Questions I got wrong Flashcards

1
Q

What is a step by step process document called?

A

A procedure. A procedure is a document that outlines a series of steps to be followed to accomplish a specific task or operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Can brand reputation be assessed for value?

A

Yes. Assets can include both tangible and intangible items that have value to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a subnet mask?

A

Subnet masks determine the network portion and host portion of an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary purpose of a digital signature in cryptography?

A

The primary purpose of a digital signature in cryptography is to verify the integrity and authenticity of digital data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

During an incident response, what is the highest priority of first responders?

A

In the context of incident response, the primary goal is to minimize disruption to the business or organization and restore normalcy as quickly as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the context of privileged access management, what is the purpose of just-in-time privileged access management and just-in-time identity?

A

Providing users with temporary elevated privileges when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The security team identified that several employees have more system permissions than their roles require, due to temporary assignments or promotions that have since ended. What is the term for this situation?

A

Privilege creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a cyber attacker pretends to be someone else to trick people into giving away private information, what is this kind of attack called?

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which category of encryption does the substitution cipher belong to?

A

Symmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Memorandum of Understanding (MOU) or Memorandum of Agreement (MOA)?

A

In the context of BC and DR, an MOU or MOA is usually established between organizations to ensure that in the event of an emergency, such as a fire, flood, power loss, etc., one organization can share its resources and facilities with the other to maintain critical functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which process occurs as data moves up the layers of the OSI model?

A

Decapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When you see the term point to point in a network question, the technology is probably….

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a unique identifier assigned to network interfaces for communications on the physical network segment?

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When key distribution is not adequately secured, a cryptographic system becomes vulnerable to which security threat?

A

Man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of the SYN packet in the three-way handshake of TCP?

A

It establishes a reliable connection between the client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the point of system hardening?

A

To reduce the system’s attack surface by applying secure configurations.

17
Q

What is password hashing?

A

Adding random data to the password before hashing.

18
Q

What is an XSS attack?

A

Cross-Site Scripting (XSS) attack (option D). In an XSS attack, an attacker injects malicious scripts into content that other users view on a web application. When other users load the affected page in their browser, the malicious script executes and can perform actions such as stealing their session cookies.

19
Q

Using strong complex passwords and changing them frequently is what kind of control?

A

A preventative control

20
Q

which term refers to the expected monetary loss that can be expected from a single risk event?

A

Single Loss Expectancy (SLE)

21
Q

What is best used for ensuring the security of data in motion?

A

Public Key Infrastructure (PKI) provides a framework of encryption and data communications standards used to secure communications over public networks. It is suitable for ensuring the security of data in motion through encryption and the use of digital certificates.

22
Q

What is a dictionary attack?

A

Involves using a list of commonly-used passwords or combinations.

23
Q

Which access control systems requires individuals to validate their identity using mechanisms like PINs, biometrics, or other tokens?

A

Logical Access Control Systems

Logical Access Control Systems are automated systems that validate an individual’s identity through mechanisms like PINs, biometrics, or other tokens.

24
Q

Which tool is specifically designed to crack password hashes by comparing them against a precomputed table of hash values?

A

Rainbow Table

A rainbow table is a precomputed table for reversing cryptographic hash functions, mainly used for cracking password hashes.

25
Q

What are the key stages in the data lifecycle, representing the process of data from creation to disposal?

A

Create, Store, Use, Share, Archive, Destroy

26
Q

which sequence best describes the typical stages of identity and access management from initial access to termination?

A

Provisioning, review, revocation

27
Q

Which layer of the OSI model is primarily responsible for end-to-end communication, error recovery, and flow control?

A

Transport Layer

The Transport Layer of the OSI model provides end-to-end communication, error recovery, and flow control.

28
Q

James is looking to deploy a firewall that can inspect web traffic, ensuring that it not only filters packets based on source and destination addresses but also understands and evaluates the data at the application layer. Which type of firewall is best suited for this purpose?

A

Proxy firewall

29
Q

What is a smurf attack?

A

In a smurf attack, the attacker uses a spoofed source address (the victim’s) and broadcasts a ping request to a network. The network responds to the request by sending a reply to the spoofed address, which is the victim’s address, thereby flooding the victim with traffic.

30
Q

Which cryptographic method allows two parties to independently generate a shared secret key over an unsecured communication channel?

A

Diffie-Hellman is a key exchange protocol that enables two parties to establish a shared secret over an unsecured channel.

31
Q

Which of the following processes is responsible for overseeing and systematically handling changes to a system to maintain its integrity and performance?

A

Configuration Management is about keeping systems in a known, consistent state. It’s about managing changes, avoiding unintended system behaviors, and understanding the consequences of changes.

32
Q

Which of the following technologies allows data to be written across multiple media for enhanced performance and redundancy, and can be used in both disk and tape storage solutions?

A

RAID

Both Redundant Array of Independent Disks (RAID) and Redundant Array of Independent Tapes (RAIT) are technologies that distribute data across multiple disks or tapes respectively. They are designed to improve performance and provide data redundancy.

33
Q
A