Deck 1 Flashcards
A short list of commonly used passwords tried against large number of user accounts is a characteristic feature of:
Spraying attack
What is does “Impossible travel” refer to?
a situation wherein an account is accessed from a location that is physically impossible for the user to be in
What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes?
VLSM
Which of the following acronyms refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
ACL
Which of the following policies applies to any requests that fall outside the criteria defined in an ACL?
Implicit Deny Policy
Which of the answers listed below does not refer to the concept of network isolation?
DLP
Which of the answers listed below refer to the concept of data isolation?
EFS + DLP
A type of document outlining the shared responsibilities between a CSP and its customers for securing and managing data and resources is known as:
Cloud responsibility matrix
Which of the following provides isolation from external computer networks?
Air gap
Which of the answers listed below refers to a specific type of ICS?
SCADA
Which of the answers listed below refer(s) to embedded systems?
Often designed to operate in real-time or with low latency ( Your answer)
Typically equipped with constrained computing resources and storage (missed)
Designed to perform a single task or a few closely related tasks within a larger system ( Your answer)
Which of the following terms can be used to describe a system designed to aim for minimized downtime and uninterrupted operation?
HA
A type of hardened server used as a secure gateway for remote administration of devices placed in a different security zone is called:
Jump server
Which of the following provides passive network security breach response on an individual computer system?
HIDS
Which of the answers listed below refers to network security technology designed to monitor WLANs for unauthorized access, security threats, and suspicious activities?
WIDS
In active-passive mode, load balancers distribute network traffic across:
Servers marked as active
Which of the following EAP methods offers the highest level of security?
EAP-TLS
Which of the following answers refer to the characteristic features of a Layer 4 firewall?
Filters traffic based on source/destination IP addresses, ports, and protocol types
Operates at the transport layer of the OSI model
Offers basic (faster) traffic filtering
Which of the answers listed below refer to a Layer 7 firewall?
Offers complex (slower) traffic filtering
Adds the ability to inspect the contents of data packets in addition to the header information
Operates at the application layer of the OSI model
Examples of protocols typically used for implementing secure VPN tunnels include:
IPsec + TLS + L2TP
Which of the following terms is used to describe a type of VPN that alleviates bottlenecks and conserves bandwidth by enabling utilization of both the VPN and public network links?
Split tunnel
An HTML5 VPN portal is an example of clientless VPN implementation where an HTML5-compliant web browser along with TLS encryption can be used instead of a dedicated VPN client software.
True