Last Sec Flashcards

(19 cards)

1
Q

What should a company do if they have a legacy system they can’t update?

A

Put in on a vlan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can you find lateral movement and why?

A

SIEM. They are designed to centralize and correlate security events across various sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Will log files determine root cause?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is needed to set up a load balancer?

A

Identical hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

iOS is what type of system?

A

Apple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocol provides real time validation of a certificate?

A

OCSP
Online certificate status protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary purpose of DKIM?

A

Verify senders identity and the integrity of the message by adding a digital signature

DomainKeys identified mail

Part of DMARC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of network does a NAC protect?

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What agreement decides on the contribution of each party, including who will make the final decisions?

A

BPA. Business partnership agreement

Legal agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Example of risk mitigation?

A

Technical control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Most critical factors for employee training?

A

Situational awareness
Frequency and duration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why audit devices on asset register?

A

Find potential vulnerabilities and weaknesses in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewall rules are written in order so rule 2 could block rule 3 and 4

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing is a specific form of?

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Smishng is a specific form of?

A

Brand impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What factor directly measures the maximum potential loss from a vulnerability?

A

Exposure factor

17
Q

Examples of features on access lists?

A

Time of day
Specific ip addresses
Blocking certain protocols

18
Q

How to reduce users from installing unauthorized software on microsoft?

A

Adjust group policy

19
Q

What is netflow monitoring?

A

Monitors network traffic flow.