Idk Flashcards

1
Q

SCAP (Security Content Automation Protocol)

A

is a multi-purpose framework of specifications that supports automated configuration, vulnerability and patch checking, technical control compliance activities, and security measurement. It is an industry-standard and support testing for compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Agile

A

The Agile Manifesto emphasizes individuals and interactions over the processes and tools that Spiral and Waterfall rely on. It also focuses on working software, customer collaboration, and responding to change as key elements of the Agile process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Waterfall

A

The waterfall model is a breakdown of project activities into linear sequential phases, where each phase depends on the deliverables of the previous one and corresponds to a specialization of tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rapid Application Development (RAD)

A

is a form of agile software development methodology that prioritizes rapid prototype releases and iterations. Unlike the Waterfall method, RAD emphasizes the use of software and user feedback over strict planning and requirements recording.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spiral

A

is a risk-driven software development model that guides a team to adopt elements of one or more process models, such as incremental, waterfall, or evolutionary prototyping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Default Nmap scan type

A

TCP SYN scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

UDP Nmap scan type

A

-sU flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP FIN Nmap scan type

A

-sF flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Stephane was asked to assess the technical impact of a reconnaissance performed against his organization. He has discovered that a third party has been performing reconnaissance by querying the organization’s WHOIS data. Which category of technical impact should he classify this as?

A

Since WHOIS data about the organization’s domain name is publicly available, it is considered a LOW impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An organization wants to choose an authentication protocol that can be used over an insecure network without having to implement additional encryption services. Which of the following protocols should they choose?

A

The Kerberos protocol is designed to send data over insecure networks while using strong encryption to protect the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What technology is NOT PKI x.509 compliant and cannot be used in a variety of secure functions?

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What technology is PKI x.509 compliant and can be used in a variety of secure functions?

A

AES, PKCS, and SSL/TLS are all compatible with x.509 and can be used in a wide variety of functions and purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

> ## echo 127.0.0.1 diontraining.com&raquo_space; /etc/hostsWhich of the following best describes what actions were performed by this line of code?

A

Routed traffic destined for the diontraining.com domain to the localhost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following provides a cryptographic authentication mechanism to positively identify an organization as the authorized sender of email for a particular domain name?

A

DomainKeys Identified Mail (DKIM) provides a cryptographic authentication mechanism. This can replace or supplement SPF. To configure DKIM, the organization uploads a public key as a TXT record in the DNS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sender Policy Framework (SPF)

A

uses a DNS record published by an organization hosting an email service. The SPF record identifies the hosts authorized to send email from that domain and there must be only one per domain. SPF does not provide a cryptographic authentication mechanism like DKIM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Domain-Based Message Authentication, Reporting, and Conformance (DMARC)

A

ensures that SPF and DKIM are being utilized effectively. DMARC relies on DKMI for the cryptographic authentication mechanism.

17
Q

simple mail transfer protocol (SMTP)

A

is a communication protocol for electronic mail transmission, which does not utilize cryptographic authentication mechanisms by default.

18
Q

Which of the following methods could not be used to retrieve the key from a forensic copy of a BitLocker encrypted drive?

A

Retrieve the key from the MBR.

-BitLocker information is not stored in the Master Boot Record (MBR).

19
Q

Risk Appetite

A

An organization’s willingness to tolerate risk.

20
Q

Risk Avoidance

A

is the response of deploying security controls to reduce the likelihood and/or impact of a threat scenario.

21
Q

Risk Deterrence

A

is the response of deploying security controls to reduce the likelihood and/or impact of a threat scenario.

22
Q

Risk transference

A

is the response of moving or sharing the responsibility of risk to another entity.

23
Q

Base64

A

Most popular format for attackers to obfuscate malicious code.