1.4 Threat Management Flashcards

1
Q

according to the CySA+ objectives, what are the six rules of engagement for penetration testing?

A
timing
scope
authorization
exploitation
communication
reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a DHCP server normally placed inside a DMZ?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is meant by the term exploitation in regards to rules of engagement in penetration testing?

A

all exploits that will be attempted during a scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is decomposition?

A

the process of breaking software or malware down to discover how it works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is meant by the term scope in regards to vulnerability testing?

A

the devices or parts of the network that can be scanned and the types of scans to be performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

which technology enables a LAN to use one set of IP addresses for internal traffic and a second set of addresses for external traffic, while hiding internal addresses or address space?

A

NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

which assessment determines whether network security is properly configured to rebuff hacker attacks?

A

penetration test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the purpose of network segmentation?

A

to isolate a group of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what can be used to run a possibly malicious program in a safe environment?

A

sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which term is used for the process of verifying the integrity of a file by using a hashing algorithm?

A

fingerprinting or hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the purpose of the blue team in a training exercise?

A

defending the device or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which documentation reduces the likelihood that you have received counterfeit equipment?

A

OEM (original equipment manufacturer) documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which type of connectivity provides a remote user the ability to safely connect to his or her corporate network while maintaining data confidentiality and integrity?

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the purpose of the red team in a training exercise?

A

attacking the devices or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is meant by the term timing in regards to penetration testing?

A

the time when the test should occur and when it should not occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the primary security advantage of using NAT?

A

NAT hides internal IP addresses from the public network

17
Q

what is meant by the term authorization in regards to penetration testing?

A

the written agreement and legal authority to perform a vulnerability test

18
Q

which type of test attempts to exploit vulnerabilities?

A

penetration test or pentest

19
Q

which type of test ONLY identifies vulnerabilities?

A

vulnerability test

20
Q

what is the purpose of rules of engagement for penetration testing?

A

they define how a penetration test should occur, including the factors that limit the penetration test

21
Q

what does the acronym OEM denote?

A

original equipment manufacturer

22
Q

which team acts as the referee during a training exercise?

A

white team

23
Q

what is the purpose of the Trusted Foundry?

A

it identifies trusted vendors and ensures a trusted supply chain for the united states department of defense (DoD)

24
Q

does each VLAN create its own collision domain or its own broadcast domain?

A

broadcast domain