Pocket Prep 1 Flashcards
Which of the following decouples the network hardware layer from the network control layer?
A. VLAN
B. MPLS
C. SDN
D. VPC
C. SDN
Explanation:
SDN is the virtualization of network technologies that creates a software defined control plane that is decoujpled from hardware.
Virtualizing the control plane enables more flexibility and control in the network management
MPLS (Multiprotocol label switching) is a network protocol used to connect multiple network locations
A company wants to enable integration by using middleware to move messages beween unlike services. What type of solution should they adopt for this?
A. LDAP
B. SOA
C. DNS
D. ESB
D. ESB
Explanation:
The Enterprise Service Bus (ESB) is the middleware that handles the communication between software applications in an SOA. Different providers of SDB provide products with varying functionalities
Service Oriented Architecture (SOA) is an approach to building modular, reusable, and interoperable services. DNS is used to translatre domain names to IP addresses
A CISO wants to improve security for users on the internal network. They decide to implement a device that can intercept connections between users desktops and the external sites that they visit so they can monitor for malware and filter content. What type of device should they use?
A. Internet gateway
B. Reverse Proxy
C. VPN
D. Forward Proxy
D. Forward Proxy
Explanation:
A forward proxy is also called a transparent, inline, intercepting or forced proxy. It sits between clients and the internet and can be used for such purposes as contennt filtering, caching and anonymity.
When it comes to information classification, what is the difference between a Government Classification System and a Commericial Classification System?
A. Government Classification System has an integrity focus, while a Commercial Classification System has a confidentiality focus
B. Government Classification System has a confidentiality focuses, while a Commericial Classification System has an integrity focus
C. Governement Classification System has an availability focus, while a Commercial Classification system has a confidentiality focus
D. Governement Classification System has an availability focus, while a Commercial Classification System has an authentication focus
B. Government Classification System has a confidentiality focuses, while a Commericial Classification System has an integrity focus
Explanation:
The core difference between a Government Classification System and a Commercial Classification System is that Government Classification System has a confidentiality focus, while a Commericial Classification system has an integrity focus
A company has a VPN tunnel that a partner organization uses. Sensitive information passes through the tunnel, so the company wants to be sure that a session key cannot be compromised if one of the long term keys is ever compromised. What do they need to implement for this?
A. Password based key derivation 2
B. Authenticated encryption with associated data
C. Key streching
D. Perfect forward secrecy
D. Perfect forward secrecy
Explanation:
Perfect Forward Secrecy (PFS) ensures that even if a threat actor accesses a long term encryption key, they cannot use it to decrypt past or future keys. THis is important because if an attacker could store traffic and later try to decrypt it when the long term key is exposed.
From a quantitative risk perspective, when will SLE and AV be equal?
A. When ARO is %100
B. When AV is 50%
C. When EF is 50%
D. When EF is 100%
D. When EF is 100%
Explanation:
AV (asset value) is how much an asset is worth
EF (Exposure factor) is how much a particularly threat could impact a given asset, expressed as a percentage
SLE (Single loss eexpectancy) is the amount of loss expected if an even occurs. The SLE formula is:
SLE = AV x EF
Therefore, SLE will equal AV when EF is 100% because the formula becomes:
SLE= AV x 1.00
Which of the following is an open standard that allows users to be authenticated by multiple sites while using the same identity?
A. LDAP
B. RFB
C. SAML
D. OpenID
D. OpenID
Explanation:
OpenID is an open standard and decentralized protocol that allows users to be authenticated by multiple sites.
Which of the following is an approach to data zone creation that focuses on attack vectors?
A. Vector oriented
B. Vector enclaves
C. Protectected enclaves
D. Information-centric
A. Vector oriented
Explanation:
A vector oriented approach to data zone creation focuses on attack veoctors that threats in an environment could exploit
A company uses a third party certificate based authentication method that ties its identity to the key and verifies its validity. What type of framework are they using to implement this?
A. PKI
B. GPG
C. PGP
D. ECC
A. PKI
Explanation:
Public Key Infrastructure (PKI) is a framework for secure communication in a networked environment. It uses certificate authorities to issue digital certificates after verifying the owners identity
Of the following, which is a device that provides Type 1 encryption over otherwise insecure networks?
A. IDS
B. SIEM
C. INE
D. IPS
C. INE
Explanation:
An inline nnetwork encryptor (INE) is a type of 1 encryption device. Type 1 is an NSA term that descruves devices that provide encryption and allow network functionality. INEs are used for securing connections over otherwise insecure networks
Which of the following statements about WPA3 is true?
A. It enables the use of Zigbee
B. It uses TKIP
C. It reduces the risk of replay attacks
D. It is less secure than WEP
C. It reduces the risk of replay attacks
Explanation:
WPA3 is a WiFi security standard introduced in 2018. It provides stronger protect against replay attacks than WPA2 and earlier wireless security protocls
Zugbee is a wireless communication protocol that is nnot enabled by using WPA3
What rating does a CVSS 3.1 score of 9.0 have?
A. High
B. Critical
C. Severe
D. Medium
B. Critical
Explanation:
Critical 9.0-10.0
High 7-8.9
Medium 4.0-6.9
Low 0.1-3.9n
What denial of service attack involves to use of spoofed ICMP packets that use the targets address as the source of a broadcast message?
A. Ping of death
B. Syn flood
C. Land
D. Smurf
D. Smurf
Explanation:
Smurf attacks are a type of DoS attack that involve the attacker sending an ICMP packet that uses the targets address as the source of a boradcast message. THis leads to the target being spammed with broadcast responses and potentially exhausting its resources
How many bits of AES encryption does the personal version of WPA3 use?
A. 4096
B. 2048
C. 192
D. 1024
C. 192
Explanation:
Both the enterprise and personal version of WPA3 enable the use of 192 bit AES encryption
Which of the following is a patented block cipher that was considered as a replacement for DES, but patent royalties limited its adoption?
A. IDEA
B. AES
C. 3DES
D. CMDB
A. IDEA
Explanation:
IDEA (international data encryption algorithm) is a block cipher patened by a Swiss company. IDEA was considered as a replacement for DES, but the patent royalties limited its adoption. AES has emerged as a popular replacement for DES.
Which of the following is a non automated response method to attacks?
A. IPS
B. SOAR
C. SCAP
D. DRP
D. DRP
Explanation:
A Disaster Recovery Plan is a document with steps that should be followed to recover from an incident. This is a non automated method.
What set of IEE standards provides specifications like supported frquency bands and data rates for WiFi networks?
A. 802.1x
B. 802.11
C. RFC 5424
D. RFC 3164
B. 802.11
Explanation
The IEEE 802.11 standards provide specifications for how WiFi networks work. For example, 201.11ax defines support frequency bands and data rates WiFi 6/6E
How can eFuse be used to improve the security of a mobile device?
A. By encrypting all data on a mobile device
B. By altering the hardware of a mobile device in real time
C. By remotely wiping data on the device when it si replaced as lost or stolen
D. By allowing firmware and software to be upgraded wirelessly
B. By altering the hardware of a mobile device in real time
Explanation:
The technology of eeFusee allows for hardware to be reconfigured so that it cannot be used. This can be useful if it has been determined that a device has been tampered with.
What built in tool does Windows have for filter integrity monitoring?
A. SFC
B. Tripwire
C. Task Manager
D. CHKDSK
A. SFC
Explanation:
The System File Checker (SFC) tool checks and verifies the system files on a Windows computer. It can replace corrupted files with their correct versions
Tripwire is a third party tool for file integrity monitoring. Task Manager is a Windows utility for managing and monitoring system resources
Which of the following is an open XML based standard for exchanging identity management information that uses components such as request authority, a provisioning service provider, and a provisioning service target?
A. SOAP
B. XACML
C. OAUTH
D. SPML
D. SPML
Explanation:
Service Provisioning Markup Language (SPML) is an open standard for exhcnaging identity management information