Book Cards (set 4) Flashcards

1
Q

How can you confirm the reliability of a system?

A

Check the Mean Time Between Failure (MTBF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What holds the private keys for third parties and where are they stored?

A

Key Escrow stores third party private keys in the Hardware Security Module (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of attack uses a .ryk file extension?

A

Ransomware (Ruyk, in this case)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of system would generate a PII error?

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What tells you if your certificate is valid?

A

The Certificate Revocation List (CRL) will do so by default, even if you have no internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of interception attack involves data forwarded at a later date, and what authentication protocol can prevent it?

A

A replay attack. This can be prevented using Kerberos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of attack uses the path ......\etc\shadow?

A

Directory Traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of attack is it when someone pretends to be from the helpdesk and calls you to reset your password?

A

A Social Engineering impersonation attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of virus attack cannot be detected by anti-virus software, NIDS, NIPS, or a SIEM system? How can you detect it?

A

A Zero-Day virus has no updates to be identified by any anti-virus software or system until 2-3 days after discovery. The only way to detect it is by comparing the original baseline with the current baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of attack is it when the HR Manager sends you an email demanding that you complete a form that has your personal details?

A

A social engineering authority attack sends you an email apparently from a high-level executive such as the CEO or HR manager to obtain your details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

!

A

!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What authentication model uses tokens?

A

OAuth 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What authentication model uses tickets?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What authentication model uses cookies?

A

Federated Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What authentication model prevents replay attacks?

A

Kerberos, using USN and time stamps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What authentication model uses extended attributes?

A

Federated Services

17
Q

What is the file extension and format of a Public Key?

A

The Public Key has a file extension of .cer and a P7B format

18
Q

What authentication model reduces the number of times you need to authenticate within a system?

A

Single sign on (SSO)

19
Q

What authentication protocol supports OpenID Connect?

A

OAuth

20
Q

What authentication model prevents the hash attack?

A

Kerberos

21
Q

What authentication model do IaaS, PaaS, and SaaS all use?

A

Federation Services is the authentication model used by the cloud, though it can also use SAML tokens

22
Q

When a users certificate becomes corrupt, what support person will help them get their data back, what key will they need, and where will they obtain that key?

A

The Data Recovery Agent (DRA) will obtain a copy of your Private Key from the Key Escrow to decrypt your data

23
Q

What is the file extension and format of a Private Key?

A

The Private Key has a P12 format with an extension of .pfx

24
Q

What authentication model is third party to third party?

A

Federated Services