Test 1 review Flashcards

1
Q

best secure network protocol:
accepts customer purchases from your primary website

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

best secure network protocol
synchronize the time across all of your devices

A

NTPsec (network time protocol secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

secure network protocol
Access your switch using a CLI terminal screen

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

secure network protocol
talk with customers on scheduled conference calls

A

SRTP (secure real-time transport protocol/ Secure RTP)
uses AES (adv. encryption standard)
uses HMAC-SHA1: hash based message authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

secure network protocol
gather metrics from routers at remote sites

A

SNMPv3
for routing and switching. encrypts data, no tampering of data, verifies the source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what protocol and port should use for LDAP?

A

TCP/389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what protocol and port should you use for HTTPS?

A

TCP/443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what protocol and port should you use for a secure terminal?

A

SSH: TCP/22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

learning from open sources: websites, social media and business organizations, social engineering, dumpster diving

A

passive footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2 protocols that use TLS to provide secure communication

A

HTTPS and FTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which threat actor would likely attack system for direct financial gain?

A

organized crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what addresses file storage volatility?

A

partition data and temporary file systems (both part of a file storage subsystem)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what describes an all in one printer

A

MFD (multifunction device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which standard provides info on privacy and managing PII?

A

ISO 27701

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what should you create to prevent external storage devices used to extract data?

A

OS security policy to prevent removable media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what tool would decrease response time when addressing security incidents?

A

SOAR (security orchestration, automation and response–automates processes) cheaper option than hiring additional engineers

17
Q

you receive an error cert invalid message on a third party website. what does it mean?

A

On path attack: associated with the 3rd party intercepts network traffic. they cannot use a valid SSL/TLS cert. so it creates an error

18
Q

what should you use to provide a website login using existing credentials from a 3rd party site?

A

federation: allows members of 2 organization to authenticate using creds of another organization