BATTLE VICTORY Flashcards

1
Q

X is a standalone malicious programs that replicate, execute, and spread across network connections independently, without human intervention

A

Computer worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which file permission that allow a user to view only the file shared

A

READ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Next step taken after technician identify the problems in troubleshooting process

A

Establish a theory of probable cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security practice to protect wireless router from dictionary attack

A

Use WPS instead of WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Main function of data wiping

A

Overwriting the data to completely destroy all reside electronic data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Username cannot contain < or _

A

WRONG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Man-in-the-Middle is one of an example of Access Attack

A

CORRECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Technique used by the attackers use image files to hide some information for malicious purposes

A

Steganography. Steganography hides the existence of the message. It replaces bits of unused data into the usual files such as graphic, sound, text, audio and video with some other surreptitious bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

U ARE REALLY GOOD in Caesar ciphertext

A

X DUH UHDOOB JRRG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One example of hash method

A

MD5/ SHA1 / SHA-512/256 / CRC32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Technology that should be implemented to ensure data confidentiality as data is transmitted in the following situation.

“An organization allows employees to work from the outside network to access the data for a specific purpose”

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Purpose of the AAAA Record in Domain Name System (DNS) record

A

IPv6 address resolution record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Type of hacker that performs an attack on the system by using tools and knowledge found on the internet

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dehashing is a process to reverse hash back to the original data

A

WRONG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spear phishing randomly attack its victim by sending an email involve an attachment that loads malware into computer

A

WRONG. Spear phishing is a very targeted type of phishing activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

John the Ripper is a technical assessment tool used to test the weakness of ?

A

Password
(John the ripper is the tool for brute force password attack. It is used to find a password combination)

17
Q

Decrypted form of message

A

Plaintext

18
Q

In which of the wireless network, a user does not need to know the password to connect?

A

WPS

19
Q

Forth requirement in creating security policy

A

REVIEW DRAFT POLICIES AND STANDARDS WITH MANAGEMENT, USERS, AND LEGAL COUNSEL

20
Q

Suggest possible solution for the problems below::
“A wireless network is compromised even though 128-bit WEP encryption is in used”

A
  1. Change to WPA-2
  2. Use MAC address filtering for network who didn’t support WPA-2