Questions I got wrong Flashcards
What is a step by step process document called?
A procedure. A procedure is a document that outlines a series of steps to be followed to accomplish a specific task or operation.
Can brand reputation be assessed for value?
Yes. Assets can include both tangible and intangible items that have value to an organization.
What is the purpose of a subnet mask?
Subnet masks determine the network portion and host portion of an IP address.
What is the primary purpose of a digital signature in cryptography?
The primary purpose of a digital signature in cryptography is to verify the integrity and authenticity of digital data.
During an incident response, what is the highest priority of first responders?
In the context of incident response, the primary goal is to minimize disruption to the business or organization and restore normalcy as quickly as possible.
In the context of privileged access management, what is the purpose of just-in-time privileged access management and just-in-time identity?
Providing users with temporary elevated privileges when needed.
The security team identified that several employees have more system permissions than their roles require, due to temporary assignments or promotions that have since ended. What is the term for this situation?
Privilege creep
When a cyber attacker pretends to be someone else to trick people into giving away private information, what is this kind of attack called?
Pretexting
Which category of encryption does the substitution cipher belong to?
Symmetric encryption.
What is a Memorandum of Understanding (MOU) or Memorandum of Agreement (MOA)?
In the context of BC and DR, an MOU or MOA is usually established between organizations to ensure that in the event of an emergency, such as a fire, flood, power loss, etc., one organization can share its resources and facilities with the other to maintain critical functions.
Which process occurs as data moves up the layers of the OSI model?
Decapsulation
When you see the term point to point in a network question, the technology is probably….
VPN
What is a unique identifier assigned to network interfaces for communications on the physical network segment?
MAC address
When key distribution is not adequately secured, a cryptographic system becomes vulnerable to which security threat?
Man in the middle attack
What is the purpose of the SYN packet in the three-way handshake of TCP?
It establishes a reliable connection between the client and server.