Test ?'s 2 Flashcards

1
Q

Which type of data has high trade values in black markets, is often anonymized or deidentified for use in scientific research, and when compromised, can lead to its use in blackmail or insurance fraud?

A

Personal Health Information (PHI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main difference between a disk image and a snapshot?

A

Disk images include bootloader and OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Inline Appliance?

A

Intrusion prevention system (IPS) appliances that must have all traffic pass through them are “inline” with the network. This also makes them a single point of failure if there is a no fault tolerance mechanism in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Differential, full, and incremental refer to which of the following when discussing backup types that will not collect open files?

A

A copy-based backup is a replica of an internet technology (IT) system. A copy of a system can be performed at any time to provide a system a means of backup. Copy-based backups will not copy open files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Devices deployed in a network and that send data to the local area network (LAN) level and process it with an Internet of things (IoT) sensor are which of the following?

A

Fog Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why can’t an Extended Validation certificate not be issued for a website domain?

A

The domain uses a wildcard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a full chain of trust, which entity would be able to handle processing certificate requests and verifying requester identity?

A

A Registration Authority (RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is TRUE about a certificate authority (CA) in a hierarchical model?

A

Offline CA is a best practice and Intermediate CA issue certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What option has the best ability to hide the identity of the certificate requestor?

A

OCSP Stapling (Online Status Certificate Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the process of carving refer to?

A

Data Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which attack vector makes it possible for a threat actor to compromise a whole platform with just one account?

A

The Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a computer that uses remote desktop protocol to run resources stored on a central server instead of a localized hard drive and provides minimal operating system services?

A

Thin Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In a cloud environment, which of the following would be most detrimental in relation to access management of storage resources?

A

Any wildcard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of network attack involves asserting the use of an arbitrary hardware address onto a network interface card (NIC)?

A

MAC Cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ARP cache stores what kind of information about recent connections?

A

MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which attack vector would an insider threat use to effectively install malicious tools on specific sets of servers for backdoor access?

A

Direct Access and Removable Media

17
Q

Which penetration technique allows a tester to bypass a network boundary and compromise servers on an internal network?

A

Pivot

18
Q

Failed logins or instances of denial of access to restricted files may be indicators of compromise. Suggest where records of such incidents might be found.

A

Authentication logs and Security logs

19
Q

A Cloud Service Provider (CSP) outsources the entire cyber security elements to a third party for the infrastructure in which an application resides due to lack of resources. The CSP maintains responsibility of the environment and attributes. What is this an example of?

A

Managed security service provider (MSSP) offers fully outsourced responsibility for information assurance to a third party.

20
Q

A security expert uses a technical approach to configure a detective control to monitor a server. Review the descriptions and determine which controls the expert implements.

A

The control is implemented as a system and Records attempts at intrusion

21
Q

A consumer uses a Samsung SmartThings coordinator to turn on lights in the home and start the dishwasher. Which communications protocol is the hub using?

A

Zigbee - a two-way wireless radio frequency communication between a sensor and a control system

22
Q

An attacker exploited a vulnerability on a website frequently visited by a group of bank employees. Once the employees visit the site, the attacker’s malware infects their computers. What type of attack did the employees fall for?

A

A watering hole attack

23
Q

After reading an article online, a business stakeholder is concerned about a risk associated with Denial of Service (DoS) attacks. The stakeholder requests information about what countermeasures would be taken during an attack. Where would the security analyst look to find this information?

A

The risk register shows the results of risk assessments in a comprehensible document format.

24
Q

What does a Lightweight Directory Access Protocol (LDAP) attack typically exploit?

A

Unauthorized access or vulnerabilities in a client app to submit arbitrary LDAP queries.

25
Q

Which of the following security mechanisms provides protection against Secure Socket Layer (SSL) stripping attacks?

A

HTTP Strict Transport Security (HSTS) forces browsers to connect using HTTPS only, mitigating downgrade attacks, such as Secure Socket Layer (SSL) stripping.

26
Q

During a risk assessment, a company indicates the value of employee used laptops to be $1,500.00 a piece. What should the company define to come up with the annual loss expectancy in a quantitative risk assessment

A

The annual rate of occurrence (ARO) indicates how many times a loss will occur within a year. An ARO is used in conjunction with the single loss expectancy (SLE) to figure the annual loss expectancy (ALE).

27
Q

Security content automation protocol (SCAP) allows compatible scanners to compare computers with which of the following?

A

Configuration baseline