Cryptography and PKI Flashcards
as the security administrator in your
PFX
P12
Your company has recently implemented
public key
private key
which security measure is implemented to help detect fraud
mandatory vacations
job rotation
your company operates with a strict no byod
network scanner
which type of standalone
worm
you’re busy with the setup of a wireless
thin
Its important that you know how to use the windows command line interface
A Used to test a connection to a remote device
B Opens a port on a system and sends data
C Performs port scans on a network
D troubleshoots DNS name
E displays the TCP/IP config
F follows the path a packet takes to travel through the network
Which concept is based on determining how much date an
RPO
Your company requires the strongest AAA
TACACS+
As part of your Risk assessment you are
Privacy considerations
Supply chain assessment
You are in the process of configuring a wireless access point
CCMP
Your organization wants to ensure they are not using any weak
AES
You are an IT security admin
Obtain management’s explicit authorization
Network switches can be configured to operate ate layer 2 or 3
Layer 2 BDC
Layer 3 A
You are reviewing the work done by a security
Improper certificate and key management
The secure sockets layer or SSL protocal
firewalls
Which diffle-hellman
DH group 20
you need to provide a username ,pin,
hardware token
as a developer you need to protect code
xor
which of the following network devices can be used for these confi
router
you are attending a concert for a local band
replay attack
nfc
when a lack of original vendor
end . of life systems
both the secure sockets layer, ssl, and transport security, or tls protocols can be used to encrypt
load balancers
when talking about open-source intelligence
open-source intelligence is data that has been collected from publicly available sources
which technology allows users to use the same identification data to gain
federation
which of the following technologies can assist with asset tracking
rfid tags
you get a call from a user and they state that they called last week
consensus
which group policy setting should be configured to ensure that users are forced to use a password
passwords must meet complexity requirements
which influence tactic creates a feeling of urgency
scarcity
which item is typically used for the implementation of a key
patented cylinders
as a security administrator managing the cryptography of your network, you are concerned about the methodology
pseudo-random number generation
a system on your network was accessed during working hours and some sensitive
perform usage auditing and review
perform permission audition and review
which access control mechanism uses time as a factor to limit
totp
a hacker located an unknown
the hacker discovered a zero-day vulnerability
keeping a network secure requires a fair amount of administrative oversight
A encrypts all the data sent to and from
B secures diagnostic date while
C confirms the authenticity of domain name records
Spoofing poses a threat to network security
- configure the router or - switch to use RF
scan for and deny MAC
disable any interfaces that
a hacker has just completed their reconnaissance
initial exploitation
Your company’s security policy has been updated to ensure peripheral devices
disable the built-in web server function for all printers to stop unauthorized access
which security practice should you use in an organization to ensure
least privilege
with mobile device management
sms,mms, and wifi
usb otg
microphone recordings
camera usage
jailbreaking a cell phone is
escalation of privilege
what is a minimum requirement when placing mission-critical
use electronic access control with all entry attempts logged
e-mail has become the norm in many organizations but brings with it certain risks
data loss prevention
server-to-server encryption
spam filter
you need to install a fence around your company
an 8-foot fence
your organization is required to consolidate single-sign on and authorization by extending
cloud access security brokers
you have been hired as a security consultant for a small company
create an incident management document
which type of attack is carried out using botnets
ddos
you oversee a group of developers creating a sales
performing dynamic analysis
one of the main security flaws in the company’s applications is data exposure
encapsulation
as an administrator, you need to be prepared to handle any number
A subscription
B DHCP
C NTP
which type of interoperability
bpa
you have been hired by a company and directed to use a non-domain account
vulnerable business processes
preventing password crackers from accessing your password
salting passwords
setting a maximum number of login attempts
enforcing rules for creating strong passwords
when speaking about penetration testing, which
installing a backdoor that needs authentication
you work for an organization that is reviewing its network topology
ddos mitigation
installing and maintaining applications on a network can lead to
ensure that each application uses its own account
use biometrics or one-time access codes
which role is responsible for processing
data custodian
you have been tasked with setting up a wireless network at a small branch office
limit the signal strength to the minimum required
which IDS monitoring
heuristic-based
an intruder shows interest in an employee
liking
users are reporting that when entering the url of a company website
DNS poisoning
you are performing a threat assessment
environmental
a new batch of changes hav ebeen
test the code on a virtual machine
you have been tasked with implementing security measures to protect your databases from
run security automation tools
implement stored procedures
a malicious user disconnects
evil twin
which shared authentication scheme allows users to access web-based services
openID connect
you are a network administrator of a large company that consists of 30,000 employees
assign group-based privileges
place user accounts into groups
which authentication method is commonly used as part of an SSO implementation
Kerberos
due to the popularity of the raspberry pi
soc
you need to provide a username, pin, and a generated passcode to successfully log in to a computer
hardware token
your company has some important clients visiting the office
guest account
You are planning to encrypt a file using a symmetric algorithm that encrypts data
stream cipher
as the security administrator of you organization you have been asked to identifity
privacy impact assessment
which of the following is a form of a smart card
cac
as a system administrator there are
capturing traffic traveling on the network
which term is described as the ability to
pivoting
as a network technician
maximum password age
enforce password history
match the cryptographic attacks
A has acces to the crib
B the attack is success
A advanced encryption standard
AB has access to ciphertext
which non-persistent solution provdes
use the live boot media
which type of malware usually delivers itselfqRAT
RAT
your company has recently implemented a PKI
CRL OCSP
Which type of malware usually delivers itself via a trojan
RAT
You are working for a company that suspects an unauthorized
implemetn SPAN
in preparation for the real incident, you schedule an exercise and
cyber-incident response teams
roles and responsibilities
reporting requirements//escalation
which of the following uses a brute force
birthday
as a security administrator managing
low latency
resource constraints
which option represents the strongest
twofish
you are the network professional for a small boutique
800000
which option provides port-based
802.1X
you need to perform a risk assessment
BIA
which of the following are examples of active reconnaissance
a vulnerability scanner
the usage of the tool traceroute
port scanning
when protecting data-in-transit
session key
a system administrator is configuring a NIDS
rules
which of the following is an example of an environmental control
hot and cold aisles