Chapter One

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which is an IPsec protocol that authenticates that packets received were sent from the source?

AH

In which of the following configurations are all the load balancers always active?

Active-active

Which type of monitoring methodology looks for statistical deviations from a baseline?

Anomaly monitoring

Which of the following is NOT a means by which a newly approved root digital certificate is distributed?

Application updates

What is the name of the device protected by a digital certificate?

CN

What is the name of the fields in an X.509 digital certificate that are used when the parties negotiate a secure connection?

Certificate attributes

A centralized directory of digital certificates is called a(n) _____.

Certificate repository (CR)

What entity calls in crypto modules to perform cryptographic tasks?

Crypto service provider

Tomaso is explaining to a colleague the different types DNS attacks. Which DNS attack would only impact a single user?

DNS poisoning attack

Maja has been asked to investigate DDoS mitigations. Which of the following should Maja consider?

DNS sinkhole

What is the strongest technology that would assure Alice that Bob is the sender of a message?

Digital certificate

What is the difference between a DoS and a DDoS attack?

DoS attacks use fewer computers than DDoS attacks.

How is confidentiality achieved through IPsec?

ESP

Which of the following contains honeyfiles and fake telemetry?

High-interaction honeypot

Calix was asked to protect a system from a potential attack on DNS. What are the locations he would need to protect?

Host table and external DNS server

Which statement regarding a demilitarized zone (DMZ) is NOT true?

It contains servers that are used only by internal network users.

How does BPDU guard provide protection?

It detects when a BPDU is received from an endpoint.

Which refers to a situation in which keys are managed by a third party, such as a trusted CA?

Key escrow

Elton needs his application to perform a real-time lookup of a digital certificate's status. Which technology would he use?

Online Certificate Status Protocol (OCSP)

What is the file extension for a Cryptographic Message Syntax Standard based on PKCS#7 that defines a generic syntax for defining digital signature and encryption?

P7B

Leah is researching information on firewalls. She needs a firewall that allows for more generic statements instead of creating specific rules. What type of firewall should Leah consider purchasing that supports her need?

Policy-based firewall

Which is a protocol for securely accessing a remote computer in order to issue a command?

Secure Shell (SSH)

_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.

Session keys

What is Bash?

The command-language interpreter for Linux/UNIX Oss

Olivia is explaining to a friend about digital certificates. Her friend asks what two entities a digital certificate associates or binds together. What would Olivia say?

The user's identity with their public key

Which is the first step in a key exchange?

The web browser sends a message ("ClientHello") to the server.

What is the purpose of certificate chaining?

To group and verify digital certificates

Gregory wants to look at the details about the patch a packet takes from his Linux computer to another device. Which Linux command-line utility will he use?

Traceroute

Which of the following is NOT a Microsoft defense against macros?

Trusted domain

Estevan has recommended that the organization hire and deploy two security guards in the control room to limit the effect if one of the guards has been compromised. What is Estevan proposing?

Two-person integrity/control

Which of these appliances provides the broadest protection by combining several security functions?

UTM

Which of the following is NOT a firewall rule parameter?

Visibility

Eros wants to change a configuration file on his Linux computer. He first wants to display the entire file contents. Which tool would he use?

cat

Which utility sends custom TCP/IP packets?

hping

Which block cipher mode of operating requires that both the message sender and receiver access a counter that computes a new value whenever a ciphertext block is exchanged?

CTR

Which device intercepts internal user requests and then processes those requests on behalf of the users?

Forward proxy server

Which of the following sensors can detect an object that enters the sensor's field?

Proximity


Conjuntos de estudio relacionados

Psychology 1: Founding Fathers and 6 Approaches

View Set

Chapter 14: Sales and Lease Contracts

View Set

Ms. Stackpole Personal Finance Midterm 2017 Quizzes + Tests

View Set

Google Ads Display Certification

View Set

B mod 1/2 single area OSPFv2 concepts/configuration

View Set

Final Exam Study Guide: Match each definition with the correct term

View Set