22 Flashcards
A trusted third-party storage solution providing backup source for cryptographic keys is referred to as:
** Key escrow **
Key escrow is a method of storing important cryptographic keys
Copies of lost private encryption keys can be retrieved from a key escrow by recovery agents. Recovery agent is an individual with access to key database and permission level allowing him/her to extract keys from escrow.
True
The term “Certificate chaining” refers to the process of verifying authenticity of a newly received digital certificate. Such process involves checking all the certificates in the chain of certificates from a trusted root CA, through any intermediate CAs, down to the certificate issued to the end user. A new certificate can only be trusted if each certificate in that certificate’s chain is properly issued and valid.
True
A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called:
tracert
A Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as:
traceroute
Which of the following answers refer to network administration command-line utilities used for DNS queries? (Select 2 answers)
- dig
- nslookup
What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings?
ipconfig
Which of the following command-line tools is used for discovering hosts and services on a network?
nmap
The Linux command-line utility for network interface configuration is called:
ifconfig
A command-line utility used for checking the reachability of a remote network host is known as:
ping
Which network command-line utility in MS Windows combines the features of ping and tracert?
pathping
Which of the following answers refers to a command-line tool used for security auditing and testing of firewalls and networks?
hping
Netstat is a command-line utility used for: (Select 2 answers)
- Displaying active TCP/IP connections
- Displaying network protocol statistics
Which of the following terms is used to describe a text message containing system information details displayed after connecting to a service on a server?
banner
The practice of connecting to an open port on a remote host to gather more information about its configuration is known as:
Banner grabbing