Q+A Flashcards
You want to use a more secure version of FTP for transferring files. What are two options?
SFTP and FTPS
What is known as when traffic to a website is redirected to another illegitimate site?
Pharming
In an attempt to gain access to discarded company documents, what social engineering attack would a person implement?
Dumpster Diving
What is the more advanced replacement for RADIUS?
Diameter
What port does TACACS+ use?
Port 49
What port does SSH use?
Port 22
What port does TFTP use?
Port 69
You surmise that a user;s session was interrupted by an attacker who inserted malicious code into the network traffic. What attack has occurred?
Man-in-the-middle (MITM)
What algorithm depends on the inability to factor large prime numbers?
RSA (Rivest, Shamir, Adleman)
Greg needs to centralize the authentication of multiple networking systems against a single user database. What is he trying to implement?
Single sign-on (SSO)
What fire extinguisher should be used to put out metal fires suck as the kind created by magnesium or titanium?
Class D
What protocol uses port 443?
HTTPS (SSL and TLS)
You work as a network admin for your organization and use a tool to capture ICMP, HTTP, and FTP, and other packets of information. Which tool should you use.
Protocol Analyzer
You are in charge of recycling computers. Some of the computers have hard drives that contain personally identifiable information (PII). what should be done to the hard drive before it is recycled.
The hard drive should be sanitized.
What port and transport mechanism does TFTP use by default?
69 and UDP
A user receives an encrypted message that was encrypted using asymmetric cryptography. What does this recipient deed to decrypt the messagae
Recipient’s private key
What tool should you use to identify network spike activity?
Protocol Analyzer
One of your database servers is mission-critical. You cannot afford any downtime. What is the best item to ensure minimal downtime of the server and ensure fault tolerance of the data stored on the database server?
RAID (Redundant Array of Inexpensive Disks)
You get an automated call from what appears to be your bank. The recording asks you to state your name and birthday and enter you account number to validate your identity. what type of attack has been perpetuated against you.
Vishing
Which network authentication protocol uses symmetric key cryptography, stores a shared key for each network resource and uses a Key Distribution Center (KDC)?
Kerberos
What port does PPTP use?
Port 1723
Which service uses port 49?
Terminal Access Controller Accesses-Control System Plus (TACACS+)
What port does RDP use?
port 3389
What port does L2TP use?
Port 1701
What kid of threat is a virus designed to format a computer’s hard drive on a specific calendar day?
Logic Bomb
What port does Kerberos use?
Port 88
What is a hardware chip that stores encrypted keys and resided on a motherboard?
Trusted platform module (TMP)
What protocol uses port 22?
SSH (also SCP and SFTP)
What port does DNS use?
Port 53
An attacker uses a method that is meant to obtain information from a specific person. what type of attack is this?
Spear Phishing
Your organization has several logins necessary to gain access to several different sets of resources. what access control method could be used to solve this problem.
Single Sign-on (SSO)
What should you be most concerned with when transferring evidence?
Chain of Custody
Which type of cable doesn’t suffer from EMI?
Fiber optic
What is an area of the network infrastructure that enables a person to put public-facing systems into it without compromising the entire infrastructure?
DMZ (demilitarized zone)
Your high-tech server room needs a quality fire suppression system. What is the most appropriate type of fire suppression system to install?
Gaseous fire suppression
What port and transport mechanism protocol must be opened on a firewall to allow incoming SFTP connections?
22 and TCP
What grouping of computers is used to start a DDoS attack?
Botnet
You have been commissioned by a customer to implement a network access controlmodel that limits remote users network usage during normal business hours only. You create one policy that applies to all the remote users. What access control model are you using
Role-based access control (RBAC)
You’re designing security for an application into it. You need to ensure that all task relating to the transfer of money you require actions by more than one user through a series of checks and balances. What access control methods should use injure?
Separation of duties
One where does the telnet use?
Port 23