Book Cards (set 3) Flashcards

1
Q

What provides a detailed breakdown of the work to be performed, the timeline for completion, the expected deliverables, and the agreed-upon compensation?

A

Statement of Work (SOW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What signifies that an organization acknowledges its responsibilities and will adhere to the prescribed regulations?

A

Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How might you recover old data from an encrypted smart card?

A

A key escrow will have an old copy of the private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What agreement type is measured in metrics?

A

Service Level Agreement (SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Apart from due diligence, what would prevent you from selecting a particular vendor?

A

Conflicts of interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of pen testing works on a rewards basis?

A

Bug Bounty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is your risk strategy if you take no action?

A

Risk Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can you find out who amended a medical record?

A

Review the audit trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Nessus?

A

A remote scanning tool that can identify vulnerabilities that hackers can exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What looks at payment terms, resolution mechanism disputes, confidentiality clauses, and liability provisions?

A

A Master Service Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an on-path attack?

A

It is an interception attack, examples of which include Man-in-the-Middle and replay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of attack uses a tar.gz file extension?

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Code phrases 1=1 and SELECT * are indicative of what kind of attack?

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What log files detail the surfing habits of a user?

A

DNS Log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What framework examines the adversary, capabilities, infrastructure, and victim in an attack?

A

The Diamond Model of Intrusion Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of attacks use HTML tags and JavaScript?

A

Cross Site Scripting (XSS)

17
Q

How can you tell if a script is JavaScript?

A

It has a .js file extension

18
Q

How can you identify which websites an individual has visited?

A

Check DNS log files

19
Q

In what type of attack would multiple board members be sent an email asking for their bank details?

A

Spear Phishing attack

20
Q

How can a CSP load balance data?

A

using geographical dispersion

21
Q

What type of attack redirects you from a legitimate website to a fraudulent one?

A

Pharming or DNS Poisoning

22
Q

If you steal someone elses cookie, what type of attack is this?

A

Session Replay, sometimes know as session hijacking

23
Q

Why would you use a honeypot?

A

To attract an attacker and monitor their attack methods

24
Q

What would happen if a financial institution failed a PCI DSS inspection?

A

The institution would be issued a regulatory fine

25
Q

How could an administrator access a network with a VPN?

A

using a jump server