Post-Assessment 6 Flashcards
Which of the following is NOT a private IP address?
198.168.1.25
Which encryption algorithm cannot be broken mathematically and does not require the use of a computer?
OTP
Which user access control model dynamically assigns roles to subjects based on a set of rules?
Rule based access control
Downloading unofficial third-party apps from a website is called?
Sideloading
In the Windows ACL table which entry is a unique number?
SID
Which SD cards are commonly used in smartphones and tablets? Pick two.
miniSD, microSD
To match a small part of a leaked document to a document that has been identified as needing protection DLP systems use which of the following?
Index matching
Which Microsoft Windows password hash technologies use MD5?
NTLMv2
Validating credentials is which of the following actions?
Authentication
When was the Wi-Fi protected setup WPS introduced?
2007
SNMP can be found on which of the following devices? Select all that apply.
UPSs, Routers, Switches, Fax machines ( All four )
Which of the following types of data can a DLP be configured to look for?
All of the choices. ( Words in a sequence, Phone numbers, Lines of computer code )
The name given to a connected but not actively participating device is _______ .
Parked slave
The total number of IPv6 addresses translates to 665 million billion IP addresses per square ____ on earth.
Meter
What two layers of the OSI can load balancers perform at?
Layer 4, Layer 7