MISC Flashcards

1
Q

In AD, Kerberos does what?

A

network authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA stands for?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAA stands for?

A

Authentication
Authorization
Accounting/Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 AD group types?

A

Domain Local
Global
Universal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TKIP stands for?

A

Temporal Key Integrity Protocol

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPA stands for?

A

Wi-Fi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IV stands for?

A

Initializing Vector

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AES stands for?

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AES (Advanced Encryption Standard) is used in what type of encrypting standard?

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WPA2 stands for?

A

Wi-Fi Protected Access 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PKI stands for?

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PKI (Public Key Infrastructure) does?

A

certificate encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNSSEC stands for?

A

Domain Name system Security Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WUA stands for?

A

Windows Update Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WUA (Windows Update Agent) does?

A

Controls updates for individual clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NAP stands for?

A

Network Access Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NAP (Network Access Protection) does?

A

enforces client configuration compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

5 classes of firewall?

A
Class 1 - Personal firewall
Class 2 - Router firewall
Class 3 - Low end hardware firewall
Class 4 - High end hardware firewall
Class 5 - High end server firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HRA stands for?

A

Health Registration Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NPS stands for?

A

Network Policy Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TLS stands for?

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

TLS (Transport Layer Security) does?

A

current extension of SSL encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

2 mail encryptions are?

A

Pretty Good Privacy (PGP)

Secure/Multipurpose Internet Mail Extensions (S/MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

S/MIME stands for?

A

Secure/Multipurpose Internet Mail Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

PGP encrypts how?

A

public & session keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

S/MIME does?

A

embeds objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

4 types of VPN tunneling protocols?

A

PPTP
L2TP
SSTP
IKEv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

PPTP stands for?

A

Point to Point tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

L2TP stands for?

A

Layer 2 Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

SSTP stands for?

A

Secure Sockets Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

IKEv2 stands for?

A

Internet Key Exchange version 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which VPN tunneling protocol has old, weak encryption?

A

PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which VPN tunneling protocol supports VPN Reconnect?

A

IKEv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which VPN tunneling protocol is industry standard?

A

L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

4 types of VPN authentication forms?

A

PAP
CHAP
MS-CHAPv2
EAP-MS-CHAPv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

PAP stands for?

A

Password Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

CHAP stands for?

A

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

MS-CHAPv2 stands for?

A

Microsoft CHAP version 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

EAP-MS-CHAPv2 stands for?

A

Extensible Authentication Protocol Microsoft CHAP version2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which VPN authentication form can authenticate, via biometrics and “what you have?”

A

EAP-MS-CHAPv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which VPN authentication form uses plaintext and is not recommended?

A

PAP

42
Q

What is the best symmetric encryption?

A

AES

43
Q

5 types of symmetric encryption?

A
Block ciphers
DES
3DES
AES
Stream cipher
44
Q

Block cipher symmetric encryption works how?

A

plaintext with a key

45
Q

DES symmetric encryption has how many bits?

A

56 bits

46
Q

Which symmetric encryption is less vulnerable than DES?

A

3DES encryption

47
Q

Stream cipher symmetric encryption works how?

A

bit-by-bit

48
Q

DES stands for?

A

Data Encryption Standard

49
Q

AES stands for?

A

Advanced Encryption Standard

50
Q

4 types of asymmetric encryption?

A

SSL
TLS
PGP
Hash function

51
Q

TLS stands for?

A

Transport Layer Security

encryption

52
Q

PGP stands for?

A

Pretty Good Privacy

encryption

53
Q

Hash function asymmetrical encryption works how and used for what?

A

encrypts one way, with no decryption

verifies passwords

54
Q

types of certificate formats?

A

PKCS #12
PKCS #7
DER
Base-64 encoded X.509

55
Q

PKCS #12 certificates do?

A

archive files

56
Q

PKCS #7 certificates do?

A

stores certificates

57
Q

Base-64 encoded X.509 certificates do?

A

stores single certificate but no pvt key

58
Q

PKI stands for?

A

Public Key Infrastructure

59
Q

PKI does?

A

digital certificate system

60
Q

2 types of CA?

A

Enterprise Root CA

Stand-alone CA

61
Q

Enterprise Root CA does what?

A

top of CA hierarchy

62
Q

Stand-alone CA does not do what 2 things?

A

use AD

automatically enroll visitors

63
Q

RA stands for?

A

Registration Authority

64
Q

RA does?

A

distributes keys

65
Q

CRL stands for?

A

Certificate Revocation List

66
Q

Device Guard is and does?

A

lockdown device using code integrity policies to only run trusted apps

67
Q

A changing virus is called what?

A

polymorphic

68
Q

When an administrator grants permissions on a folder to a group, which three permission levels are assigned by default?

A

Read
Read & execute
List folder contents

69
Q

Which two permission levels are available to assign to a user or group when creating a basic share on a folder?

A

Read

Write

70
Q

Which registry hive stores file associations?

A

HKEY_CLASSES_ROOT

71
Q

On which Group Policy path will an administrator find the Account Policies area?

A

Computer Configuration/Policies/Windows Settings/Security Settings

72
Q

What is used to audit non-Active Directory objects?

A

Object access

73
Q

Which administrative tool is used to read auditing logs?

A

Event Viewer

74
Q

Which of these encryption methods uses block ciphers? Choose three answers.

A

AES
DES
3DES

75
Q

For corporations, what 2 services manage updates?

A

Windows Server Update Service (WSUS)

System Center Configuration Manager (SCCM)

76
Q

WSUS stands for?

A

Windows Server Update Service

77
Q

SCCM stands for?

A

System Center Configuration Manager

78
Q

802.1x uses what server?

A

RADIUS

79
Q

802.1x does what?

A

port based network authentication

80
Q

Firewall packet filtering operates at what OSI layer?

A

Layer 3

81
Q

Firewall circuit filtering operates at what OSI layer?

A

Layer 5

82
Q

3rd generation firewalls operate at what OSI layer?

A

Layer 7 (AKA application firewalls/proxy servers)

83
Q

Stateless firewalls filter based on what?

A

packet: type, port number, source & destination IP

84
Q

Stateful firewalls filter based on what?

A

everything stateless does and allows return traffic that is part of the OSI Session

85
Q

Distance vector routing does what 2 things?

A

hop count

split horizon loop prevention

86
Q

Link state routing does what 3 things?

A

hop count
distance
speed

87
Q

3 types of protocol spoofing

A

ARP (Address Resolution Protocol) spoofing
DNS (Domain Name System) spoofing
IP Address spoofing

88
Q

ARP (Address Resolution Protocol) spoofing works how?

A

stealing host IP address and sending its traffic to attacker

89
Q

DNS (Domain Name System) spoofing works how?

A

redirects web request to incorrect website

90
Q

IP Address spoofing works how?

A

IP packets attacked and their source forged

91
Q

IPsec protocol, ESP (Encapsulating Security Payload), does?

A

provides CIA for only IP data

92
Q

ESP stands for?

A

Encapsulating Security Payload

93
Q

AH stands for?

A

Athentication Header

94
Q

IPsec protocol AH (Athentication Header) does?

A

authentication, integrity, and anti-replay for data packets

95
Q

IPsec protocol AH (Athentication Header) does not do?

A

encryption

96
Q

IPsec protocol IKE (Internet Key Exchange) does?

A

defines encryption key exchange

97
Q

IKE stands for?

A

Internet Key Exchange

98
Q

SA stands for?

A

Security Association

re: IPsec protocol

99
Q

SA (Security Association) does?

A

rules for VPN connections

100
Q

Which are the two IPsec modes?

A

Transport Mode

Tunnel Mode