Cryptography and PKI Flashcards

1
Q

as the security administrator in your

A

PFX

P12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your company has recently implemented

A

public key

private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which security measure is implemented to help detect fraud

A

mandatory vacations

job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

your company operates with a strict no byod

A

network scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which type of standalone

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

you’re busy with the setup of a wireless

A

thin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Its important that you know how to use the windows command line interface

A

A Used to test a connection to a remote device
B Opens a port on a system and sends data
C Performs port scans on a network
D troubleshoots DNS name
E displays the TCP/IP config
F follows the path a packet takes to travel through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which concept is based on determining how much date an

A

RPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your company requires the strongest AAA

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

As part of your Risk assessment you are

A

Privacy considerations

Supply chain assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are in the process of configuring a wireless access point

A

CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your organization wants to ensure they are not using any weak

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are an IT security admin

A

Obtain management’s explicit authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network switches can be configured to operate ate layer 2 or 3

A

Layer 2 BDC

Layer 3 A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are reviewing the work done by a security

A

Improper certificate and key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The secure sockets layer or SSL protocal

A

firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which diffle-hellman

A

DH group 20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

you need to provide a username ,pin,

A

hardware token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

as a developer you need to protect code

A

xor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

which of the following network devices can be used for these confi

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

you are attending a concert for a local band

A

replay attack

nfc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

when a lack of original vendor

A

end . of life systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

both the secure sockets layer, ssl, and transport security, or tls protocols can be used to encrypt

A

load balancers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

when talking about open-source intelligence

A

open-source intelligence is data that has been collected from publicly available sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

which technology allows users to use the same identification data to gain

A

federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

which of the following technologies can assist with asset tracking

A

rfid tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

you get a call from a user and they state that they called last week

A

consensus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

which group policy setting should be configured to ensure that users are forced to use a password

A

passwords must meet complexity requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

which influence tactic creates a feeling of urgency

A

scarcity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

which item is typically used for the implementation of a key

A

patented cylinders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

as a security administrator managing the cryptography of your network, you are concerned about the methodology

A

pseudo-random number generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

a system on your network was accessed during working hours and some sensitive

A

perform usage auditing and review

perform permission audition and review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

which access control mechanism uses time as a factor to limit

A

totp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

a hacker located an unknown

A

the hacker discovered a zero-day vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

keeping a network secure requires a fair amount of administrative oversight

A

A encrypts all the data sent to and from
B secures diagnostic date while
C confirms the authenticity of domain name records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Spoofing poses a threat to network security

A
  • configure the router or - switch to use RF
    scan for and deny MAC
    disable any interfaces that
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

a hacker has just completed their reconnaissance

A

initial exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Your company’s security policy has been updated to ensure peripheral devices

A

disable the built-in web server function for all printers to stop unauthorized access

39
Q

which security practice should you use in an organization to ensure

A

least privilege

40
Q

with mobile device management

A

sms,mms, and wifi
usb otg
microphone recordings
camera usage

41
Q

jailbreaking a cell phone is

A

escalation of privilege

42
Q

what is a minimum requirement when placing mission-critical

A

use electronic access control with all entry attempts logged

43
Q

e-mail has become the norm in many organizations but brings with it certain risks

A

data loss prevention
server-to-server encryption
spam filter

44
Q

you need to install a fence around your company

A

an 8-foot fence

45
Q

your organization is required to consolidate single-sign on and authorization by extending

A

cloud access security brokers

46
Q

you have been hired as a security consultant for a small company

A

create an incident management document

47
Q

which type of attack is carried out using botnets

A

ddos

48
Q

you oversee a group of developers creating a sales

A

performing dynamic analysis

49
Q

one of the main security flaws in the company’s applications is data exposure

A

encapsulation

50
Q

as an administrator, you need to be prepared to handle any number

A

A subscription
B DHCP
C NTP

51
Q

which type of interoperability

A

bpa

52
Q

you have been hired by a company and directed to use a non-domain account

A

vulnerable business processes

53
Q

preventing password crackers from accessing your password

A

salting passwords
setting a maximum number of login attempts
enforcing rules for creating strong passwords

54
Q

when speaking about penetration testing, which

A

installing a backdoor that needs authentication

55
Q

you work for an organization that is reviewing its network topology

A

ddos mitigation

56
Q

installing and maintaining applications on a network can lead to

A

ensure that each application uses its own account

use biometrics or one-time access codes

57
Q

which role is responsible for processing

A

data custodian

58
Q

you have been tasked with setting up a wireless network at a small branch office

A

limit the signal strength to the minimum required

59
Q

which IDS monitoring

A

heuristic-based

60
Q

an intruder shows interest in an employee

A

liking

61
Q

users are reporting that when entering the url of a company website

A

DNS poisoning

62
Q

you are performing a threat assessment

A

environmental

63
Q

a new batch of changes hav ebeen

A

test the code on a virtual machine

64
Q

you have been tasked with implementing security measures to protect your databases from

A

run security automation tools

implement stored procedures

65
Q

a malicious user disconnects

A

evil twin

66
Q

which shared authentication scheme allows users to access web-based services

A

openID connect

67
Q

you are a network administrator of a large company that consists of 30,000 employees

A

assign group-based privileges

place user accounts into groups

68
Q

which authentication method is commonly used as part of an SSO implementation

A

Kerberos

69
Q

due to the popularity of the raspberry pi

A

soc

70
Q

you need to provide a username, pin, and a generated passcode to successfully log in to a computer

A

hardware token

71
Q

your company has some important clients visiting the office

A

guest account

72
Q

You are planning to encrypt a file using a symmetric algorithm that encrypts data

A

stream cipher

73
Q

as the security administrator of you organization you have been asked to identifity

A

privacy impact assessment

74
Q

which of the following is a form of a smart card

A

cac

75
Q

as a system administrator there are

A

capturing traffic traveling on the network

76
Q

which term is described as the ability to

A

pivoting

77
Q

as a network technician

A

maximum password age

enforce password history

78
Q

match the cryptographic attacks

A

A has acces to the crib
B the attack is success
A advanced encryption standard
AB has access to ciphertext

79
Q

which non-persistent solution provdes

A

use the live boot media

80
Q

which type of malware usually delivers itselfqRAT

A

RAT

81
Q

your company has recently implemented a PKI

A

CRL OCSP

82
Q

Which type of malware usually delivers itself via a trojan

A

RAT

83
Q

You are working for a company that suspects an unauthorized

A

implemetn SPAN

84
Q

in preparation for the real incident, you schedule an exercise and

A

cyber-incident response teams
roles and responsibilities
reporting requirements//escalation

85
Q

which of the following uses a brute force

A

birthday

86
Q

as a security administrator managing

A

low latency

resource constraints

87
Q

which option represents the strongest

A

twofish

88
Q

you are the network professional for a small boutique

A

800000

89
Q

which option provides port-based

A

802.1X

90
Q

you need to perform a risk assessment

A

BIA

91
Q

which of the following are examples of active reconnaissance

A

a vulnerability scanner
the usage of the tool traceroute
port scanning

92
Q

when protecting data-in-transit

A

session key

93
Q

a system administrator is configuring a NIDS

A

rules

94
Q

which of the following is an example of an environmental control

A

hot and cold aisles