Dion Review 2 Flashcards
Which service port on email servers can sometimes be exploited by attackers to perform spamming, spoofing, or phishing attacks?
SMTP (Simple Mail Transfer Protocol)
Simple Mail Transfer Protocol (SMTP) is a common email server port
Post Office Protocol (POP) and IMAP (Internet Message Access Protocol) are network protocols that are commonly used for email clients. When exploited, it’s most commonly for eavesdropping, data theft, or malware delivery attacks because it is used to retrieve email messages from a server.
Kisha, a security official, is implementing an encryption protocol for the factory they work at. They need a wireless encryption protocol that will work with the factory’s older equipment. As the factory is in a remote location and the equipment only needs to connect to other equipment in the area, they need a reliable encryption protocol but don’t need the newest and most secure protocols. They prefer protocols that use keys to encrypt each packet. Which of the following options BEST represents the encryption protocol they need?
TKIP stands for Temporal Key Integrity Protocol, and it is an encryption protocol that uses keys to encrypt each packet of data. TKIP was introduced by WPA to replace WEP, and it is compatible with older devices that do not support WPA2 or AES.
Older devices (perhaps the ones described in this factory) may not be co
What are some data categories that are considered sensitive under the EU’s General Data Protection Regulations (GDPR)?
Under the EU’s GDPR, sensitive personal data refers to specific categories of personal information that could harm an individual if made public. This includes, but is not limited to, religious beliefs, political opinions, trade union membership, gender, sexual orientation, racial or ethnic origin, genetic data, and health information.
One’s right to data erasure may be denied by a data controller if the da
What are the purposes of both internal and external compliance reporting?
External compliance reporting is crafted to meet the mandatory disclosures and inform external stakeholders about the company’s compliance with industry/government regulations. Internal compliance reporting is designed to give detailed insights to internal stakeholders like executives and security analysts, assisting in strategic planning and operational improvements.
Jamario, a system administrator at Dion Training Solutions, wants to prevent unauthorized mail servers from sending emails on behalf of the company’s domain. What can he use to specify which servers are allowed to send these emails?
Jamario should implement SPF (Sender Policy Framework), as it lets him specify which mail servers are authorized to send emails on behalf of the company’s domain.
Single Loss Expectancy (SLE)
The single loss expectancy (SLE) is the measure of the potential financial loss associated with a specific risk event.
Secure Access Service Edge (SASE)
Secure Access Service Edge (SASE) is a cloud-native architecture that combines WAN capabilities and network security services into a single cloud service.
SASE enables direct, secure access to company resources via the cloud.
What is unique about ECC (Elliptic curve cryptography) with regard to key length?
ECC (Elliptic curve cryptography) is a type of trapdoor function that is efficient with shorter key lengths. For instance, ECC with a 256-bit key provides roughly the same security as RSA with a 2048-bit key. The primary advantage is that ECC has no known shortcuts to cracking it, making it particularly robust.
If a penetration tester is given usernames and passwords before conducting an attack, what type of penetration test are they conducting?
They are conducting a known environment test. Penetration testing in a known environment means that a significant amount of information has been given to the tester. This can include passwords, usernames, and other information.
What is the difference between Attribute-Based Access Control (ABAC) and Rule-Based Access Contro (RBAC)l?
ABAC is more sophisticated and suitable for environments requiring context-aware, granular access control while RBAC is simpler, relying on fixed rules for access decisions, and is ideal for less complex systems.
Which US act requires federal agencies to develop security policies for computer systems that process confidential information?
Computer Security Act (1987)
This act specifically requires federal agencies to develop policies to secure computer systems that process sensitive or confidential information.
Which sensor uses electromagnetic waves to detect the movement or presence of objects, often in security applications?
Microwaves
In automation, what is the MOST urgent risk that emerges when an organization relies heavily on a singular tool or solution for multiple critical processes?
Reliance on a singular solution for multiple critical processes can create a single point of failure. If that tool or solution fails, it could disrupt many processes, compromising secure operations.
What is SOX?
The Sarbanes-Oxley Act is US legislation that mandates various practices to protect investors by improving the accuracy and reliability of corporate financial statements and disclosures.
SOX was passed in 2002
What is DMARC?
DMARC (Domain-based Message Authentication, Reporting, and Conformance), allows administrators to set a policy for receivers on how to handle emails from the domain that don’t pass SPF or DKIM checks. Additionally, DMARC provides feedback mechanisms for senders.