Book Cards (set 2) Flashcards
How can you determine how critical a vulnerability is?
Check CVSS
When customer data is being collected, what role does the customer fulfil?
Data Subject
What can be used in a database if you only want to see the last three digits of a VISA card number?
Masking
How can data be stolen from an air-gapped network?
Removable device such as a USB
How can you verify the last time a file had been updated?
Check its metadata or version control
What is VM Escape?
An attack in which a hacker attacks the host, hypervisor, or guest from a vulnerable guest virtual machine
What is the purpose of a snapshot?
A snapshot allows you to roll back a virtual machine to a previous set of settings
What tool could an attacker use to carry out a pivoting attack?
nmap
What virtual environment is controlled by the company and accessed by a thin client?
Virtual Desktop Infrastructure (VDI)
What would allow you to roll back to an old operating system or configuration?
Snapshot
An IT Technician tried to apply an update to an Exchange Server for the first time but was unsuccessful. What is the most likely reason for this?
The organization has implemented the principle of least privilege and has not granted the technician the correct permissions to do so.
In an IaaS model, who is responsible for securing the data?
The client
What type of attack changes its hash value as it replicates?
A polymorphic virus replicates and mutates as it moves from host to host, which changes the hash.
What is the easiest way to check a server�s settings on a daily base?
Use automation
What is the easiest way to set up desktops in a cloud environment?
Using Infrastructure as Code