Messer Practice Exam 1 Flashcards
What is the process of gathering as much information as possible about a company from open sources such as social media, corporate websites, and business organizations?
Passive Footprinting
What active reconnaissance tests directly query systems to see if a backdoor has been installed?
Backdoor Testing
What process involves actively querying and receiving responses across a network?
OS fingerprinting
What type of penetration test provides detailed information about specific systems or applications?
Partially known environment
What protocols use TLS to provide secure communication?
HTTPS (Hypertext Transfer Protocol)
FTPS (File Transfer Protocol Secure)
What protocol is used to encrypt conversations over VoIP?
SRTP (Secure Real-time Transport Protocol)
What protocols aren’t encrypted?
Telnet
FTP
SMTP
IMAP
What secure protocol is used for Time Synchronization?
NTPsec (Secure Network Time Protocol)
What secure protocols are used for Email?
S/MIME (Secure/Multipurpose Internet Mail Extensions) with PKI
POP3S (Secure Post Office Protocol) with SSL.
IMAP (Internet Message Access Protocol) with SSL.
Browser-based email with SSL.
What does SNMPv2 stand for and do?
Simple Network Management Protocol version 2.
What two data sources help address file storage volatility?
Partition Data
Temporary File Systems
What would an all-in-one printer that can print, scan, and fax often be categorized as?
Multifunction Device
What is an IoT device?
Wearable technology and home automation devices.
What does RTOs stand for?
Real-time operating system.
What does SoC standfor?
System on a Chip.
Multiple components that run on a single chip are categorized as an SoC.
ISO 27701
extends 27001 and 27002 to include management of PII and data privacy.
ISO 31000
sets international standards for risk management
ISO 27002
focuses on information security controls
ISO 27001
The foundational standard for ISMS (Information Security Management Systems)
What is SOAR?
Security Orchestration, Automation, and Response.
Designed to make security teams more effective by automating processes and integrating third-party security tools.
What is EAP-TTLS?
Extensible Authentication Protocol - Tunneled Transport Layer Security
Allows the use of multiple authentication protocols transported inside of a TLS tunnel.
What is PEAP?
Protected Extensible Authentication Protocol
Encapsulates EAP within a TLS tunnel, but doesn’t provide multiple authentication methods.
What is EAP-MSCHAPv2?
EAP - Microsoft Challenge Handshake Authentication Protocol v2
A common implementation of PEAP
What are two features commonly offered by a CASB?
Cloud Access Security Broker
-A list of applications in use
-Verification of encrypted data transfers
Example of Race Condition
A file system problem is usually fixed before a reboot, but a reboot is occuring before the fix can be applied. This has created a race condition that results in constant reboots
What does SED stand for?
Self Encrypting Drive
What does curl do?
The curl (Client URL) command will retrive a web page and display it as HTML (source-code) at the command line.
What is “scanless”?
It is a tool that allows you to perform a port scan via proxy.
What is “Nmap”?
A popular port scanning and reconnaissance utility.
What does “netstat” do?
It provides a list of network statistics, and the default view shows the traffic sessions b etween the local device and other devices on the network.
What does “dig” do?
Domain Information Groper
Queries DNS servers for the fully-qualified domain name and IP address information of other devices.