Book Cards (set 1) Flashcards

1
Q

What prevents people from stealing PII and sensitive information?

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of device could suffer an ARP attack?

A

A switch (because it works with MAC addresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two devices use ACL?

A

Firewall and router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What device sits in the screened subnet, authenticates incoming users, and decrypts incoming traffic?

A

Reverse Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What device could you install to manage a high volume of incoming web traffic?

A

A load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network administrator is going to change firewall rules. What should they do FIRST?

A

Follow the Change Management Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What kind of records are created by DNS poisoning, and how can we prevent this attack?

A

DNS poisoning creates RRSIG records and can be prevented using DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What device joins multiple networks together?

A

A router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of control does a SIEM system adopt?

A

Detective Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of attack affects weak database configuration? What are the symptoms?

A

SQL Injection, symptoms of which include the insertion of malicious code such as 1=1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If an attacker is gathering information from a companys website and Facebook page, what type of reconnaissance is this?

A

Passive reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of data does a VPN protect?

A

Data in Transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why would we use an Access Control Vestibule in a datacenter?

A

To control access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can you use to isolate an application from the underlying operating system?

A

Containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How will a company push out an update to their password policies?

A

GPO - Group Policy Update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do digital signatures and hashing have in common?

A

They both provide non-repudiation

17
Q

The company SIEM system has detected an attack on a file server, but a manual inspection of the file server finds nothing. What does this decribe?

A

A false positive

18
Q

How can you prevent buffer overflow, integer overflow, and SQL injection attacks?

A

Input validation can prevent all three of these attacks as it controls input to an application or database. A stored procedure is another prevention method that will prevent a SQL injection attack, and this should be the first choice for a database.

19
Q

What type of threat actor might be employed by the Nation State or APT?

A

Organized crime

20
Q

Which threat actor is socially or politically motivated?

A

Hacktivist

21
Q

Which threat actor wants your trade secrets?

A

Competitor

22
Q

Which threat actor would buy a program from the Dark Web?

A

Script kiddie

23
Q

What type of attack involves the insertion of too many characters into a data field on a web server?

A

Buffer overflow

24
Q

What can you do to check if a USB drive has a virus?

A

Inspect it using a sandbox. Use sandboxes for testing, checking patches, and investigating malware.

25
Q

What risk treatment is being used if you purchase insurance or outsource your IT?

A

Risk Transference