Messer Practice Exam 1 Flashcards

1
Q

What is the process of gathering as much information as possible about a company from open sources such as social media, corporate websites, and business organizations?

A

Passive Footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What active reconnaissance tests directly query systems to see if a backdoor has been installed?

A

Backdoor Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What process involves actively querying and receiving responses across a network?

A

OS fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of penetration test provides detailed information about specific systems or applications?

A

Partially known environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What protocols use TLS to provide secure communication?

A

HTTPS (Hypertext Transfer Protocol)
FTPS (File Transfer Protocol Secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocol is used to encrypt conversations over VoIP?

A

SRTP (Secure Real-time Transport Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What protocols aren’t encrypted?

A

Telnet
FTP
SMTP
IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What secure protocol is used for Time Synchronization?

A

NTPsec (Secure Network Time Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What secure protocols are used for Email?

A

S/MIME (Secure/Multipurpose Internet Mail Extensions) with PKI
POP3S (Secure Post Office Protocol) with SSL.
IMAP (Internet Message Access Protocol) with SSL.
Browser-based email with SSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does SNMPv2 stand for and do?

A

Simple Network Management Protocol version 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What two data sources help address file storage volatility?

A

Partition Data
Temporary File Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What would an all-in-one printer that can print, scan, and fax often be categorized as?

A

Multifunction Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an IoT device?

A

Wearable technology and home automation devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does RTOs stand for?

A

Real-time operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does SoC standfor?

A

System on a Chip.

Multiple components that run on a single chip are categorized as an SoC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ISO 27701

A

extends 27001 and 27002 to include management of PII and data privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ISO 31000

A

sets international standards for risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ISO 27002

A

focuses on information security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ISO 27001

A

The foundational standard for ISMS (Information Security Management Systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is SOAR?

A

Security Orchestration, Automation, and Response.

Designed to make security teams more effective by automating processes and integrating third-party security tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is EAP-TTLS?

A

Extensible Authentication Protocol - Tunneled Transport Layer Security

Allows the use of multiple authentication protocols transported inside of a TLS tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is PEAP?

A

Protected Extensible Authentication Protocol

Encapsulates EAP within a TLS tunnel, but doesn’t provide multiple authentication methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is EAP-MSCHAPv2?

A

EAP - Microsoft Challenge Handshake Authentication Protocol v2

A common implementation of PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are two features commonly offered by a CASB?

A

Cloud Access Security Broker

-A list of applications in use
-Verification of encrypted data transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Example of Race Condition
A file system problem is usually fixed before a reboot, but a reboot is occuring before the fix can be applied. This has created a race condition that results in constant reboots
26
What does SED stand for?
Self Encrypting Drive
27
What does curl do?
The curl (Client URL) command will retrive a web page and display it as HTML (source-code) at the command line.
28
What is "scanless"?
It is a tool that allows you to perform a port scan via proxy.
29
What is "Nmap"?
A popular port scanning and reconnaissance utility.
30
What does "netstat" do?
It provides a list of network statistics, and the default view shows the traffic sessions b etween the local device and other devices on the network.
31
What does "dig" do?
Domain Information Groper Queries DNS servers for the fully-qualified domain name and IP address information of other devices.
32
What does "netcat" do?
The netcat command is used for reading or writing data to the network. It doesn't provide any statistical information about the network connection.
33
What does a DNS Sinkhole do?
Used to redirect and identify devices that may attempt to commnuicate with an external command and control (C2) server. The DNS Sinkhole will resolve an internal IP address and can report on all devices that attempt to access the malicious domain.
34
Which part of the PC startup process verifies the digital signature of the OS Kernel?
Trusted Boot
35
What does "Measured Boot" do and when does it occur?
It occurs after Trusted Boot and verifies that nothing on the computer has been changed by malicious software or other processes.
36
What does "Secure Boot" do and when does it occur?
It occurs Before Trusted Boot and checks the digital signature of the bootloader, not the OS Kernal!
37
What is a "POST"?
Power-On Self-Test is a hardware check performed prior to booting an operating system.
38
Preventative Control
Physically limits access to a device or area.
39
Managerial Control
Sets a policy that is designed to control how people act
40
Compensating Control
It doesn't prevent an attack, but it does restore from an attack using other means. Ex: An UPS does not stop a power outage, but it does provide alternative power if an outage occurs.
41
Primary difference of Asymmetric Encryption
Assymmetric encryption uses different keys for encryption and decryption.
42
What functionality does Blockchain provide?
The ledge functionality of a blockchain can be used to track or verify components, digital media, votes, and other physical or digital objects.
43
Which is lost first, memory or temporary files?
Memory, it is temporary.
44
A Linux administrator is downloading an updated version of her Linux distribution. The download site shows a link to the ISO and a SHA256 hash value. Which of these would describe the use of this hash value?
Verifies that the file was not corrupted during the file transfer because it matches what is on the website.
45
What does "NGFW" stand for?
Next-Generation Firewall
46
What is the BEST way to confirm the secure baseline of a deployed application instance?
Perform an integrity measurement. This is DESIGNED to check for the secure baseline of firewall settings, patch, levels, OS versions, and any other security components.
47
Benefits of Kerberos
-Uses a ticket-based system to provide SSO (Single Sign-On) -You ONLY NEED TO AUTHENTICATE ONCE with Kerberos to gain access to multiple resources.
48
What is "TACACS+"?
Terminal Access Controller Access-Control System It is an authentication method. Does not provide any single sign-on functionality.
49
What is "LDAPS"?
Lightweight Directory Access Protocol Secure It is a standard for access a network directory. This can provide an authentication method Does not provide any single sign-on functionality.
50
What is "802.1X"?
A standard for PNAC (Port-based Network Access Control) Does not provide any single sign-on functionality.
51
Full-Tunnel VPN vs Split-Tunnel VPN
Full-Tunnel VPN: All traffic goes through the tunnel. Split-Tunnel VPN: Only sends a portion of the traffic through the encrypted tunnel. It would allow work-related traffic to securely traverse the VPN, and all other traffic would use the non-VPN option.
52
What cryptographic method is used to add trust to a digital certificate?
A digital signature
53
What does X.509 do?
The X.509 standard defines the structure of a certificate. It makes it easy for everyone to view the contents of a certificate, but it doesn't provide any additional trust.
54
What does "RAID" stand for?
Redundant Array of Independent Disks
55
What does "SIEM" stand for?
Security Information and Event Manager.
56
What is S/MIME? and whats gucci about it?
Secure/Multipurpose Internet Mail Extensions Provides a way to integrate public key encryption and digital signatures into most modern email clients. This would encrypt all email information from client to client, retgardless of the communications used between email servers.
57
What is Secure IMAP? & what does it do?
Secure Internet Message Access Protocol Encrypts communication downloaded from an email server, but DOES NOT provide security for outgoing email messages.
58
What secure protocol would you use to: accept customer purchases from your primary website?
HTTPS
59
What secure protocol would you use to: synchronize the time across all of your devices?
NTPSec
60
What secure protocol would you use to: Access our switch using a CLI terminal Screen?
SSH
61
What secure protocol would you use to: Talk with customers on scheduled conference calls?
SRTP
62
What secure protocol would you use to: Gather metrics from routers at remote sites?
SNMPv3
63
TCP vs UDP
TCP (Transmission Control Protocol): -Connection based and more reliable, but slow. UDP (User Datagram Protocol): -Connectionless and less reliable, but fast.
64
FTP
File Transport Protocol 20, 21
65
SSH
Secure Shell 22
66
Telnet
23
67
SMTP
Simple Mail Transfer Protocol 25
68
DNS
Domain Name System 53
69
DHCP
Dynamic Host Configuration Protocol 67, 68
70
TFTP
Trivial File Transport Protocol 69
71
HTTP
Hypertext Transfer Protocol 80
72
HTTPS
Hypertext Transfer Protocol Secure 443
73
SSL VPN
Secure Socket Layer Virtual Private Network 443
74
POP3
Post Office Protocol v3 110
75
NTP
Network Time Protocol 123
76
IMAP4
Internet Message Access Protocol v4 143
77
SNMP
Simple Network Management Protocol 161
78
IPsec
Internet Protocol Secure 500
79
RDP
Remote Desktop Protocol 3389