Failed on Practice exam Flashcards

1
Q

Context-aware authentication

A

Context-aware authentication can, for example, disable screen locks when the mobile device is in a trusted location, such as a home. It can also check whether the network connection is trusted before allowing apps to communicate externally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the mechanism for restoring to a baseline system config?

A

Rollback to known configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What entity is responsible for validating and submitting certificate requests on behalf of end users?

A

Registration authority(RA)
A Registration Authority (RA) is a function of certificate enrollment, and its services would be combined with a Certificate Authority (CA) in a single CA hierarchy. An RA is responsible for validating and submitting a request on behalf of end users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What relates to quality management processes to determine the effectiveness of a system

A

Measurement systems analysis (MSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

application attack that targets vulnerabilities in the headers and payloads of specific application protocols.

A

Domain name system (DNS) amplification attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

attacks against the controllers in an operational technology (OT) network can use the same techniques as against computer networks to overwhelm the network. This network attack uses SYN or SYN/ACK flooding.

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What separates different containers from others?

A

Namespaces: Namespaces prevent one container from reading or writing processes in another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What ensures one container cannot overwhelm others in a DoS-type attack

A

Control groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is secrets management?

A

Secrets management is the management of credentials specific for running or accessing services on a cloud service provider. This includes implementing multi-factor authentication (MFA) for interactive logons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of these is the most volatile form of memory?

Random Access Memory (RAM)
Cache
Hard disk
Pagefile

A

System cache is one of the most volatile data, similar to the CPU. This data should be captured before powering a device off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which environment allows for vulnerability scanning and penetration before being deployed to the staging environment.

A

Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which classification of data is likely to be immediately escalated in the case of a breach?

Public Data
Critical Data
PII
Non-PII customer data

A

Critical data, sometimes top-secret, is too valuable to permit any risk of a breach. Therefore, any detected abnormality should immediately be escalated to senior decision-makers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attack where the attacker has managed to obtain a database of password hashes from an Active Directory credential store

A

offline password attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

used to monitor social media for incidents, such as disgruntled consumers posting negative content.

A

Sentient analysis. In terms of security, this can be used to gather threat intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What allows a user to monitor and manage voltage and electrical current in an environment

A

Managed PDUs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can an attacker sniff all traffic on a switched network?

A

ARP poisoning.

17
Q

An appliance designed to perform centralized public key infrastructure (PKI) management, key generation, or key escrow for device

A

hardware security module (HSM)

18
Q

Homomorphic encryption

A

Homomorphic encryption is an encryption method that allows computation to be performed directly on encrypted data without requiring access to a secret key. Analysis can apply functions on encrypted data without needing to reveal the values of the data.

19
Q

A system administrator implements a process that provides two separate paths from each server node to every disk in a redundant array of inexpensive disks set up to remove a single point of failure. What concept has the administrator implemented?

A

Multipathing allows users to configure multiple input/output (I/O) paths between server nodes and storage arrays into a single device to remove a single point of failure and increase redundancy.

20
Q

an adverse event impacts multiple organizations

A

Multiparty risk occurs when an adverse event impacts multiple organizations. If a breach occurs for one party, all parties share the risk.

21
Q

ARO

A

The annual rate of occurrence (ARO) indicates how many times a loss will occur within a year. An ARO is used in conjunction with the single loss expectancy (SLE) to figure the annual loss expectancy (ALE).
ARO=Incidents/year

22
Q

SLE

A

SLE is the estimate of the amount of damage that an asset will suffer due to a single incident.
SLE= Asset Value*Exposure factor
Exposure Factor (EF) is expressed as a percentage of the asset value.

23
Q

ALE

A

ALE provides an estimate of the yearly financial impact to the organization from a particular risk.
Annualized Loss Expectancy = Single Loss Expectancy * Annual Rate of Occurrence
ALE = SLE * ARO