Test Practices Questions Missed Flashcards

1
Q

Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?

A

PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:

A

CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following certificate formats is used to store a binary representation of a digital certificate?

A

DER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A digital certificate which allows multiple domains to be protected by a single certificate is known as:

A

Subject Alternative Name (SAN) certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A trusted third-party storage solution providing backup source for cryptographic keys is referred to as:

A

key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following allows for checking digital certificate revocation status without contacting Certificate Authority (CA)?

A

OCSP stapling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which digital certificate formats are commonly used to store private keys? (Select 2 answers)

A

PFX, P12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the answers listed below refers to the most common format in which Certificate Authorities (CA) issue certificates?

A

PEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers)

A

Suitable for large corporate networks

Requires RADIUS authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the EAP methods listed below relies on client-side and server-side certificates to perform authentication?

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following EAP methods offers the highest level of security?

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

A

RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following security protocols is the least susceptible to wireless replay attacks?

A

WPA2-CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the characteristic features of the secure version of IMAP? (Select all that apply)

A

Transport Layer Security (TLS)
TCP port 993
Secure Sockets Layer (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refer(s) to POP3S encrypted communication? (Select all that apply)

A

Transport Layer Security (TLS)
Secure Sockets Layer (SSL)
TCP port 995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A secure version of the HTTP protocol offering traffic encryption is known as: (Select all that apply)

A

HTTP over SSL
HTTP over TLS
HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which version(s) of the SNMP protocol offer(s) authentication based on community strings sent in an unencrypted form? (Select all that apply)

A

SNMPv1

SNMPv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following protocols allow(s) for secure file transfer? (Select all that apply)

A

FTPS
SFTP
SCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

LDAPS is an example of:

A

Secure directory access protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which protocol enables secure, real-time delivery of audio and video over an IP network?

A

SRTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the protocols listed below was designed as a secure replacement for Telnet?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following terms illustrate(s) the security through obscurity concept? (Select all that apply)

A

Code obfuscation
Steganography
SSID broadcast suppression
Substitution ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the answers listed below refers to a solution designed to strengthen the security of session keys?

A

PFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following terms is used in conjunction with the assumption that the output of a cryptographic function should be considerably different from the corresponding plaintext input?

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the terms listed below is used to describe a situation where a small change introduced to the input data before encryption causes large changes in its encrypted version?

A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the characteristic features of Elliptic Curve Cryptography (ECC)? (Select 3 answers)

A

Asymmetric encryption
Low processing power requirement
Suitable for small wireless devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Examples of means that provide randomization during the encryption process include: (Select 3 answers)

A

Cryptographic nonce
Salting
Initialization Vector (IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Pseudo-random data used in combination with a secret key in WEP and SSL encryption schemes is known as:

A

IV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A type of encryption scheme that uses a paired public and private key is known as: (Select 2 answers)

A

Asymmetric encryption

Public-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A type of encryption scheme where the same key is used to encrypt and decrypt data is referred to as: (Select 3 answers)

A

Session-key encryption
Symmetric encryption
Secret-key encryption

31
Q

Which of the following are hashing algorithms? (Select all that apply)

A

MD5
RIPEMD
HMAC
SHA

32
Q

Which of the following authentication protocols offer(s) countermeasures against replay attacks? (Select all that apply)

A

IPsec
Kerberos
CHAP

33
Q

Which of the following answers lists an example of a cryptographic downgrade attack?

A

POODLE

34
Q

Which of the acronyms listed below refers to a cryptographic attack where the attacker has access to both the plaintext and its encrypted version?

A

Known Plaintext attack KPA

35
Q

Which of the command-line utilities listed below can be used to perform a port scan?

A

Nmap

netcat

36
Q

Which of the following command-line tools is used for discovering hosts and services on a network?

A

Nmap

37
Q

Command-line packet capturing utility?

A

tcpdump

38
Q

What is the name of a Linux command-line utility that can be used to display TCP/IP configuration settings?

A

ifconfig

39
Q

Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers)

A

ipconfig /release

ipconfig /renew

40
Q

Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)?

A

/all

41
Q

What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings?

A

ipconfig

42
Q

The arp command can be used to perform what kind of resolution?

A

IP to MAC

43
Q

Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses?

A

arp -a

44
Q

Which of the following CLI tools is used to troubleshoot DNS-related problems?

A

nslookup

45
Q

Netstat is a command-line utility which can be used for:

A

Displaying active TCP/IP connections

46
Q

Which of the statements listed below describe the purpose behind collecting OSINT?

A

Gaining advantage over competitors
Passive reconnaissance in penetration testing
Preparation before launching a cyberattack

47
Q

In penetration testing, active reconnaissance involves gathering any type of publicly available information that can be used later for exploiting vulnerabilities found in the targeted system. True or False?

A

False

48
Q

In penetration testing, passive reconnaissance relies on gathering information on the targeted system with the use of various non-invasive software tools and techniques, such as pinging, port scanning, or OS fingerprinting. True or False?

A

False

49
Q

Which of the terms listed below refers to a software that no longer receives continuing support?

A

End of Life EOL

50
Q

A command-line tool that can be used for banner grabbing is called:

A

netcat

51
Q

Technical controls

A

use technology

52
Q

Management contraols

A

use adminastrative and management methods

53
Q

Detective controls

A

attempt to detect incidents after they have occurred

54
Q

Operational controls

A

implemented by people in dat-today operations

55
Q

Corrective controls

A

attempt to reverse the impact of an incident

56
Q

Deterrent controls

A

attempt to discourage individuals from causing an incident

57
Q

Compensating controls

A

are alternative controls used when a primary control is not feasible

58
Q

What port is IPsec ESP?

A

51

59
Q

What port is IPsec AH?

A

50

60
Q

What port is GRE?

A

47

61
Q

What port is SMTPS?

A

143

62
Q

What port is LDAP on?

A

389

63
Q

What is a full tunnel?

A

Encrypts all traffic after a user has connected to a VPN using a tunnel.

64
Q

What is a split tunnel?

A

Only encrypts traffic destined for the VPN’s private network.

65
Q

What is IPsec tunnel mode?

A

Encrypts the entire IP packet used in the internal network.

66
Q

What is IPsec Transport?

A

Encrypts the payload and is used within private networks, not VPN traffic.

67
Q

What is a stateful firewall?

A

Makes decisions based on the context or state of the traffic. Keeps track of established sessions and inspects traffic based on it’s state with in a session

68
Q

What is a stateless firewall?

A

Use rules implemented by ACLs to identify allowed and blocked traffic.

69
Q

What is shimming?

A

When an attacker places some malware between an application and some other file and intercepts the communication to that file

70
Q

What is refactoring?

A

Process of changing names of variables, functions, etc in a program.

71
Q

What is a forward proxy?

A

Single location that provides access to a wide range of web sources

72
Q

What is a reverse proxy?

A

Internal facing proxy used as a front end to control and protect access to a server on a private network.

73
Q

What is an open proxy?

A

Usable by anyone on the internet?