CYBR 4330 - Week 1 Flashcards
standard that describes the creating of a certificate
X.509
technique that uses a phishing e-mail to lure a user into following a malicious link
social engineering
A device that performs more than one function, such as printing and faxing is called what
MFD
A large organization that is responsible for sensitive or critical data may elect to create which of the following to do damage assessment, risk remediation, and legal consultation?
Security Operations Center
A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?
worm
What Windows operating system was the first to disable null sessions by default?
Windows Server 2003
Adobe System’s ColdFusion uses its proprietary tags, which are written in which of the following languages?
CFML
Carelessly reviewing your program’s code might result in having which of the following in your program code?
bug
Closed ports respond to a NULL scan with what type of packet?
RST
Connecting to an MS SQL Server database with Microsoft’s Object Linking and Embedding Database (OLE DB) requires using what provider?
SQLOLEDB
Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted text called which if the following?
ciphertext
Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm?
symmetric
Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device?
NetBIOS
For a Windows computer to be able to access a *nix resource, which of the following must be enabled on both systems?
CIFS
How many host computers can be assigned a valid IPv4 address when using a CIDR /24 prefix?
254
If a Cisco administrator needs to configure a serial or Fast Ethernet port, which configuration mode should they use?
Interface configuration mode
If a security expert decides to study the process of breaking encryption algorithms, they are performing what?
cryptanalysis
If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?
limit their scan speeds
If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?
Spyware
If an organization does not want to rely on a wireless device to authenticate users, which of the following is a secure alternative?
RADIUS server