Exam 1 Flashcards

1
Q

What is a “passive foot print”

A

Learning as much as your can from open sources like social media, web sites, reedit,dumpster diving etc..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A third party is going to gather information about your company from open sources

A

Passive footprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is TLS

A

“Transport layer security”
A cryptographic protocol used to encrypt network communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is HTTPS

A

“Hypertext Transfer Protocol Secure”
It is a protocol that secures communication and data transfer between a user’s web browser and a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ftps

A

“File transfer protocol secure” uses tls to provide secure communication also https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SSH and what is it used for

A

“Secure shell”

secure protocol user to connect to computers remotely using a secure connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SRTP

A

“Secure real time protocol”
Adds encryption when talking over a company phone, the encryption used for this is called (aes) to encrypt voice in video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DNSSEC

A

“Domain name system security extensions” a way to validate with the information you’re getting from the DNS server is actually coming from the devil server by using a public key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What kind of actor is organize crime

A

Usually does things for money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Hacktivist?

A

Focus or political agenda not commonly on financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is partition data in temporary file systems part of

A

The file storage subsystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “MFD”

A

“Multifunction device”

An all in one printer that can print, scan and fax is a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IoT

A

“Internet of things”

Wearable technology and home automation devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is RTOS

A

“Real time operating systems “

Are used in manufacturing and automobiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is SoC

A

“System on a chip”

Multiple component is the one on the single chip or categorize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SOAR

A

“Security orchestration automation and response”

SOAR seeks to alleviate the strain on IT teams by incorporating automated responses to a variety of events

17
Q

What is PKI

A

“Public key infrastructure”

PKI uses cryptographic public keys that are connected to a digital certificate, which authenticates the device or user sending the digital communication

18
Q

What is IaaS

A

“Infrastructure as a service”

A cloud service that provides the hardware required for deploying, application, instances, and other cloud-based applications

delivers IT infrastructure like compute, storage, and network resources on a pay-as-you-go basis over the internet

Amazon, Google

19
Q

What is a another word for “on path attack”

A

Man in the middle

20
Q

Federation

A

Would allow one member of organization to use credentials of another organization

21
Q

What is MTBF

A

“Mean time between failures”

Is a prediction of how often a repairable system will fail

22
Q

What is RTO

A

“Recovery time objectives”

A set of objectives needed to restore a particular service level

23
Q

What is MTTR

A

“Mean time to restore”

The amount of time it takes to repair a component

24
Q

What is MTTF

A

“Mean time to failure”

The expected lifetime of a non-repairable product or system

25
Q

What is EAP-TTLS

A

“Extensible authentication protocol tunneled transport layer security”

Allows the use of multiple authentication protocols transported inside of an encrypted TLS tunnel

26
Q

What is a CASB

A

“Cloud, excess security broker”

Can be used to apply security policies to cloud based implementations

27
Q

Common functions of CASB

A

visibility into application used in data security policy use, Verification of compliance with formal standards, and the monitoring, and identification of threats