PM SG 7-8 Flashcards
Match the technology:
A) A user confirms an email message is authentic
B) The same key is used for encryption and decryption
C) A placeholder for data is sent across the network
D) A company adds additional entropy to stored passwords
E) All sensitive information is hidden by asterisks
1) Tokenization
2) Key stretching
3) Digital signature
4) Root of trust
5) Symmetric
6) Data masking
7) Salting
8) Key escrow
1.Tokenization → C) A placeholder for data is sent across the network
3.Digital signature → A) A user confirms an email message is authentic
5.Symmetric encryption → B) The same key is used for encryption and decryption
6.Data masking → E) All sensitive information is hidden by asterisks
7.Salting → D) A company adds additional entropy to stored passwords
Key escrow → (Securely stores encryption keys for retrieval)
Root of trust → (Foundational security principle)
Key stretching → (Enhances password security)
A company stores different portions of an important database across multiple data centers. Which of the following would best describe this data protection strategy?
1.Obfuscation
2.Hashing
3.Permission restrictions
4.Segmentation
5.Masking
Correct Answer: 4.Segmentation
Segmentation: Splitting data across different locations for security and performance.
Incorrect options:
1.Obfuscation: Hides data but doesn’t separate it.
5.Masking: Hides parts of data but doesn’t split it.
A company has identified a server with an unpatched operating system. Which of the following would have most likely provided this notification?
1.NetFlow
2.DLP
3.Vulnerability scanner
4.Protocol decode
5.SNMP trap
Correct Answer: 3.Vulnerability scanner
Vulnerability scanner: Scans systems for missing patches and security flaws.
Incorrect options:
1.NetFlow: Monitors network traffic, not vulnerabilities.
5.SNMP trap: Reports system events but doesn’t scan for vulnerabilities.
Which of the following would be the best description of active reconnaissance?
1.Dumpster diving
2.OS fingerprinting
3.DNS registration info
4.Financial review
5.Social media analysis
Correct Answer: 2.OS fingerprinting
OS fingerprinting: Actively probes a system to determine the operating system.
Incorrect options:
Social media analysis & dumpster diving: Passive reconnaissance techniques.
A company has begun to implement key stretching. Which of the following would be most associated with this change?
1.More complex passwords
2.Secure key storage
3.Stronger encryption
4.Offsite backups
5.Self-signed certificates
Correct Answer: 3.Stronger encryption
Key stretching: Slows down brute-force attacks by making password hashing computationally expensive.
Incorrect options:
1.More complex passwords: Helps security but isn’t the direct purpose of key stretching.
A system administrator is working on a contract that will specify a minimum required uptime for a set of Internet-facing firewalls. The administrator needs to know how often the firewall hardware is expected to fail between repairs. Which of the following would BEST describe this information?
1.MTBF
2.RTO
3.MTTR
4.RPO
Correct Answer: 1.MTBF (Mean Time Between Failures)
MTBF: Measures the average time between hardware failures.
Incorrect options:
3.MTTR (Mean Time to Repair): Measures the time to fix an issue.
A user in the accounting department can view all monthly expense reports, but they cannot change or remove any of the data. Which of the following would be the most likely reason for this?
1.Full-disk encryption
2.Least privilege
3.Digital signatures
4.Host-based firewall
5.Expired password
Correct Answer: 2.Least privilege
Least privilege: Grants users only the permissions they need.
Incorrect options:
1.Full-disk encryption: Protects data but doesn’t manage permissions.
A security team has just installed a new WAF. Which of the following would be the most likely use for this WAF?
1.Manage encrypted tunnels
2.Securely store web server certificates
3.Maintain uptime during a power outage
4.Block web-based application attacks
5.Check a system for compliance
Correct Answer: 4.Block web-based application attacks
WAF (Web Application Firewall): Protects against web attacks like SQL injection and XSS.
Incorrect options:
IPS (Intrusion Prevention System): Monitors broader network threats, not just web apps.
A security administrator has received a notification that an email containing credit card numbers has been blocked before it was sent. Which of the following would be the most likely source of this notification?
1.FIM
2.Pressure sensors
3.Proxy
4.IPS
5.DLP
Correct Answer: 5.DLP (Data Loss Prevention)
DLP: Detects and prevents unauthorized transmission of sensitive data.
Incorrect options:
1.FIM (File Integrity Monitoring): Detects changes to files but doesn’t prevent email sending.
A service provider has created a list of tasks to be completed for an upcoming server installation. Which of the following would best describe this list?
1.MSA
2.MOU
3.SOW
4.SLA
5.NDA
Correct Answer: 3.SOW (Statement of Work)
SOW: Outlines tasks and deliverables for a project.
Incorrect options:
4.SLA: Defines service levels but not specific tasks.
2.MOU: General agreement, not a task list.
Which of the following would best describe data masking?
1.Hashing
2.Key exchange
3.Obfuscation
4.Encryption
5.Salting
Correct Answer: 3.Obfuscation
Obfuscation: Hides data (e.g., replacing SSNs with ***).
Incorrect options:
1.Hashing: One-way conversion of data, not masking.
A data breach has occurred in a large insurance company. A security administrator is building new servers and security systems to get all of the financial systems back online. Which part of the incident response process would BEST describe these actions?
1.Lessons learned
2.Containment
3.Recovery
4.Analysis
Correct Answer: 3.Recovery
Recovery: Restores systems and gets operations back to normal.
Incorrect options:
2.Containment: Stops an attack but doesn’t rebuild systems.