Practice Resources Flashcards

(33 cards)

1
Q

What to do first to before changing firewall rules?

A

Follow change management process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to prevent buffer overflow, sql injection and integer overflow?

A

Input validation
Stored procedure - saved code in sql

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to push out an update to password policies?

A

Group policy object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to check a USB device?

A

Sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to isolate an app from os?

A

Containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What device joins multiple networks together?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What device sitting in the screened subnet authenticates incoming users and decrypts incoming traffic?

A

Reverse proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do digital sigs and hashes have in common?

A

Prove non repudation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What records are created by dns poisoning and how to prevent?

A

rrsig records (resourse record signature). Use dnssec (dns security extensions) which validate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What prevents people from stealing PII and sensitive info?

A

dlp (data loss prevention)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What attack affects weak database configs.

A

Sql injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What attack is too many characters into a datafield on a web server?

A

Buffer overflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of control is SIEM?

A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of data does a lan protect?

A

In transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of threat actor might be employed by Nation State or APT?

A

Organized crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What threat actor would buy a program from the dark web?

A

Script kitty. Novice

17
Q

How to remotely protect a device when they are away from the office?

A

Secure web gateway SWG.
Sits between users and internet.
On premises or cloud
Comprehensive web security

18
Q

How to circumvent a captive portal at an airport?

19
Q

How to guage vulnerabilities?

A

CVSS (common vulnerability scoring system)

20
Q

How to verify the last time a file was updated?

A

Metadata or version control

21
Q

In an IaaS model, who secures the data?

22
Q

What are you searching for when you are trying to find out the cause of an incident?

A

Root cause analysis

23
Q

What can be used in a database to only see the last 3 digits of a credit card?

24
Q

What involves a meticulous examination of a companies processes, practices, and policies to see if the align with regulatory requirements?

A

Due diligence

25
What is the easiest way to check a servers settings on a daily basis?
Automation
26
Easiest way to setup a desktop in a cloud environment?
IaC
27
What tool can be used for a pivoting attack?
Nmap
28
What attack changes hash as it replicates?
Polymorphism virus
29
What type of board provides oversite, governance, and an additional layer of assurance that an organization is effective?
Audit committee
30
What type of wireless payment is commonly used on mobile phones?
Near field communications. NFC
31
What virtual environment is managed by the company and accessed by a thin client?
Virtual desktop infrastructure VDI
32
When customer data is being accessed, what role does the customer fulfill?
Data subject
33
When normal training follows advanced training?
Phased rollout