Practice Resource Flashcards 2
(31 cards)
Risk strategy when you take no action?
Risk acceptance.
How an administrator can access a vpn?
Jump server.
What looks at payment terms, resolution mechanisms, confidentially clauses, and liability protections?
Master service agreement
MSA
What signifies that an organization will acknowledge its responsibilities and will adhere to the prescribed regulations?
Attestation
How to find what websites someone had visited?
Dns log files
What attack uses a tar.gz file extension?
Remote access Trojan
RAT
How could you recover old data from an encrypted smart card?
Key escrow will have an old copy of the private keys
What agreement type is measured in metrics?
Service level agreement
SLA
What services will be rendered and level of performance
What is a CSP?
How can a CSP load balancer data?
Content security policy-securiy feature of browsers that helps to prevent attacks like XSS by controlling the sources from which content can be loaded.
Geographical dispersion
What is pci dss?
What would happen if a financial institution failed a PCI DSS inspection?
Payment card industry data security standard
Regulators fine.
What framework examines the adversary, capabilities, infrastructure, and victim in an attack?
Diamond model of intrusion analysis
What works on a Rewards basis?
Bug bounty
Javascript extension?
.js
What authentication model uses tokens?
Kerberos
What is kerberos?
Provides a standardized way to verify a user’s or hosts identity over a untrusted network.
Used by windows, linux
Developed by MIT
What system would prevent a PII error?
What is PII?
Data loss prevention DLP
Personally identifiable info
What authentication model is 3rd party to 3rd party?
Federation
What attack uses a .ryk file extension?
Ransomware(RUYK)
How to check the reliability of a system?
Mean time between failure MTBF
What authentication model uses extended attributes?
Federated services
What is the file extension and format of a private key?
P12 format
.pfx extension
What authentication system reduces the number of times you need to authenticate?
Single sign on SSO
What is file extension and format of public key?
.cer
P7B format
What authentication model prevents a hash attack?
Kerberos