Test ?'s 2 Flashcards
Which type of data has high trade values in black markets, is often anonymized or deidentified for use in scientific research, and when compromised, can lead to its use in blackmail or insurance fraud?
Personal Health Information (PHI)
What is the main difference between a disk image and a snapshot?
Disk images include bootloader and OS.
What is Inline Appliance?
Intrusion prevention system (IPS) appliances that must have all traffic pass through them are “inline” with the network. This also makes them a single point of failure if there is a no fault tolerance mechanism in place.
Differential, full, and incremental refer to which of the following when discussing backup types that will not collect open files?
A copy-based backup is a replica of an internet technology (IT) system. A copy of a system can be performed at any time to provide a system a means of backup. Copy-based backups will not copy open files.
Devices deployed in a network and that send data to the local area network (LAN) level and process it with an Internet of things (IoT) sensor are which of the following?
Fog Computing
Why can’t an Extended Validation certificate not be issued for a website domain?
The domain uses a wildcard
In a full chain of trust, which entity would be able to handle processing certificate requests and verifying requester identity?
A Registration Authority (RA)
What is TRUE about a certificate authority (CA) in a hierarchical model?
Offline CA is a best practice and Intermediate CA issue certificates.
What option has the best ability to hide the identity of the certificate requestor?
OCSP Stapling (Online Status Certificate Protocol)
What does the process of carving refer to?
Data Recovery
Which attack vector makes it possible for a threat actor to compromise a whole platform with just one account?
The Cloud
Which of the following is a computer that uses remote desktop protocol to run resources stored on a central server instead of a localized hard drive and provides minimal operating system services?
Thin Client
In a cloud environment, which of the following would be most detrimental in relation to access management of storage resources?
Any wildcard
Which type of network attack involves asserting the use of an arbitrary hardware address onto a network interface card (NIC)?
MAC Cloning
The ARP cache stores what kind of information about recent connections?
MAC addresses