Post-Assessment 2 Flashcards
Which of the following choices best identifies the process of scrambling information to prevent it from being read by unauthorized parties?
Cryptography
A _________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers and email servers but cannot enter the secure network
DMZ
Which of the following is NOT true about Kerberos tickets?
They are generic.
Kerberos was developed by ______
MIT
What are the three A’s of security?
Authentication, Accounting, Authorization
What type of network topology is Bluetooth considered?
PAN
Which type of control provides an alternative to normal controls?
Compensating
Which of the choices best describes the process of hiding data within images?
Steganography
Which FTP mode connects the data channel on port 1025 to 5000?
FTP Passive
To utilize a third-party spam filter for email which record is changed?
MX record
Which of the following static system uses an OBD-II connector for troubleshooting?
In vehicle computer
Which social engineering technique uses emails or false web posting to trick the user into giving up private information?
Phishing
Which of the following analysis techniques is a new approach to antivirus detection?
Dynamic heuristic detection
What are the three layers of protection?
Personnel Security, Organizational Security, and Physical Security
When an attacker attempts to gain access to a user’s computer by stealing the encrypted file containing the password hash that would be _______
Offline Cracking