CyberBook2 Flashcards

1
Q

Following log is an example of
https://www.comptia.org/contact-us/%3file..%324322fpasswd

what attack is this?

A

Directory transversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a known security risk associated with data archives that contain financial information?

A

Data becomes a liability if archived longer than required by regulatory guidance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Policy that provides greater depth and breadth of knowledge across an orgnaization?

A

Job rotation policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tokenization of credit card information of a public cloud proider.

A

Cloud Access Security Broker (CASB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two subnets that should be able to communicate with each other directly. What should be deployed so server admins can access these devices?

A

Jump Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security analysis required deploy workstations in a room where data cannot be stored. File share is in local data center. What should be implemented?

A

VDI and thin clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What prevents employees from visiting inappropriate websites?

A

AUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What tool can be used to scan a network to perform vulnerability checks and compliance auditing.

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following protocols is commonly used to collect information about CPU utilization and memory usage from network devices?

A

Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of report that shows controls are in place to protect customer data. Usally from third-party vendors and CISO may request this report.

A

Soc 2 Type Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of scan that provides calculated value for known vulnerabilities.

A

CVSS; Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What provides a current state or image of VM’s state.

A

Snapshot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Command to see which ports on a network are in a listening state.

A

Netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tool used to facilitate incident response threat hunting and security configuration both standalone and integrated with SIEM.

A

SOAR; Security Orchestration Automation Response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is something that redirects you when clicking on a link that you didnt intend to go to, for instance (bank payments)

A

XSRF-CSRF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company wants to do buissness with global markeys, what international standard should the data protection officer be concerned about.

A

ISO 2701

17
Q

a Chief Information Security Officer wants to ensure zone transfers and integrity is validated, what should be implemented

A

DNSSEC

18
Q

What do you refer to if OS-leve configurations are not in compliance due too outdated hardening?

A

CIS benchmark; Center for Internet Security controls.

19
Q

Cloup computing concept is BEST described as focusing on the replacement of physical hardware at a customer’s location with cloud-based resources?

A

IaaS; Infrastructure as a service.

20
Q

Cloud computing concept BEST described as focusing on the replacement of hardware and software required when creating and testing new applications?

A

PaaS; Platform as a Service, rent fully configured systems for specific tasks.

21
Q

Data rentention policy is mainly used for what?

A

Min, Max and Description of information. There is no need for classification or security techniques in such a policy.

22
Q

Data retention policy is mainly used for what?

A

Min, Max and Description of information. There is no need for classification or security techniques in such a policy.

23
Q

What type of cloup service BEST describes using it for their programming environment?

A

PaaS; Platform as a service

24
Q

What type of cryptographic algorithms is PGP?

A

Asymmetric.

25
Q

What type of cryptographic algorithms is DES/3DES

A

Symmetric.

26
Q

What is the difference between Bluejacking/Bluesnarfing.

A

Bluejacking is harmless and only transmits data; Bluesnarfing attempts to steal data.

27
Q

If there is an sql injection, and the systems cannot be taken offline, what compensating tool can be used?

A

WAF; Web application firewall.

28
Q

What type of authentication method involdes token based authentication THAT expires?

A

TOTP; Time-based One-time Password Algorithm. HOTP; reissues upon receiving a new one.

29
Q

What type of command is used in linux to change the permission of a file.

A

chmod;

30
Q

What allows a company to use one digital certificate for all subdomains?

A

Wildcard