MISC Flashcards

1
Q

In AD, Kerberos does what?

A

network authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA stands for?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAA stands for?

A

Authentication
Authorization
Accounting/Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 AD group types?

A

Domain Local
Global
Universal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TKIP stands for?

A

Temporal Key Integrity Protocol

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPA stands for?

A

Wi-Fi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IV stands for?

A

Initializing Vector

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AES stands for?

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AES (Advanced Encryption Standard) is used in what type of encrypting standard?

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WPA2 stands for?

A

Wi-Fi Protected Access 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PKI stands for?

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PKI (Public Key Infrastructure) does?

A

certificate encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNSSEC stands for?

A

Domain Name system Security Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WUA stands for?

A

Windows Update Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WUA (Windows Update Agent) does?

A

Controls updates for individual clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NAP stands for?

A

Network Access Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NAP (Network Access Protection) does?

A

enforces client configuration compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

5 classes of firewall?

A
Class 1 - Personal firewall
Class 2 - Router firewall
Class 3 - Low end hardware firewall
Class 4 - High end hardware firewall
Class 5 - High end server firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HRA stands for?

A

Health Registration Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NPS stands for?

A

Network Policy Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TLS stands for?

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

TLS (Transport Layer Security) does?

A

current extension of SSL encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

2 mail encryptions are?

A

Pretty Good Privacy (PGP)

Secure/Multipurpose Internet Mail Extensions (S/MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

S/MIME stands for?

A

Secure/Multipurpose Internet Mail Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
PGP encrypts how?
public & session keys
26
S/MIME does?
embeds objects
27
4 types of VPN tunneling protocols?
PPTP L2TP SSTP IKEv2
28
PPTP stands for?
Point to Point tunneling Protocol
29
L2TP stands for?
Layer 2 Tunneling Protocol
30
SSTP stands for?
Secure Sockets Tunneling Protocol
31
IKEv2 stands for?
Internet Key Exchange version 2
32
Which VPN tunneling protocol has old, weak encryption?
PPTP
33
Which VPN tunneling protocol supports VPN Reconnect?
IKEv2
34
Which VPN tunneling protocol is industry standard?
L2TP
35
4 types of VPN authentication forms?
PAP CHAP MS-CHAPv2 EAP-MS-CHAPv2
36
PAP stands for?
Password Authentication Protocol
37
CHAP stands for?
Challenge Handshake Authentication Protocol
38
MS-CHAPv2 stands for?
Microsoft CHAP version 2
39
EAP-MS-CHAPv2 stands for?
Extensible Authentication Protocol Microsoft CHAP version2
40
Which VPN authentication form can authenticate, via biometrics and "what you have?"
EAP-MS-CHAPv2
41
Which VPN authentication form uses plaintext and is not recommended?
PAP
42
What is the best symmetric encryption?
AES
43
5 types of symmetric encryption?
``` Block ciphers DES 3DES AES Stream cipher ```
44
Block cipher symmetric encryption works how?
plaintext with a key
45
DES symmetric encryption has how many bits?
56 bits
46
Which symmetric encryption is less vulnerable than DES?
3DES encryption
47
Stream cipher symmetric encryption works how?
bit-by-bit
48
DES stands for?
Data Encryption Standard
49
AES stands for?
Advanced Encryption Standard
50
4 types of asymmetric encryption?
SSL TLS PGP Hash function
51
TLS stands for?
Transport Layer Security | encryption
52
PGP stands for?
Pretty Good Privacy | encryption
53
Hash function asymmetrical encryption works how and used for what?
encrypts one way, with no decryption | verifies passwords
54
types of certificate formats?
PKCS #12 PKCS #7 DER Base-64 encoded X.509
55
PKCS #12 certificates do?
archive files
56
PKCS #7 certificates do?
stores certificates
57
Base-64 encoded X.509 certificates do?
stores single certificate but no pvt key
58
PKI stands for?
Public Key Infrastructure
59
PKI does?
digital certificate system
60
2 types of CA?
Enterprise Root CA | Stand-alone CA
61
Enterprise Root CA does what?
top of CA hierarchy
62
Stand-alone CA does not do what 2 things?
use AD | automatically enroll visitors
63
RA stands for?
Registration Authority
64
RA does?
distributes keys
65
CRL stands for?
Certificate Revocation List
66
Device Guard is and does?
lockdown device using code integrity policies to only run trusted apps
67
A changing virus is called what?
polymorphic
68
When an administrator grants permissions on a folder to a group, which three permission levels are assigned by default?
Read Read & execute List folder contents
69
Which two permission levels are available to assign to a user or group when creating a basic share on a folder?
Read | Write
70
Which registry hive stores file associations?
HKEY_CLASSES_ROOT
71
On which Group Policy path will an administrator find the Account Policies area?
Computer Configuration/Policies/Windows Settings/Security Settings
72
What is used to audit non-Active Directory objects?
Object access
73
Which administrative tool is used to read auditing logs?
Event Viewer
74
Which of these encryption methods uses block ciphers? Choose three answers.
AES DES 3DES
75
For corporations, what 2 services manage updates?
Windows Server Update Service (WSUS) | System Center Configuration Manager (SCCM)
76
WSUS stands for?
Windows Server Update Service
77
SCCM stands for?
System Center Configuration Manager
78
802.1x uses what server?
RADIUS
79
802.1x does what?
port based network authentication
80
Firewall packet filtering operates at what OSI layer?
Layer 3
81
Firewall circuit filtering operates at what OSI layer?
Layer 5
82
3rd generation firewalls operate at what OSI layer?
Layer 7 (AKA application firewalls/proxy servers)
83
Stateless firewalls filter based on what?
packet: type, port number, source & destination IP
84
Stateful firewalls filter based on what?
everything stateless does and allows return traffic that is part of the OSI Session
85
Distance vector routing does what 2 things?
hop count | split horizon loop prevention
86
Link state routing does what 3 things?
hop count distance speed
87
3 types of protocol spoofing
ARP (Address Resolution Protocol) spoofing DNS (Domain Name System) spoofing IP Address spoofing
88
ARP (Address Resolution Protocol) spoofing works how?
stealing host IP address and sending its traffic to attacker
89
DNS (Domain Name System) spoofing works how?
redirects web request to incorrect website
90
IP Address spoofing works how?
IP packets attacked and their source forged
91
IPsec protocol, ESP (Encapsulating Security Payload), does?
provides CIA for only IP data
92
ESP stands for?
Encapsulating Security Payload
93
AH stands for?
Athentication Header
94
IPsec protocol AH (Athentication Header) does?
authentication, integrity, and anti-replay for data packets
95
IPsec protocol AH (Athentication Header) does not do?
encryption
96
IPsec protocol IKE (Internet Key Exchange) does?
defines encryption key exchange
97
IKE stands for?
Internet Key Exchange
98
SA stands for?
Security Association | re: IPsec protocol
99
SA (Security Association) does?
rules for VPN connections
100
Which are the two IPsec modes?
Transport Mode | Tunnel Mode