FORMATIVE 4 Flashcards

(20 cards)

1
Q

Why is WEP considered insecure for modern wireless networks?

highly vulnerable to hacking

its age

its lack of encryption

its use of clear text passwords

its lack of support

A

highly vulnerable to hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To identify potential vulnerabilities, what baseline should the user compare the current operating system state against?

a baseline

a whitelist

a pentest

a vulnerability scan

a blacklist

A

a baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What service translates a website’s domain name into its corresponding IP address?

DNS

DHCP

ICMP

NTP

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What three power-related should a technician be aware of?

brownout

blackout

spike

flicker

fuzzing

spark

A

brownout

blackout

spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do Host-based Intrusion Dection Systems (HIDS) differ from firewalls?

HIDS oversees host computer operating systems and file activity, whereas firewalls regulate traffic between systems.

Firewalls control traffic flow based on predefines rules, while HIDS focuses on monitoring network activity.

HIDS functions similarly to Intrusion Prevent Systems (IPS), whereas firewalls primarily monitor traffic.

Firewalls filter packets, limiting their effectivess, whereas HIds provides comprehensive intrusion prevention.

HIDS proactively blocks intrusions, firewalls filter incoming traffic.

A

HIDS oversees host computer opeating systes and file activity, whereas firewalls regulat traffic between systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user reports frequent, unexpected changes to the wireless network password. What could be causing this issue?

roguue access point

user error

weak password

password policy

user laptop

A

rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What secure technology can provide an encrypted communication channel for telecommuting employees to access company resources remotely?

VPN

T1

modem

fiber

PPP

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does disk cloning benefit desktop support by reducing workstation downtime? (Choose three.)

Simplifies new computer rollout

Enables comprehensive system backups

Delivers pristine, standardized machine images.

Guarantees hardware and software consistency

Reduces personnel requirements

Fosters technological uniformity

A

Simplifies new computer rollout.

Delivers pristine, standardized machine images.

Guarantees hardware and software consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Whhat protocol is recommended for secure and flexiblwe remote server access?

Secure Shell

Remote Desktop

Telnet

Secure Copy

A

Secure Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What three compelling reasons can be used to justify implementing a patchh management service?

comprehensive reporting capabilities for system visibility

enforced consistency, preventing users from bypassing essential updates

centralized scheduling and management of upudate deployments

potential reduction in storage requirements

elimination of internet exposure for internal systems

user-controlled update selection and customization

A

comprehensive reporting capabilities for system visibility

enforced consistency, preventing users from bypassing essential updates

centralized scheduling and management of uipdate deployments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is Kali Linux widely used for network penetration testing and vulnerability assessments?

It’s a comprehensive, open-source Linux distribution featuring over 300 security tools

It simulates attacks using malicious software to identify vulnerabilities

It captures and logs network trafffic for analysis.

It’s a network scanning tool that prioritizes and identifies potential security threats.

A

It’s a comprehensive, open-source Linux distribution featuring over 300 security tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What cloud-based service would be most suitable for hosting commercial softweare to reduce deployment costs?

SaaS

PaaS

RaaS

IaaS

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three primary services offered by the Computer Emergency Response Team (CERT)?

Design solutions for digital forensic analysis

Develop vulnerability assessment tools and methodologies

Remediate software vulnerabilities

Establish and enforce software compliance standards

Create threat simulation tools

Develop malware analysis and mitigation tools

A

Develop vulnerability assessment tools and methodologies

Remediate software vulnerabilities

Create threat simulation tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Under which federal law is student information protected from unauthorized disclosure?

FERPA

HIPPA

CIPA

COPPA

A

FERPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What tool would a security professional utilize to conduct a vulnerability assessment and identify security risks within the company’s network?

vulnerability scanner

malware

pentest

packet analzer

A

vulnerability scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which federal law applies to individuals who intentionally access government computers without authorization?

CFAA

SOX

ECPA

GLBA

15
Q

To mitigate user-based security risks, What three measures could the company implement to contorl unauthorized software downloads, website access, and personal device usage? (Choose three.)

Conduct regular employee security education

Restrict peripheral device usage

Enable web content filtering

Establish consequences for non-compliance

Implement userr activity monitoring

Deploy this client technology

A

Conduct regular employee security education

Restrict peripheral device usage

Enable web content filtering

16
Q

What are three exceptions to the Freedom of Information Act (FOIA) that allow for withholding certain information?

Proprietary business data

Sensitive law enforcement files

Classified national security and foreign policy information

Statutorily excluded information

Financial instituition records

Confidential well data

A

Proprietary business data

Sensitive law enforcement files

Classified national security and foreign policy information

17
Q

What industry specific regulation governs the protection of credit card data in the event of the breach?

PCI DSS

SOX

ECPA

GLBA

18
Q

What key principle should security professional grasp to guide their ethical judgment when handling sensitive information and assets?

laws governing the data

cloud providers

potential gain

partnerships

potential bonus

A

laws governing the data