100-150 Flashcards

1
Q
A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A

c denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A

A , AUP acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A

AD
domain hijacking = Domain hijacking, also called “domain theft”, is a type of domain name system spoofing in which a threat actor steals a domain name by changing the DNS registration to point the domain to malicious IP address on a different server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A

b rootkit = gives attacker control of a NW or app, sets up a backdoor

logic bomb = code embedded into the system when a specific thing happens(aka bootup) it activates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
A

d , the organization’s ability to implement its strategies, achieve its annual strategic objectives, and generally complete what it wants don

22
Q
A

c

23
Q
A

d

24
Q
A

b

25
Q
A
26
Q
A

d

27
Q
A

AC , head to display first transaction/ grep to search for specific string

27
Q
A
28
Q
A

a

29
Q
A
30
Q
A

a

31
Q
A
32
Q
A
33
Q
A

c

34
Q
A

b,Fuzz testing or fuzzing is an automated software testing method that injects invalid, malformed, or unexpected inputs into a system to reveal software defects and vulnerabilities

35
Q
A

a

36
Q
A

a

37
Q
A

a

38
Q
A

ad RAID works by placing data on multiple disks and allowing input/output (I/O) operations to overlap in a balanced way, improving performance. Because using multiple disks increases the mean time between failures, storing data redundantly also increases fault tolerance.

39
Q
A
40
Q
A

c

41
Q
A
42
Q
A

c

43
Q
A

c ATT&CK is freely available and is widely used by defenders in industry and government to find gaps in visibility, defensive tools and processes as they evaluate and select options to improve their network defense.

44
Q
A

b, NW based DLP monitors outgoing data looking for sensitive data. NW based DLP systems monitor outgoing email to detect and block unauthorized data transfers and monitor data stored in the cloud.

45
Q
A

d

46
Q
A
47
Q
A

c, Endpoint Detection and Response (EDR) is an integrated, layered approach to endpoint protection that combines real-time continuous monitoring and endpoint data analytics with rule-based automated response.

EDR excels at protecting endpoints, while IDS and IPS focus on network-level threats. Here’s how they work together: Threat Identification: IDS detects network-level threats and generates alerts. EDR on endpoints can provide additional context and help identify the source and impact of the threat.

48
Q
A

d

49
Q
A

b