J10: PKI Security Protocols (PE) Flashcards

1
Q

84h4

XSS is an attack that uses third-party Web resources to run script(s) within the victim’s Web browser or scriptable application. Occurs predominately when a browser visits a malicious Web site or clicks a malicious link.

  • TRUE
  • FALSE
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

84j3

Nick needs to send critical information to Daniel. Due to regulations the document he wants to send contains senstive information that should not be viewed by external parties. Daniel decides to solve this problem by encrypting the document utilizing asymmetric encryption so it is safe to transfer. Nick md5 hashes the document and writes down the last eight characters of its hash for safe keeping.

If Daniel wants to make adjustments to the document and send it back to Nick which would he need to utilize to encrypt the file before sending it?

  • Daniel must utilize Nick’s Private Key
  • Nick must utilize Daniel’s Public Key
  • Nick must utilize Daniel’s Private Key
  • Daniel must utilize Nick’s Public Key
A

Danile must utilize Nick’s Public Key ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

84j4

Which of the following assist in preventing injection vulnerabilites

  • Input Validation
  • Cyber Awareness Training
  • Fuzzing
  • Limitting maximum queries
A

Input Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

84jj

The act of providing input into something that results in something not intially intended for is what type of vulnerablitiy?

  • Injection
  • Tampering
  • Service Manipulation
  • Input Malformance
A

injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

84nh

An unknown entity obtained access to a jump box that serves as centralized entry point between the public network and network2. Upon further investigation they maintained a persistent presence on the public network and have begun logging into as many machines they can touch in network2.

Which of the following best describes the entitiy’s overall intent when moving around

  • Network Domminance
  • Lateral Movement
  • Stealth Exploitation
  • Network Scanning
A

Lateral Movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

84uu

The act of providing input into something that results in something not intially intended for is what type of vulnerablitiy?

  • Injection
  • Tampering
  • Service Manipulation
  • Input Malformance
A

Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

8447

Which of the following is not an effective way to prevent malicious code injection, which will be executed in the victim’s browser.

  • Data Validation
  • Password Complexity
  • Input Sanitation
  • Output Escaping
A

Password Complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

8448

_____ is the collection of vetted encryption keys utilizing digital certificates. Primarily to assist in verifying authenticity of ownership

A

pki

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

8484

Which of the following defines PKI

  • Public Key-altherimic Installment
  • Public Key Infrastructure
  • Priority Kept Installment
  • Possible Knowledge Inferment
A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

8488

Nick needs to send critical information to Daniel. Due to regulations the document he wants to send contains senstive information that should not be viewed by external parties. Daniel decides to solve this problem by encrypting the document utilizing asymmetric encryption so it is safe to transfer. Nick md5 hashes the document and writes down the last eight characters of its hash for safe keeping.

  • Which of the following based on the scenario is most true.
  • Asymmetric encryption will require the use of a passphrase
  • Nick must write the entirety of the hash for safe keeping
  • The originator has to encrypt the file
  • Daniel will need to encrypt the file using Nick’s public key
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly