PM SG 7-8 Flashcards

1
Q

Match the technology:

A) A user confirms an email message is authentic
B) The same key is used for encryption and decryption
C) A placeholder for data is sent across the network
D) A company adds additional entropy to stored passwords
E) All sensitive information is hidden by asterisks

1) Tokenization
2) Key stretching
3) Digital signature
4) Root of trust
5) Symmetric
6) Data masking
7) Salting
8) Key escrow

A

1.Tokenization → C) A placeholder for data is sent across the network
3.Digital signature → A) A user confirms an email message is authentic
5.Symmetric encryption → B) The same key is used for encryption and decryption
6.Data masking → E) All sensitive information is hidden by asterisks
7.Salting → D) A company adds additional entropy to stored passwords

Key escrow → (Securely stores encryption keys for retrieval)
Root of trust → (Foundational security principle)
Key stretching → (Enhances password security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company stores different portions of an important database across multiple data centers. Which of the following would best describe this data protection strategy?

1.Obfuscation
2.Hashing
3.Permission restrictions
4.Segmentation
5.Masking

A

Correct Answer: 4.Segmentation

Segmentation: Splitting data across different locations for security and performance.

Incorrect options:
1.Obfuscation: Hides data but doesn’t separate it.
5.Masking: Hides parts of data but doesn’t split it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company has identified a server with an unpatched operating system. Which of the following would have most likely provided this notification?

1.NetFlow
2.DLP
3.Vulnerability scanner
4.Protocol decode
5.SNMP trap

A

Correct Answer: 3.Vulnerability scanner

Vulnerability scanner: Scans systems for missing patches and security flaws.

Incorrect options:
1.NetFlow: Monitors network traffic, not vulnerabilities.
5.SNMP trap: Reports system events but doesn’t scan for vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following would be the best description of active reconnaissance?

1.Dumpster diving
2.OS fingerprinting
3.DNS registration info
4.Financial review
5.Social media analysis

A

Correct Answer: 2.OS fingerprinting

OS fingerprinting: Actively probes a system to determine the operating system.

Incorrect options:
Social media analysis & dumpster diving: Passive reconnaissance techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company has begun to implement key stretching. Which of the following would be most associated with this change?

1.More complex passwords
2.Secure key storage
3.Stronger encryption
4.Offsite backups
5.Self-signed certificates

A

Correct Answer: 3.Stronger encryption

Key stretching: Slows down brute-force attacks by making password hashing computationally expensive.

Incorrect options:
1.More complex passwords: Helps security but isn’t the direct purpose of key stretching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A system administrator is working on a contract that will specify a minimum required uptime for a set of Internet-facing firewalls. The administrator needs to know how often the firewall hardware is expected to fail between repairs. Which of the following would BEST describe this information?

1.MTBF
2.RTO
3.MTTR
4.RPO

A

Correct Answer: 1.MTBF (Mean Time Between Failures)

MTBF: Measures the average time between hardware failures.

Incorrect options:
3.MTTR (Mean Time to Repair): Measures the time to fix an issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user in the accounting department can view all monthly expense reports, but they cannot change or remove any of the data. Which of the following would be the most likely reason for this?

1.Full-disk encryption
2.Least privilege
3.Digital signatures
4.Host-based firewall
5.Expired password

A

Correct Answer: 2.Least privilege

Least privilege: Grants users only the permissions they need.

Incorrect options:
1.Full-disk encryption: Protects data but doesn’t manage permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security team has just installed a new WAF. Which of the following would be the most likely use for this WAF?

1.Manage encrypted tunnels
2.Securely store web server certificates
3.Maintain uptime during a power outage
4.Block web-based application attacks
5.Check a system for compliance

A

Correct Answer: 4.Block web-based application attacks

WAF (Web Application Firewall): Protects against web attacks like SQL injection and XSS.

Incorrect options:
IPS (Intrusion Prevention System): Monitors broader network threats, not just web apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security administrator has received a notification that an email containing credit card numbers has been blocked before it was sent. Which of the following would be the most likely source of this notification?
1.FIM
2.Pressure sensors
3.Proxy
4.IPS
5.DLP

A

Correct Answer: 5.DLP (Data Loss Prevention)

DLP: Detects and prevents unauthorized transmission of sensitive data.

Incorrect options:
1.FIM (File Integrity Monitoring): Detects changes to files but doesn’t prevent email sending.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A service provider has created a list of tasks to be completed for an upcoming server installation. Which of the following would best describe this list?

1.MSA
2.MOU
3.SOW
4.SLA
5.NDA

A

Correct Answer: 3.SOW (Statement of Work)

SOW: Outlines tasks and deliverables for a project.

Incorrect options:
4.SLA: Defines service levels but not specific tasks.
2.MOU: General agreement, not a task list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following would best describe data masking?

1.Hashing
2.Key exchange
3.Obfuscation
4.Encryption
5.Salting

A

Correct Answer: 3.Obfuscation

Obfuscation: Hides data (e.g., replacing SSNs with ***).

Incorrect options:
1.Hashing: One-way conversion of data, not masking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A data breach has occurred in a large insurance company. A security administrator is building new servers and security systems to get all of the financial systems back online. Which part of the incident response process would BEST describe these actions?

1.Lessons learned
2.Containment
3.Recovery
4.Analysis

A

Correct Answer: 3.Recovery

Recovery: Restores systems and gets operations back to normal.

Incorrect options:
2.Containment: Stops an attack but doesn’t rebuild systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly