Book Cards (set 2) Flashcards

1
Q

How can you determine how critical a vulnerability is?

A

Check CVSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When customer data is being collected, what role does the customer fulfil?

A

Data Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can be used in a database if you only want to see the last three digits of a VISA card number?

A

Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can data be stolen from an air-gapped network?

A

Removable device such as a USB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you verify the last time a file had been updated?

A

Check its metadata or version control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is VM Escape?

A

An attack in which a hacker attacks the host, hypervisor, or guest from a vulnerable guest virtual machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of a snapshot?

A

A snapshot allows you to roll back a virtual machine to a previous set of settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What tool could an attacker use to carry out a pivoting attack?

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What virtual environment is controlled by the company and accessed by a thin client?

A

Virtual Desktop Infrastructure (VDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What would allow you to roll back to an old operating system or configuration?

A

Snapshot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An IT Technician tried to apply an update to an Exchange Server for the first time but was unsuccessful. What is the most likely reason for this?

A

The organization has implemented the principle of least privilege and has not granted the technician the correct permissions to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In an IaaS model, who is responsible for securing the data?

A

The client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of attack changes its hash value as it replicates?

A

A polymorphic virus replicates and mutates as it moves from host to host, which changes the hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the easiest way to check a server�s settings on a daily base?

A

Use automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the easiest way to set up desktops in a cloud environment?

A

Using Infrastructure as Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can the IT Team protect a manager�s laptop when away from the office?

A

by implementing a Secure Web Gateway (SWG)

17
Q

What are you searching for when you are trying to find out the cause of an incident?

A

Root Cause Analysis

18
Q

When you deliver normal training followed by more advanced training, what is this called?

A

Phased Rollout

19
Q

How should you investigate potentially dangerous malware?

A

Test it in a virtual machine or cuckoo sandbox

20
Q

What type of board provides oversight, governance, and an additional layer of assurance that an organization is effective?

A

Audit committee

21
Q

What involves the meticulous examination of an organization�s processes, practices, and policies to ensure they align with regulatory requirements?

A

Due diligence

22
Q

You have rolled out 10 Wireless Access Points (WAP) across a company but are unable to connect them all to the wireless network. What should you have done before implementing the rollout?

A

A site survey should have been carried out before installing a wireless network as many factors can interfere with the communication

23
Q

How can you circumvent a captive portal at an airport?

A

You could spoof a MAC address to bypass it

24
Q

What type of wireless payment is commonly used on mobile telephones?

A

Near Field Communication (NFC)

25
Q

What do you need to install on a wireless device that is going to use EAP-TLS for authentication?

A

EAP-TLS requires a valid certificate to be installed on the endpoint