Wiley P3 Flashcards

1
Q

What is Operational investigations?

A

Operational investigations are performed by internal teams to troubleshoot performance or other technical issues. They are not intended to produce evidence for use in court and, therefore, do not have the rigid collection standards of criminal, civil, or regulatory investigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the difference between NDA and noncompete?

A

NDA means to protect the confidentiality of an organisation’s data. Noncompete would prevent someone to be in competition with the organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is port 515?

A

LPD Print Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is port 445?

A

File sharing, Windows SMB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port does syslog use?

A

UDP 514 or TCP 6514

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is DevOps an SDLC model?

A

No, DevOps is an approach to integrating development and operation activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the PSH flag do?

A

This is a TCP flag that clears the buffer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is another name for primary key when it comes to databases?

A

Candidate Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the data controller responsible for?

A

They bear responsibility for the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the responsibility of data owners when it comes to data?

A

Data owners are tasked with making decisions about data such as who receives access to it and how it is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is remote attestation?

A

The TPM feature remote attestation creates a hash value from the system configuration to confirm the integrity of the configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is binding and sealing?

A

These are TPM techniques used to encrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the function of RNG in TPM?

A

The RNG function of the TPM is used to support cryptographic operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the responsibility of system owners according to the NIST SP 800-18?

A

System Owner responsibilities include helping to develop system security plans, maintaining the plan, ensuring training, and identifying, implementing, and assessing security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a fraggle attack?

A

Fraggle is a network-based denial-of-service attack using UDP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is wardriving?

A

Wardriving is a reconnaissance technique for discovering open or weakly secured wireless networks.

17
Q
A