Test Practices Questions Missed Flashcards

(73 cards)

1
Q

Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?

A

PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:

A

CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following certificate formats is used to store a binary representation of a digital certificate?

A

DER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A digital certificate which allows multiple domains to be protected by a single certificate is known as:

A

Subject Alternative Name (SAN) certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A trusted third-party storage solution providing backup source for cryptographic keys is referred to as:

A

key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following allows for checking digital certificate revocation status without contacting Certificate Authority (CA)?

A

OCSP stapling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which digital certificate formats are commonly used to store private keys? (Select 2 answers)

A

PFX, P12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the answers listed below refers to the most common format in which Certificate Authorities (CA) issue certificates?

A

PEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers)

A

Suitable for large corporate networks

Requires RADIUS authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the EAP methods listed below relies on client-side and server-side certificates to perform authentication?

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following EAP methods offers the highest level of security?

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

A

RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following security protocols is the least susceptible to wireless replay attacks?

A

WPA2-CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the characteristic features of the secure version of IMAP? (Select all that apply)

A

Transport Layer Security (TLS)
TCP port 993
Secure Sockets Layer (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refer(s) to POP3S encrypted communication? (Select all that apply)

A

Transport Layer Security (TLS)
Secure Sockets Layer (SSL)
TCP port 995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A secure version of the HTTP protocol offering traffic encryption is known as: (Select all that apply)

A

HTTP over SSL
HTTP over TLS
HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which version(s) of the SNMP protocol offer(s) authentication based on community strings sent in an unencrypted form? (Select all that apply)

A

SNMPv1

SNMPv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following protocols allow(s) for secure file transfer? (Select all that apply)

A

FTPS
SFTP
SCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

LDAPS is an example of:

A

Secure directory access protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which protocol enables secure, real-time delivery of audio and video over an IP network?

A

SRTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the protocols listed below was designed as a secure replacement for Telnet?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following terms illustrate(s) the security through obscurity concept? (Select all that apply)

A

Code obfuscation
Steganography
SSID broadcast suppression
Substitution ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the answers listed below refers to a solution designed to strengthen the security of session keys?

A

PFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following terms is used in conjunction with the assumption that the output of a cryptographic function should be considerably different from the corresponding plaintext input?

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which of the terms listed below is used to describe a situation where a small change introduced to the input data before encryption causes large changes in its encrypted version?
Diffusion
26
What are the characteristic features of Elliptic Curve Cryptography (ECC)? (Select 3 answers)
Asymmetric encryption Low processing power requirement Suitable for small wireless devices
27
Examples of means that provide randomization during the encryption process include: (Select 3 answers)
Cryptographic nonce Salting Initialization Vector (IV)
28
Pseudo-random data used in combination with a secret key in WEP and SSL encryption schemes is known as:
IV
29
A type of encryption scheme that uses a paired public and private key is known as: (Select 2 answers)
Asymmetric encryption | Public-key encryption
30
A type of encryption scheme where the same key is used to encrypt and decrypt data is referred to as: (Select 3 answers)
Session-key encryption Symmetric encryption Secret-key encryption
31
Which of the following are hashing algorithms? (Select all that apply)
MD5 RIPEMD HMAC SHA
32
Which of the following authentication protocols offer(s) countermeasures against replay attacks? (Select all that apply)
IPsec Kerberos CHAP
33
Which of the following answers lists an example of a cryptographic downgrade attack?
POODLE
34
Which of the acronyms listed below refers to a cryptographic attack where the attacker has access to both the plaintext and its encrypted version?
Known Plaintext attack KPA
35
Which of the command-line utilities listed below can be used to perform a port scan?
Nmap | netcat
36
Which of the following command-line tools is used for discovering hosts and services on a network?
Nmap
37
Command-line packet capturing utility?
tcpdump
38
What is the name of a Linux command-line utility that can be used to display TCP/IP configuration settings?
ifconfig
39
Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers)
ipconfig /release | ipconfig /renew
40
Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)?
/all
41
What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings?
ipconfig
42
The arp command can be used to perform what kind of resolution?
IP to MAC
43
Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses?
arp -a
44
Which of the following CLI tools is used to troubleshoot DNS-related problems?
nslookup
45
Netstat is a command-line utility which can be used for:
Displaying active TCP/IP connections
46
Which of the statements listed below describe the purpose behind collecting OSINT?
Gaining advantage over competitors Passive reconnaissance in penetration testing Preparation before launching a cyberattack
47
In penetration testing, active reconnaissance involves gathering any type of publicly available information that can be used later for exploiting vulnerabilities found in the targeted system. True or False?
False
48
In penetration testing, passive reconnaissance relies on gathering information on the targeted system with the use of various non-invasive software tools and techniques, such as pinging, port scanning, or OS fingerprinting. True or False?
False
49
Which of the terms listed below refers to a software that no longer receives continuing support?
End of Life EOL
50
A command-line tool that can be used for banner grabbing is called:
netcat
51
Technical controls
use technology
52
Management contraols
use adminastrative and management methods
53
Detective controls
attempt to detect incidents after they have occurred
54
Operational controls
implemented by people in dat-today operations
55
Corrective controls
attempt to reverse the impact of an incident
56
Deterrent controls
attempt to discourage individuals from causing an incident
57
Compensating controls
are alternative controls used when a primary control is not feasible
58
What port is IPsec ESP?
51
59
What port is IPsec AH?
50
60
What port is GRE?
47
61
What port is SMTPS?
143
62
What port is LDAP on?
389
63
What is a full tunnel?
Encrypts all traffic after a user has connected to a VPN using a tunnel.
64
What is a split tunnel?
Only encrypts traffic destined for the VPN's private network.
65
What is IPsec tunnel mode?
Encrypts the entire IP packet used in the internal network.
66
What is IPsec Transport?
Encrypts the payload and is used within private networks, not VPN traffic.
67
What is a stateful firewall?
Makes decisions based on the context or state of the traffic. Keeps track of established sessions and inspects traffic based on it's state with in a session
68
What is a stateless firewall?
Use rules implemented by ACLs to identify allowed and blocked traffic.
69
What is shimming?
When an attacker places some malware between an application and some other file and intercepts the communication to that file
70
What is refactoring?
Process of changing names of variables, functions, etc in a program.
71
What is a forward proxy?
Single location that provides access to a wide range of web sources
72
What is a reverse proxy?
Internal facing proxy used as a front end to control and protect access to a server on a private network.
73
What is an open proxy?
Usable by anyone on the internet?