Exam7 Flashcards
Content categorization in web filtering involves classifying web content into predefined categories based on its subject matter or type. This technique enables organizations to apply filtering policies selectively, for example restricting access to certain categories during work hours or blocking access to categories associated with security risks or non-work-related activities.
True
False
In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.
A. Local Users and Groups
B. Resource Monitor
C. Group Policy
D. User Account Control
What is SELinux?
A. A security feature in Linux OSs
B. A secure boot mechanism implemented in certain Linux distributions
C. An open-source web server software
D. A Linux distribution
Which of the following answers refers to a security mechanism imposed by SELinux over system access?
A. DAC
B. RBAC
C. MAC
D. ABAC
** Message Authentication Code (MAC)**, also referred to as a tag, is used to authenticate the origin and nature of a message. MACs use authentication cryptography to verify the legitimacy of data sent through a network or transferred from one person to another.
Which of the protocols listed below is used to enable secure web browsing?
A. L2TP
B. HTTPS
C. SSH
D. IPsec
Which of the following protocols allow(s) for secure file transfer? (Select all that apply)
A. FTPS
B. TFTP
C. FTP
D. SFTP
FTPS is an extension to the SSH protocol and runs by default on TCP port 22.
True
False
Which of the answers listed below refers to a secure replacement for Telnet?
A. RSH
B. IPsec
C. SSH
D. RTPS
Which of the following answers refers to a deprecated protocol designed as a secure way to send emails from a client to a mail server and between mail servers?
A.I MAPS
B. SFTP
C. POP3S
D. SMTPS
Which of the protocols listed below enable secure retrieval of emails from a mail server to an email client? (Select 2 answers)
A. FTPS
B. IMAPS
C. POP3S
D. STARTTLS
E. SMTPS
Which of the following protocols enables secure access and management of emails on a mail server from an email client?
A. POP3S
B. SMTPS
C. IMAPS
D. S/MIME
Which of the answers listed below refers to a secure network protocol used to provide encryption, authentication, and integrity for real-time multimedia communication?
A. IPsec
B. SIP
C. VoIP
D. SRTP
Secure Real-Time Transport Protocol (SRTP) is a security extension of the Real-time Transport Protocol (RTP) that protects audio and video traffic from eavesdropping, tampering, and replay attacks.
An Extension of Real-time Transport Protocol (RTP) that features enhanced security measures. The protocol provides encryption, confidentiality, message authentication, and replay protection to your transmitted audio and video traffic.
A type of firewall used for protecting a single computer is commonly referred to as: (Select 2 answers)
A. Hardware firewall
B. Host-based firewall
C. Proxy firewall
D. Network-based firewall
E. Personal firewall
UDP is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). Example applications of UDP include transmission of text and image data.
True
False
TCP is an example of a connectionless protocol. Because TCP does not support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol. Example applications of TCP include transmission of video and audio streaming data.
True
False
Which of the answers listed below refer to the concept of data isolation? (Select 2 answers)
A. DLP
B. SDN
C. EFS
D. SWG
E. EDR
Which of the following provides active network security breach response on an individual computer system?
A. NIDS
B. HIDS
C. NIPS
D. HIPS
A Host Intrusion Prevention System (HIPS) is a security mechanism that can detect and take action against threats to maintain the integrity of a computer system. It monitors various aspects like memory, kernel, network state, and process execution to prevent unauthorized access and attacks.
The importance of changing default usernames and passwords can be illustrated on the example of certain network devices (such as routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.
True
False
The process of securing networking devices should include the practice of disabling unused physical and logical ports.
True
False
The term “Hybrid cloud” refers to a mixed computing environment that can include different cloud service models like public and private clouds, as well as on-premises infrastructure.
True
False
A type of document outlining the shared responsibilities between a CSP and its customers for securing and managing data and resources is known as: (Select best answer)
A. Service level agreement
B. Acceptable use policies
C. Cloud responsibility matrix
D. Master Service agreement
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross-Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft, to site defacement, to malware distribution.
Which of the terms listed below refers to a method for managing infrastructure resources through scripts and templates?
A. IaaS
B. ML
C. IaC
D. SDN