Kahoot 9 Flashcards
Data classification: in the model, the levels are top secret, secret and confidential
a/) TiktokTang
b. ) Bell LaPudula
c. ) Company
d. ) YipeeYikay
b.)
Data Classification: Disclosure of this information beyond specified recipients would likely cause serious harm
a. ) L1 - Information intended and released for public use
b. ) L2 - low risk confidential information that may be shared only within
c. ) L3 - Medium risk information intended only for those with a need to know
d. ) L4 - High risk confidential information that requires strict control
d.)
Health Information, Political Opinion and/or Ethnic Origin are examples of
a. ) Personal Identifiable Information
b. ) Intellectual Property
c. ) BOINGO information
d. ) Statlic Information
a.)
An attacker sees an Open SSH and there access it. They see “bitvise SSH” and record it. This is what
a. ) Fuzzing
b. ) Shoulder surfing
c. ) Maltego
d. ) Banner Grabbing
d.)
You have over 1 million lines of data and you need to find SSN. You could use this to filter the data
a. ) Manually reading the data
b. ) Shoulder stomping
c. ) Regex for DLP
d. ) Using “head” and “tail” in the Linux CLI
c.)
Which two are the most important protocols for email?
a. ) SMTP
b. ) FTP
c. ) DNS
d. ) POP3
a & d
Email Spoofing is the process of forgining email headers to fool recipients T of F
True
Which 2 of the following help secure email?
a. ) Spoofing
b. ) SMTP
c. ) SPF
d. ) DKIM
c & d
Improperly configured mail relays can be used by spammers to route email
T or F
True