Miscellaneous Flashcards

1
Q

PEAP

A

Protected Extensible Authentication Protocol (PEAP) is used to encapsulate EAP messages over a secure tunnel that uses Transport Layer Security (TLS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

phishing in order to trick someone important in the organization?

A

Whaling refers to targeting a specific individual, usually someone important in the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

mtd

A

maximum tolerable downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ldap injection

A

LDAP injection is an attack that can send malicious data to a web form that in turn makes calls or queries to a directory database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CASB

A

cloud access security broker, define security policies for network traffic flowing outside your on-premises environment to the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

documentary evidence

A

evidence that is printed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

memory usage

A

It is dynamic and can vary from system to system can’t be configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

tcpdump

A

tcpdump is a common Linux tool used to capture traffic and store the packets in a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

most volatile source of evidence

A

RAM is the most volatile source of information and is easily lost. It must be collected first during a computer forensics investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

netcat

A

used to open port or connet to open port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

metasploit

A

exploitation framework comes with diff exploits for diff types of attacks on diff systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

sn1per

A

automates vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

M of N control

A

The concept of M of N control requires a minimum number of personnel to participate in a key recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Recovery agent

A

used in Windows EFS implementations, is used to recover a key if an individual leaves an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

cross certificate

A

trust between two ca’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What command would you use to search the log for a specific pattern of characters?

A

grep

17
Q

which log shows login attempts

A

security log

18
Q

Which list presents the correct order in which each analysis should be performed?

A

Threat,risk

19
Q

what are two symmetric algorithms

A

aes and 3des

20
Q

what order should these be in risk analysis, business impact, ale?

A

Ale, risk analysis, business impact

21
Q

Risk assessment

A

A risk assessment identifies assets and threats to those assets. A risk register can then be populated, with each risk assigned a severity level; this facilitates the prioritization of risk-mitigation solutions.

22
Q

RAID level 1

A

disk mirroring, data written to one disk is also written to a second disk for safety

23
Q

Remote wipe

A

Remote wipe is used to remotely erase data from drives in wireless devices. A USB or other removable media would not support this technology. MAINLY USED TO WIPE MOBILE SMARTPHONES