22 Flashcards
A trusted third-party storage solution providing backup source for cryptographic keys is referred to as:
** Key escrow **
Key escrow is a method of storing important cryptographic keys
Copies of lost private encryption keys can be retrieved from a key escrow by recovery agents. Recovery agent is an individual with access to key database and permission level allowing him/her to extract keys from escrow.
True
The term “Certificate chaining” refers to the process of verifying authenticity of a newly received digital certificate. Such process involves checking all the certificates in the chain of certificates from a trusted root CA, through any intermediate CAs, down to the certificate issued to the end user. A new certificate can only be trusted if each certificate in that certificate’s chain is properly issued and valid.
True
A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called:
tracert
A Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as:
traceroute
Which of the following answers refer to network administration command-line utilities used for DNS queries? (Select 2 answers)
- dig
- nslookup
What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings?
ipconfig
Which of the following command-line tools is used for discovering hosts and services on a network?
nmap
The Linux command-line utility for network interface configuration is called:
ifconfig
A command-line utility used for checking the reachability of a remote network host is known as:
ping
Which network command-line utility in MS Windows combines the features of ping and tracert?
pathping
Which of the following answers refers to a command-line tool used for security auditing and testing of firewalls and networks?
hping
Netstat is a command-line utility used for: (Select 2 answers)
- Displaying active TCP/IP connections
- Displaying network protocol statistics
Which of the following terms is used to describe a text message containing system information details displayed after connecting to a service on a server?
banner
The practice of connecting to an open port on a remote host to gather more information about its configuration is known as:
Banner grabbing
Which of the following answers refers to a network debugging and exploration tool that can read and write data across TCP or UDP connections?
netcat
The arp command can be used to perform what kind of resolution?
IP to MAC
Which of the following command-line commands in MS Windows are used to display the contents of a routing table? (Select 2 answers)
- route print
- netstat -r
A Linux command-line command for displaying routing table contents is called
netstat -r
Which of the following answers refers to a command-line tool used to download or upload data to a server via any of the supported protocols, such as FTP, HTTP, SMTP, IMAP, POP3, or LDAP?
curl
Which of the following tools is used for gathering OSINT?
theHarvester
Which of the following answers refers to an advanced network exploration and penetration testing tool integrating functionalities from multiple other tools, such as ping, whois, or nmap?
sn1per
Which of the following tools hides attacker’s identity by utilizing a proxy for port scanning?
scanless
Which of the following tools would be best suited for gathering information about a domain?
dnsenum
Which of the following tools offers the functionality of a configuration compliance scanner?
nessus