Cryptography and PKI Flashcards
as the security administrator in your
PFX
P12
Your company has recently implemented
public key
private key
which security measure is implemented to help detect fraud
mandatory vacations
job rotation
your company operates with a strict no byod
network scanner
which type of standalone
worm
you’re busy with the setup of a wireless
thin
Its important that you know how to use the windows command line interface
A Used to test a connection to a remote device
B Opens a port on a system and sends data
C Performs port scans on a network
D troubleshoots DNS name
E displays the TCP/IP config
F follows the path a packet takes to travel through the network
Which concept is based on determining how much date an
RPO
Your company requires the strongest AAA
TACACS+
As part of your Risk assessment you are
Privacy considerations
Supply chain assessment
You are in the process of configuring a wireless access point
CCMP
Your organization wants to ensure they are not using any weak
AES
You are an IT security admin
Obtain management’s explicit authorization
Network switches can be configured to operate ate layer 2 or 3
Layer 2 BDC
Layer 3 A
You are reviewing the work done by a security
Improper certificate and key management
The secure sockets layer or SSL protocal
firewalls
Which diffle-hellman
DH group 20
you need to provide a username ,pin,
hardware token
as a developer you need to protect code
xor
which of the following network devices can be used for these confi
router
you are attending a concert for a local band
replay attack
nfc
when a lack of original vendor
end . of life systems
both the secure sockets layer, ssl, and transport security, or tls protocols can be used to encrypt
load balancers
when talking about open-source intelligence
open-source intelligence is data that has been collected from publicly available sources
which technology allows users to use the same identification data to gain
federation
which of the following technologies can assist with asset tracking
rfid tags
you get a call from a user and they state that they called last week
consensus
which group policy setting should be configured to ensure that users are forced to use a password
passwords must meet complexity requirements
which influence tactic creates a feeling of urgency
scarcity
which item is typically used for the implementation of a key
patented cylinders
as a security administrator managing the cryptography of your network, you are concerned about the methodology
pseudo-random number generation
a system on your network was accessed during working hours and some sensitive
perform usage auditing and review
perform permission audition and review
which access control mechanism uses time as a factor to limit
totp
a hacker located an unknown
the hacker discovered a zero-day vulnerability
keeping a network secure requires a fair amount of administrative oversight
A encrypts all the data sent to and from
B secures diagnostic date while
C confirms the authenticity of domain name records
Spoofing poses a threat to network security
- configure the router or - switch to use RF
scan for and deny MAC
disable any interfaces that
a hacker has just completed their reconnaissance
initial exploitation