Basic Flashcards

1
Q

What type of cryptographic algorithm is 3DES.

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of cryptographic algorithm is RSA

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of cryptographic algorithm is ECC

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Detection and analysis for remote workstations

A

Behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of vulnerabilities involve leveraging access from a VM to other machines on the hypervisor?

A

VM escpace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Best device to proactively stop outside attackers from reaching internal network.

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of data breach would require the US Dept of health and human services and media be notified if 500 individuals are affected.

A

protected health information (PHI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bio metric feature for matching petterns on the eyes surface using near-infrared imaging.

A

Iris scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is port 53 used for?

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is port 80 used for?

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is port 25 used for?

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is port 69 used for?

A

TFTP or trivial file transfer protocol that has no user authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SHA-2 creates what bit fixed output.

A

256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MD-5 creates what bit fixed output?

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RIPEMD creates what bit fixed output?

A

160

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

First step in creating disaster recovery plan?

A

Identify the organization’s assets.

17
Q

First step for a Incident Response process?

A

Preparation

18
Q

Second step for a Incident Response process?

A

Identification

19
Q

Third step for a Incident Response process?

A

Containment

20
Q

Fourth step for a Incident Response process?

A

Eradication

21
Q

Breach of PCI-DSS is to be reported to whom?

A

Visa and Mastercard

22
Q

War walking is what type of threat or attack?

A

By walking around finding wireless networks and devices.

23
Q

Race condition is what type of vulnerability?

A

Outcome of execution is dependent on certain events. EX. Hacker changes a config file to gain lives for free.