languages & security and related Flashcards
Which area of concern falls under the operations and planning category in IT documentation?
inventory management ( There are four broad categories of IT documentation: Policies, Operations, Projects, and User documentation. Operations is concerned with inventory management.)
Which one of these languages is a scripting language and which one is a compiled language?
C++, VBScript, Java, C#, Python, JavaScript
Scripting languages: VBScript, Python, JavaScript Compiled Languages: C++, Java, C# (Scripting languages include Windows batch files, PowerShell, Linux shell script, VBScript, JavaScript, and Python. Compiled languages include C, C++, C#, and Java.)
A third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)?
RDP uses an encrypted session.
RDP connects on TCP port 3389.
( The Remote Desktop protocol (RDP) is used to remotely access a Windows OS. It is a client/server protocol.The port number for RDP is TCP port 3389 and it uses encryption.)
Which port number is used by Virtual Network Computing (VNC) to provide remote screen sharing between devices?
5900 (Virtual Network Computing (VNC) is a freeware product that is similar in functionality to RDP and works over port 5900.)
Which subject area describes collecting and analyzing data from computer systems, networks, and storage devices, as part of an investigation of alleged illegal activity?
computer forensics (The field of computer forensics involves collecting and analyzing data from computer systems, networks, wireless communications, and storage devices.)
In a computer forensics investigation, which type of data is considered volatile data and can be lost if power is removed from the computer?
data in transit between RAM and the CPU (Volatile data is a data that is lost when power is turned off, and is located in temporary storage such as RAM, cache, CPU or in transit between them.)
What is the difference between a scripting language and a compiled language?
Scripting languages are interpreted and executed line by line when a script is run, while compiled languages need to be converted into executable code. (A scripting language is different than a compiled language because each line is interpreted and then executed when the script is run. Compiled languages need to be converted into executable code using a compiler. Another difference between the two types of languages is that compiled languages are executed by the CPU while scripting languages are executed by a command interpreter or by the operating system.)
Which methods can be used to implement multifactor authentication?
passwords and fingerprints (A cybersecurity specialist must be aware of the technologies available that support the CIA triad.)
The CIO wants to secure data on company laptops by implementing file encryption. The technician determines the best method is to encrypt each hard drive using Windows BitLocker. Which two things are needed to implement this solution?
at least two volumes, TPM (Windows provides a method to encrypt files, folders, or entire hard drives depending on need. However, certain BIOS settings and configurations are necessary to implement encryption on an entire hard disk.)
What is an accurate description of asymmetric encryption technology?
It is an encryption process that uses a public and private key pair to encrypt/decrypt data.
Which type of security threat can be transferred through email and is used to gain sensitive information by recording the keystrokes of the email recipient?
virus (Adware does not record keystrokes. A worm self-replicates across the network. A Trojan appears to be a legitimate program while carrying malware, and grayware is a general term for software that may be malware.)
A manager reports that unusual things are happening on a Windows computer. The technician determines that malware is the culprit. What can the technician do to remove stubborn malware?
Enter Safe Mode and do a system restore. (Booting the computer in Safe Mode prevents most drivers from loading. Additional antimalware software can then be installed to remove or quarantine malware. Sometimes the storage drive must be wiped, the operating system reinstalled, and data restored from a backup.)
An employee that has worked at the company for many years has started a home-based business selling crafts. While leaving an office meeting, a company supervisor notices the employee buying supplies for the personal crafting business of the employee. What section of the security policy should the supervisor review when determining how to handle this situation?
acceptable use policies (The acceptable use policies section of a security policy commonly identifies network resources and usages that are acceptable to the organization. They might also state the ramifications that can occur if this security policy is violated.)
What Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?
Local Security Policy tool (A technician must be aware of the technologies and measures that are used as countermeasures to protect the organization from threats and vulnerabilities. A Windows Domain Security Policy is used and applied when a user logs in to a computer that is on a corporate network. A Windows Local Security Policy is used for stand-alone computers to enforce security settings.)
A customer brings in a computer that is asking for a password as soon as it powers on, even before the operating system boots. Which type of password is enabled?
A BIOS password is configured by entering the BIOS Setup program. If unknown, it can be removed by placing a jumper over two motherboard pins. Some motherboards support BIOS password removal by removing the CMOS battery, but if this is done, all BIOS settings will be reset to the default values.
Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker was using a specific technique that affected the TCP three-way handshake. What is the type of network attack?
SYN flood