Info I Got Wrong Flashcards

1
Q

Error detecting used to detect accidental changes to data

A

Cyclic redundancy check (CRC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is another name for a directory traversal or a path traversal?

A

HTTP attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a swap file?

A

Temporary files on a hard disk used as a virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Example of order of volatility

A

Processor cache, RAM, swap file, HDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a false antivirus pop-up or notification

A

Rogue AV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the European version of PII?

A

Sensitive personal info (SPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Moving your servers and computers into the cloud

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a known threat?

A

When something can be identified using signatures and patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud applications

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Runtime containers for running different language code

A

FaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you add at the end of a firewall’s ACL?

A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A username and password is an example of what?

A

PAP Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the most common vulnerabilities found on Windows and Linux systems?

A

Missing patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Automated injection of breached usernames and passwords to gain access fraudulently

A

Credential stuffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If you run a vulnerability scan on a Network and only find a few critical vulnerabilities what did you do wrong?

A

You did not run a credential scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Buffer overflow’s are most easily detected by what?

A

Static code analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do you renew a service certificate?

A

Certificate signing request (CSR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a key escrow?

A

It stores keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OCSP

A

Status of certificates that tells if it is good, revoked, or unknown.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the strongest response to an incident?

A

Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Is degaussing a method of purging or destruction?

A

Purging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a server area fire extinguishing system?

A

FM-200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why is SMS not a good idea for multi factor authentication?

A

It may be accessible to attackers through VOIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Where does a user agent request a resource from during a SAML transaction?

A

A service provider (sp)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Who has the ultimate responsibility for maintaining confidentiality, integrity, and authentication in a system

A

Data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Who is in charge of data quality, labeling, identification, and ensuring that data is collected and stored in accordance with laws?

A

Data steward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Who manages the system where data is stored, manages access control, encryption, back up and recovery?

A

Data custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Who is in charge of PII and PHI?

A

Privacy officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the time that you must have services back up in?

A

RTO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What account do you use for a kiosk? And why?

A

A guest account, because it has limited capability no privacy and is disabled by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Who ensures that organization processes personal data in accordance with applicable data protection rules?

A

Data protection officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a secure protocol for remote access services?

A

CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What verifies the device drivers during Windows startup?

A

Early Launch Anti Malware (ELAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Where do you store certificates in a server?

A

Hardware Security Module (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the certificate that you see in the address bar of a website (the lock icon)?

A

Domain validation certificate (DV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Certificate that validates that software was not altered?

A

Code signing certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

DIG

A

Command used to look up information from DNS servers. More advanced than nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Nslookup

A

Command used to look up information from DNS servers

39
Q

SSO/ Federated identity solution which is open sourced?

A

Shibboleth

40
Q

Get up and running quickly, get back to a particular service level.

A

Recovery Time Objective (RTO)

41
Q

How much data loss is acceptable? How far back does data go?

A

Recovery Point Objective (RPO)

42
Q

When something was approved but not supposed to be

A

False Acceptance Rate (FAR)

43
Q

What is a Secure Web Gateway (SWG)

A

A device that all traffic is funneled through and prevents users from visiting sites that may have malware.

44
Q

What is the most detailed/explicit access control?

A

Attribute-based Access Control (ABAC)

45
Q

Amount of data loss a system can sustain, measured in time?

A

Recovery point objective (RPO)

46
Q

Moving a virtual machine from one physical environment to another, it is not an attack method.

A

VM Migration

47
Q

Machine is trained to analyze a baseline, deviation from it sets off an alarm.

A

Behavior based

48
Q

What authentication method do captive portals usually rely on?

A

Radius

49
Q

When app/platform updates are committed to a production environment rapidly.

A

Continuous deployment

50
Q

When you substitute parts of a word with x’s

A

Data masking

51
Q

Relies on mutual authentication of client and server

A

LDAPS

52
Q

Detect malware that is loaded early in the system start a process or before the operating system can load

A

Measured boot

53
Q

Used to capture the hard disks information to support a forensic investigation

A

Master boot record analysis

54
Q

Validates the users identity when using SAML

A

IdP

55
Q

Process of harvesting an accounts cached credentials when the user logs into single sign on system

A

Pass the hash

56
Q

Kerberos ticket that can grant other tickets in active directories

A

Golden ticket

57
Q

What kind of breach should you contact your credit card processor about?

A

PCI-DSS

58
Q

Who provide services to members of a federation?

A

Relying parties (RP)

59
Q

An encryption downgrade attack which causes a reversion to an earlier/less secure encryption.

A

POODLE

60
Q

When a single bit is changed in the plaintext, there should be a drastic change in the cipher text.

A

Confusion

61
Q

When a single bit is changed in the plaintext more than half of the bits should change in the cipher text.

A

Diffusion

62
Q

A history of ownership

A

Provenance

63
Q

A history of who handled the data

A

Chain of custody

64
Q

Used in a cloud based environment to monitor the entire network and respond to security threats in real time?

A

Software-defined visibility (SDV)

65
Q

Injecting client side scripts into a web page to be viewed by others (like making a pop up come up)?

A

Cross site scripting

66
Q

Similar to identity fraud. Initiate bank transfers, send messages, etc while acting like a different person.

A

Cross site request forgery

67
Q

Which authentication protocol utilizes an obfuscated password created from a shared secret?

A

Radius

68
Q

802.1x usually relies on which protocol as the authentication method?

A

EAP

69
Q

Utilizes carefully written scripts to orchestrate run books and generate server builds?

A

Infrastructure as code (IaC)

70
Q

Approach to network-management that utilizes efficient programming to improve performance monitoring?

A

Software defined networking (SDN)

71
Q

If you want a single ethernet port to redirect different users to different networks what do you use?

A

NAC

72
Q

What do power shell scripts end in?

A

.ps1

73
Q

A computer security project that provides info about security vulnerabilities and aids in pentesting and IDS Signature development?

A

Metasploit

74
Q

An attack in which the goal is to execute arbitrary commands on the host operating system through a vulnerable application

A

Command injection

75
Q

How much risk an organization is willing to accept

A

Risk appetite

76
Q

When an organization accepts the identified risk and doesn’t worry about transferring or mitigating it

A

Risk acceptance

77
Q

What are three ways to sanitize a hard drive?

A

Crypto erase (CE), secure erase (SE), zero fill

78
Q

What is secure erase used for?

A

Flashbased systems like solid state drives or a USB, when crypto erase is not possible

79
Q

What is zero Fill not effective on?

A

Solid state drives and hybrid drives

80
Q

What is clearing?

A

A logical way to overwrite data with ones and zeros. A factory reset.

81
Q

What is the strongest level of protection for access control?

A

MAC

82
Q

Algorithm for token-based authentication that does not expire?

A

HMAC-based One Time Password (HOTP)

83
Q

What can help with a zero day attack?

A

An application allow list

84
Q

What are four windows memory capture tools?

A

Memdump, Volatility Framework, DumpIt, Encase.

85
Q

When an attacker captures packets, extracts info, then puts it back on the network.

A

Replay attack

86
Q

I’m asymmetric key system, how do you encrypt the message to the recipient?

A

With their public key.

87
Q

What is the difference between proprietary data and sensitive data?

A

Propriety data is shared with customers on a limited basis. Sensitive data can cause serious damage to company if shared.

88
Q

If an attacker tries every word in the dictionary is this a brute force attack or a dictionary attack?

A

Dictionary attack

89
Q

What assigns a random surrogate value with no mathematical relationship that can be reversed by being linked back to original data?

A

Tokenization

90
Q

Which control type includes organizational culture and physical controls that form the outer layer of defense?

A

Operational

91
Q

Which certificate format is associated with windows and Java tomcat?

A

P7B

92
Q

Which certificate format is associated with Java platforms?

A

DER

93
Q

The conversion of data to its simplest known form

A

Normalization