Deck 1 Flashcards
A short list of commonly used passwords tried against large number of user accounts is a characteristic feature of:
Spraying attack
What is does “Impossible travel” refer to?
a situation wherein an account is accessed from a location that is physically impossible for the user to be in
What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes?
VLSM
Which of the following acronyms refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
ACL
Which of the following policies applies to any requests that fall outside the criteria defined in an ACL?
Implicit Deny Policy
Which of the answers listed below does not refer to the concept of network isolation?
DLP
Which of the answers listed below refer to the concept of data isolation?
EFS + DLP
A type of document outlining the shared responsibilities between a CSP and its customers for securing and managing data and resources is known as:
Cloud responsibility matrix
Which of the following provides isolation from external computer networks?
Air gap
Which of the answers listed below refers to a specific type of ICS?
SCADA
Which of the answers listed below refer(s) to embedded systems?
Often designed to operate in real-time or with low latency ( Your answer)
Typically equipped with constrained computing resources and storage (missed)
Designed to perform a single task or a few closely related tasks within a larger system ( Your answer)
Which of the following terms can be used to describe a system designed to aim for minimized downtime and uninterrupted operation?
HA
A type of hardened server used as a secure gateway for remote administration of devices placed in a different security zone is called:
Jump server
Which of the following provides passive network security breach response on an individual computer system?
HIDS
Which of the answers listed below refers to network security technology designed to monitor WLANs for unauthorized access, security threats, and suspicious activities?
WIDS
In active-passive mode, load balancers distribute network traffic across:
Servers marked as active
Which of the following EAP methods offers the highest level of security?
EAP-TLS
Which of the following answers refer to the characteristic features of a Layer 4 firewall?
Filters traffic based on source/destination IP addresses, ports, and protocol types
Operates at the transport layer of the OSI model
Offers basic (faster) traffic filtering
Which of the answers listed below refer to a Layer 7 firewall?
Offers complex (slower) traffic filtering
Adds the ability to inspect the contents of data packets in addition to the header information
Operates at the application layer of the OSI model
Examples of protocols typically used for implementing secure VPN tunnels include:
IPsec + TLS + L2TP
Which of the following terms is used to describe a type of VPN that alleviates bottlenecks and conserves bandwidth by enabling utilization of both the VPN and public network links?
Split tunnel
An HTML5 VPN portal is an example of clientless VPN implementation where an HTML5-compliant web browser along with TLS encryption can be used instead of a dedicated VPN client software.
True
Which of the following answers refers to a protocol designed to secure data transmitted over WLANs?
WTLS
Which part of IPsec provides confidentiality, data integrity, and authentication?
ESP
Which of the IPsec modes provides entire packet encryption?
Tunnel
An IPsec mode providing encryption only for the payload (the data part of the packet) is referred to as:
Transport mode
An IPsec mode providing encryption only for the payload (the data part of the packet) is referred to as:
SASE
Which of the answers listed below refers to any type of information pertaining to an individual that can be used to uniquely identify that person?
PII
Which of the answers listed below refer(s) to encryption method(s) used to protect data at rest?
FDE + SED + EFS
Encryption methods used to protect data in transit include:
VPN + IPsec + TLS
Which of the following answers refers to an individual or role responsible for overseeing and ensuring compliance with data protection laws and policies within an organization?
DPO
Which of the following answers refer to data masking?
Replaces sensitive data with fictitious or modified data while retaining its original format
Allows for data manipulation in environments where the actual values are not needed
Which of the following modifies data or code to make it difficult to understand or reverse-engineer, but without necessarily encrypting or hiding the data?
Obfuscation
ACL, FACL, DAC, MAC, and RBAC are all access control mechanisms that can be used to manage user permissions and protect the confidentiality, integrity, and availability of data.
True
Hardware RAID Level 0:
Requires a minimum of 2 drives to implement
Is also known as disk striping Decreases reliability (failure of any disk in the array results in the loss of all data in the array
Hardware RAID Level 1:
Is also referred to as disk mirroring
Hardware RAID Level 5:
Offers increased performance and fault tolerance (single drive failure does not destroy the array and lost data can be re-created by the remaining drives)
Is also known as disk striping with parity
Hardware RAID Level 10 (a.k.a. RAID 1+0)
Is referred to as stripe of mirrors, i.e., a combination of RAID 1 (disk mirroring) and RAID 0 (disk striping)
Which of the following RAID levels does not offer fault tolerance?
6 + 0
Which of the following is the primary function of clustering?
Groups servers together to provide high availability and fault tolerance
Which of the terms listed below refers to a duplicate of the original site, with fully operational computer systems as well as near-complete backups of user data?
Hot site
Which of the following terms refers to an alternate site that provides some pre-installed hardware and software and might have partial data backups, but it is not fully operational and requires additional configuration before use?
Warm site
A disaster recovery facility that provides only the physical space for recovery operations is known as:
Mirror site
What is the name of a U.S. government initiative that provides a set of procedures and plans that an organization can implement to ensure continued performance of its essential functions during unexpected events?
COOP
A technique that allows to recover changes that occurred since the last backup in the event of a system crash is known as:
Journaling
Which of the following power redundancy solutions would be best suited for providing long-term emergency power during an unexpected main power source outage?
Backup generator
In the context of MDM, the isolation of corporate applications and data from other parts of the mobile device is referred to as:
Containerization
An administrator needs to adjust the placement of multiple APs to ensure the best wireless signal coverage for the network. Which of the following would be of help in identifying areas of low signal strength?
Heat map
Which of the answers listed below refers to a mobile device deployment model where organizations provide and own the devices while allowing their personal use?
COPE
What is the name of a mobile device deployment model in which employees select devices for work-related tasks from a company-approved device list?
CYOD
An SSID is a unique identifier (a.k.a. wireless network name) for a WLAN. Wireless networks advertise their presence by regularly broadcasting SSID in a special packet called beacon frame. In wireless networks with disabled security features, knowing the network SSID is enough to get access to the network. SSID also pinpoints the wireless router that acts as a WAP. Wireless routers from the same manufacturer are frequently configured with default (well-known) SSID names. Since multiple devices with the same SSID displayed on the list of available networks create confusion and encourage accidental access by unauthorized users (applies to networks that lack security), changing the default SSID is a recommended practice.
True
Which of the following solutions would offer the strongest security for a small network that lacks an authentication server?
WPA3-SAE
What are the characteristic features of WPA2/WPA3 Enterprise mode?
Suitable for large corporate networks
IEEE 802.1X
Requires RADIUS authentication server
What is the name of the encryption protocol primarily used in Wi-Fi networks implementing the WPA3 security standard?
AES-GCMP
What are the characteristics of TACACS+?
Encrypts the entire payload of the access-request packet
Primarily used for device administration Separates authentication and authorization
What are the characteristic features of RADIUS?
Primarily used for network access
Combines authentication and authorization
Encrypts only the password in the access-request packet
Which of the wireless encryption schemes listed below offers the highest level of protection?
WPA3