PKI Security Protocols Flashcards
XSS is an attack that uses third-party Web resources to run script(s) within the victim’s Web browser or scriptable application. Occurs predominately when a browser visits a malicious Web site or clicks a malicious link.
TRUE
FALSE
TRUC
FAL5E
TRUE
Nick needs to send critical information to Daniel. Due to regulations the document he wants to send contains senstive information that should not be viewed by external parties. Daniel decides to solve this problem by encrypting the document utilizing asymmetric encryption so it is safe to transfer. Nick md5 hashes the document and writes down the last eight characters of its hash for safe keeping.
If Daniel wants to make adjustments to the document and send it back to Nick which would he need to utilize to encrypt the file before sending it?
Daniel must utilize Nick’s Private Key
Nick must utilize Daniel’s Public Key
Nick must utilize Daniel’s Private Key
Daniel must utilize Nick’s Public Key
Daniel must utilize Nick’s Public Key
Which of the following assist in preventing injection vulnerabilites
Input Validation
Cyber Awareness Training
Fuzzing
Limitting maximum queries
Input Validation
The act of providing input into something that results in something not intially intended for is what type of vulnerablitiy?
Injection
Tampering
Service Manipulation
Input Malformance
Injection
An unknown entity obtained access to a jump box that serves as centralized entry point between the public network and network2. Upon further investigation they maintained a persistent presence on the public network and have begun logging into as many machines they can touch in network2.
Which of the following best describes the entitiy’s overall intent when moving around
Network Domminance
Lateral Movement
Stealth Exploitation
Network Scanning
Lateral Movement
Which of the following is not an effective way to prevent malicious code injection, which will be executed in the victim’s browser.
Data Validation
Password Complexity
Input Sanitation
Output Escaping
Password Complexity
_____ is the collection of vetted encryption keys utilizing digital certificates. Primarily to assist in verifying authenticity of ownership
PKI
Which of the following defines PKI
Public Key-altherimic Installment
Public Key Infrustructure
Priority Kept Installment
Possible Knowledge Inferment
Public Key Infrustructure