Test Out - 1.0 Security Concepts and 2.0 Threats, Vulnerabilities and Mitigations Flashcards

1
Q

ASA stands for

A

Adaptive Security Appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Operation controls are controls for the

A

human element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compensating controls are a partial control solution

A

that is implemented when a control cannot fully meet a requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Detective controls monitor network activity and inform the security team of a

A

potential security event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Corrective controls attempt to fix

A

any controls that aren’t working properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deterrent controls discourage malicious actors

A

from attempting to breach a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Shadow IT is devices added to the network by

A

internal employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Steps in General attack strategy are

A

Reconnaissance
breaching
Escalating privileges
Staging
Exploiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Part of a social engineering attack

A

Research
Development
Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Difference between Disinformation and Misinformation

A

Disinformation they want to decieve
Misinformation they do not want to decieve but it is incorrect information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A pharming attack redirects users from a legitimate website

A

to a malicious one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vishing is what

A

Voice phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RSA, Diffie-Hellman, ECC, DSA and ElGamal are used in which type of encryption

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Blowfish and DES are used in which type of encryption

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption key strength of AES, Twofish, IDEA, DES

A

DES - 56 bit
AES 128, 192, 256
TwoFish upto 256
IDEA 128

17
Q

How does the following cipher mode operate CTR (counter mode)

A

uses a nonce (a unique, random value) combined with a counter that is incremented for each block of plaintext.

18
Q

How does the following cipher mode operate Electronic Code Book (ECB)

A

Encrypts each block independently (no nonce or counter).

19
Q

How does the following cipher mode operate Cipher Feebback Mode (CBC)

A

Uses previous ciphertext to generate the next encryption block (no counter).

20
Q

How does the following cipher mode operate Cipher Block Chaining (CBC)

A

Uses the previous ciphertext block as an input to the next block encryption (no counter).