Questions I got wrong Flashcards
What is a step by step process document called?
A procedure. A procedure is a document that outlines a series of steps to be followed to accomplish a specific task or operation.
Can brand reputation be assessed for value?
Yes. Assets can include both tangible and intangible items that have value to an organization.
What is the purpose of a subnet mask?
Subnet masks determine the network portion and host portion of an IP address.
What is the primary purpose of a digital signature in cryptography?
The primary purpose of a digital signature in cryptography is to verify the integrity and authenticity of digital data.
During an incident response, what is the highest priority of first responders?
In the context of incident response, the primary goal is to minimize disruption to the business or organization and restore normalcy as quickly as possible.
In the context of privileged access management, what is the purpose of just-in-time privileged access management and just-in-time identity?
Providing users with temporary elevated privileges when needed.
The security team identified that several employees have more system permissions than their roles require, due to temporary assignments or promotions that have since ended. What is the term for this situation?
Privilege creep
When a cyber attacker pretends to be someone else to trick people into giving away private information, what is this kind of attack called?
Pretexting
Which category of encryption does the substitution cipher belong to?
Symmetric encryption.
What is a Memorandum of Understanding (MOU) or Memorandum of Agreement (MOA)?
In the context of BC and DR, an MOU or MOA is usually established between organizations to ensure that in the event of an emergency, such as a fire, flood, power loss, etc., one organization can share its resources and facilities with the other to maintain critical functions.
Which process occurs as data moves up the layers of the OSI model?
Decapsulation
When you see the term point to point in a network question, the technology is probably….
VPN
What is a unique identifier assigned to network interfaces for communications on the physical network segment?
MAC address
When key distribution is not adequately secured, a cryptographic system becomes vulnerable to which security threat?
Man in the middle attack
What is the purpose of the SYN packet in the three-way handshake of TCP?
It establishes a reliable connection between the client and server.
What is the point of system hardening?
To reduce the system’s attack surface by applying secure configurations.
What is password hashing?
Adding random data to the password before hashing.
What is an XSS attack?
Cross-Site Scripting (XSS) attack (option D). In an XSS attack, an attacker injects malicious scripts into content that other users view on a web application. When other users load the affected page in their browser, the malicious script executes and can perform actions such as stealing their session cookies.
Using strong complex passwords and changing them frequently is what kind of control?
A preventative control
which term refers to the expected monetary loss that can be expected from a single risk event?
Single Loss Expectancy (SLE)
What is best used for ensuring the security of data in motion?
Public Key Infrastructure (PKI) provides a framework of encryption and data communications standards used to secure communications over public networks. It is suitable for ensuring the security of data in motion through encryption and the use of digital certificates.
What is a dictionary attack?
Involves using a list of commonly-used passwords or combinations.
Which access control systems requires individuals to validate their identity using mechanisms like PINs, biometrics, or other tokens?
Logical Access Control Systems
Logical Access Control Systems are automated systems that validate an individual’s identity through mechanisms like PINs, biometrics, or other tokens.
Which tool is specifically designed to crack password hashes by comparing them against a precomputed table of hash values?
Rainbow Table
A rainbow table is a precomputed table for reversing cryptographic hash functions, mainly used for cracking password hashes.