracker developed for Linux. It is one of many password crackers the hacker could potentially use to extract passwords from the hashed password database.

21
Q

Identify types of metadata that would be associated with CDR (call detail records) of mobile devices.

A

List of towers connected
Call duration
SMS text timestamps

22
Q

when using a SIEM what can help manage log collections

A

deploying listeners
A management server can be configured to be a listener or collector to gather logs from multiple sources and parse the data before sending it to the SIEM system. Multiple listeners can better manage collections to reduce the number of systems communicating with the SIEM.

23
Q

What tool could a hacker us to obtain credentials from a Windows system?

A

Mimikatz

24
Q

hybrid password attack

A

A hybrid password attack uses a combo of dictionary and brute force attacks. It is targeted against weak and/or re-used passwords.