Deck 1 Flashcards

1
Q

A short list of commonly used passwords tried against large number of user accounts is a characteristic feature of:

A

Spraying attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is does “Impossible travel” refer to?

A

a situation wherein an account is accessed from a location that is physically impossible for the user to be in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes?

A

VLSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following acronyms refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following policies applies to any requests that fall outside the criteria defined in an ACL?

A

Implicit Deny Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the answers listed below does not refer to the concept of network isolation?

A

DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the answers listed below refer to the concept of data isolation?

A

EFS + DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of document outlining the shared responsibilities between a CSP and its customers for securing and managing data and resources is known as:

A

Cloud responsibility matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following provides isolation from external computer networks?

A

Air gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the answers listed below refers to a specific type of ICS?

A

SCADA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the answers listed below refer(s) to embedded systems?

A

Often designed to operate in real-time or with low latency ( Your answer)

Typically equipped with constrained computing resources and storage (missed)

Designed to perform a single task or a few closely related tasks within a larger system ( Your answer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following terms can be used to describe a system designed to aim for minimized downtime and uninterrupted operation?

A

HA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of hardened server used as a secure gateway for remote administration of devices placed in a different security zone is called:

A

Jump server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following provides passive network security breach response on an individual computer system?

A

HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refers to network security technology designed to monitor WLANs for unauthorized access, security threats, and suspicious activities?

A

WIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In active-passive mode, load balancers distribute network traffic across:

A

Servers marked as active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following EAP methods offers the highest level of security?

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following answers refer to the characteristic features of a Layer 4 firewall?

A

Filters traffic based on source/destination IP addresses, ports, and protocol types

Operates at the transport layer of the OSI model

Offers basic (faster) traffic filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the answers listed below refer to a Layer 7 firewall?

A

Offers complex (slower) traffic filtering

Adds the ability to inspect the contents of data packets in addition to the header information

Operates at the application layer of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Examples of protocols typically used for implementing secure VPN tunnels include:

A

IPsec + TLS + L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following terms is used to describe a type of VPN that alleviates bottlenecks and conserves bandwidth by enabling utilization of both the VPN and public network links?

A

Split tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An HTML5 VPN portal is an example of clientless VPN implementation where an HTML5-compliant web browser along with TLS encryption can be used instead of a dedicated VPN client software.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following answers refers to a protocol designed to secure data transmitted over WLANs?

A

WTLS

24
Q

Which part of IPsec provides confidentiality, data integrity, and authentication?

A

ESP

25
Q

Which of the IPsec modes provides entire packet encryption?

A

Tunnel

26
Q

An IPsec mode providing encryption only for the payload (the data part of the packet) is referred to as:

A

Transport mode

27
Q

An IPsec mode providing encryption only for the payload (the data part of the packet) is referred to as:

A

SASE

28
Q

Which of the answers listed below refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

A

PII

29
Q

Which of the answers listed below refer(s) to encryption method(s) used to protect data at rest?

A

FDE + SED + EFS

30
Q

Encryption methods used to protect data in transit include:

A

VPN + IPsec + TLS

31
Q

Which of the following answers refers to an individual or role responsible for overseeing and ensuring compliance with data protection laws and policies within an organization?

A

DPO

32
Q

Which of the following answers refer to data masking?

A

Replaces sensitive data with fictitious or modified data while retaining its original format

   Allows for data manipulation in environments where the actual values are not needed
33
Q

Which of the following modifies data or code to make it difficult to understand or reverse-engineer, but without necessarily encrypting or hiding the data?

A

Obfuscation

34
Q

ACL, FACL, DAC, MAC, and RBAC are all access control mechanisms that can be used to manage user permissions and protect the confidentiality, integrity, and availability of data.

A

True

35
Q

Hardware RAID Level 0:

A

Requires a minimum of 2 drives to implement

   Is also known as disk striping 

   Decreases reliability (failure of any disk in the array results in the loss of all data in the array
36
Q

Hardware RAID Level 1:

A

Is also referred to as disk mirroring

37
Q

Hardware RAID Level 5:

A

Offers increased performance and fault tolerance (single drive failure does not destroy the array and lost data can be re-created by the remaining drives)

   Is also known as disk striping with parity
38
Q

Hardware RAID Level 10 (a.k.a. RAID 1+0)

A

Is referred to as stripe of mirrors, i.e., a combination of RAID 1 (disk mirroring) and RAID 0 (disk striping)

39
Q

Which of the following RAID levels does not offer fault tolerance?

A

6 + 0

40
Q

Which of the following is the primary function of clustering?

A

Groups servers together to provide high availability and fault tolerance

41
Q

Which of the terms listed below refers to a duplicate of the original site, with fully operational computer systems as well as near-complete backups of user data?

A

Hot site

42
Q

Which of the following terms refers to an alternate site that provides some pre-installed hardware and software and might have partial data backups, but it is not fully operational and requires additional configuration before use?

A

Warm site

43
Q

A disaster recovery facility that provides only the physical space for recovery operations is known as:

A

Mirror site

44
Q

What is the name of a U.S. government initiative that provides a set of procedures and plans that an organization can implement to ensure continued performance of its essential functions during unexpected events?

A

COOP

45
Q

A technique that allows to recover changes that occurred since the last backup in the event of a system crash is known as:

A

Journaling

46
Q

Which of the following power redundancy solutions would be best suited for providing long-term emergency power during an unexpected main power source outage?

A

Backup generator

47
Q

In the context of MDM, the isolation of corporate applications and data from other parts of the mobile device is referred to as:

A

Containerization

48
Q

An administrator needs to adjust the placement of multiple APs to ensure the best wireless signal coverage for the network. Which of the following would be of help in identifying areas of low signal strength?

A

Heat map

49
Q

Which of the answers listed below refers to a mobile device deployment model where organizations provide and own the devices while allowing their personal use?

A

COPE

50
Q

What is the name of a mobile device deployment model in which employees select devices for work-related tasks from a company-approved device list?

A

CYOD

51
Q

An SSID is a unique identifier (a.k.a. wireless network name) for a WLAN. Wireless networks advertise their presence by regularly broadcasting SSID in a special packet called beacon frame. In wireless networks with disabled security features, knowing the network SSID is enough to get access to the network. SSID also pinpoints the wireless router that acts as a WAP. Wireless routers from the same manufacturer are frequently configured with default (well-known) SSID names. Since multiple devices with the same SSID displayed on the list of available networks create confusion and encourage accidental access by unauthorized users (applies to networks that lack security), changing the default SSID is a recommended practice.

A

True

52
Q

Which of the following solutions would offer the strongest security for a small network that lacks an authentication server?

A

WPA3-SAE

53
Q

What are the characteristic features of WPA2/WPA3 Enterprise mode?

A

Suitable for large corporate networks

IEEE 802.1X

Requires RADIUS authentication server

54
Q

What is the name of the encryption protocol primarily used in Wi-Fi networks implementing the WPA3 security standard?

A

AES-GCMP

55
Q

What are the characteristics of TACACS+?

A

Encrypts the entire payload of the access-request packet

Primarily used for device administration 

   Separates authentication and authorization
56
Q

What are the characteristic features of RADIUS?

A

Primarily used for network access

Combines authentication and authorization

Encrypts only the password in the access-request packet

57
Q

Which of the wireless encryption schemes listed below offers the highest level of protection?

A

WPA3