Practice Resource Flashcards 2

(31 cards)

1
Q

Risk strategy when you take no action?

A

Risk acceptance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How an administrator can access a vpn?

A

Jump server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What looks at payment terms, resolution mechanisms, confidentially clauses, and liability protections?

A

Master service agreement
MSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What signifies that an organization will acknowledge its responsibilities and will adhere to the prescribed regulations?

A

Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to find what websites someone had visited?

A

Dns log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What attack uses a tar.gz file extension?

A

Remote access Trojan
RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How could you recover old data from an encrypted smart card?

A

Key escrow will have an old copy of the private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What agreement type is measured in metrics?

A

Service level agreement
SLA
What services will be rendered and level of performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a CSP?
How can a CSP load balancer data?

A

Content security policy-securiy feature of browsers that helps to prevent attacks like XSS by controlling the sources from which content can be loaded.
Geographical dispersion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is pci dss?

What would happen if a financial institution failed a PCI DSS inspection?

A

Payment card industry data security standard

Regulators fine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What framework examines the adversary, capabilities, infrastructure, and victim in an attack?

A

Diamond model of intrusion analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What works on a Rewards basis?

A

Bug bounty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Javascript extension?

A

.js

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What authentication model uses tokens?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is kerberos?

A

Provides a standardized way to verify a user’s or hosts identity over a untrusted network.

Used by windows, linux

Developed by MIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What system would prevent a PII error?

What is PII?

A

Data loss prevention DLP
Personally identifiable info

17
Q

What authentication model is 3rd party to 3rd party?

18
Q

What attack uses a .ryk file extension?

A

Ransomware(RUYK)

19
Q

How to check the reliability of a system?

A

Mean time between failure MTBF

20
Q

What authentication model uses extended attributes?

A

Federated services

21
Q

What is the file extension and format of a private key?

A

P12 format
.pfx extension

22
Q

What authentication system reduces the number of times you need to authenticate?

A

Single sign on SSO

23
Q

What is file extension and format of public key?

A

.cer
P7B format

24
Q

What authentication model prevents a hash attack?

25
What authentication model prevents replay attacks and how?
Kerberos Using usn and time stamps
26
What authentication method does Iaas, PaaS, SaaS use?
Federation, model used by cloud.
27
What authentication model uses cookies?
Federated
28
What authentication model uses tokens?
OAuth 2.0
29
What authentication model supports OpenID Connect?
OAuth
30
What type of virus evades anti-virus, nids, nips, or siem?
Zero day attack
31
What is 0Auth2?
Open authorization Allows a website or app to access resources on another web app or website on behalf of a user.