Post-Assessment 6 Flashcards

1
Q

Which of the following is NOT a private IP address?

A

198.168.1.25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which encryption algorithm cannot be broken mathematically and does not require the use of a computer?

A

OTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which user access control model dynamically assigns roles to subjects based on a set of rules?

A

Rule based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Downloading unofficial third-party apps from a website is called?

A

Sideloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the Windows ACL table which entry is a unique number?

A

SID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which SD cards are commonly used in smartphones and tablets? Pick two.

A

miniSD, microSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To match a small part of a leaked document to a document that has been identified as needing protection DLP systems use which of the following?

A

Index matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Microsoft Windows password hash technologies use MD5?

A

NTLMv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Validating credentials is which of the following actions?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When was the Wi-Fi protected setup WPS introduced?

A

2007

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SNMP can be found on which of the following devices? Select all that apply.

A

UPSs, Routers, Switches, Fax machines ( All four )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following types of data can a DLP be configured to look for?

A

All of the choices. ( Words in a sequence, Phone numbers, Lines of computer code )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The name given to a connected but not actively participating device is _______ .

A

Parked slave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The total number of IPv6 addresses translates to 665 million billion IP addresses per square ____ on earth.

A

Meter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What two layers of the OSI can load balancers perform at?

A

Layer 4, Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the choices is the most widely accepted form of digital certificate?

A

X.509

17
Q

Cryptography provides five basic protections for information. Which choice describes the protection that ensures that only authorized parties can view the information?

A

Confidentiality

18
Q

A ______ account is an account that has not been accessed for a period of time.

A

Dormant