An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured that can help to evenly distribute work across the network, and make use of both servers in a manner that is transparent to the end users?
A - Load balancing
See Ch. 6: Network Security Devices, Design, and Technology, Section - Standard Network Devices
What type of attack is being performed when multiple computers overwhelm a system with fake requests?
A - DDoS
See Ch. 5: Networking and Server Attacks, Section - Server Attacks
What term is used to describe a group that is strongly motivated by ideology, but is usually not considered to be well-defined and well-organized?
A - Hactivists
See Ch. 1: Introduction to Security, Section - Hactivists
What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?
A - Extranet
See Ch. 6: Network Security Devices, Design, and Technology, Section - Security Zones
What specific type of phishing attack uses the telephone to target a victim?
A - Vishing
See Ch. 2: Malware and Social Engineering Attacks, Section - Psychological Approaches
What is the most commonly used asymmetric cryptography algorithm?
A - RSA
See Ch. 3: Basic Cryptography, Section - Asymmetric Cryptographic Algorithms
What is the secure alternative to the telnet protocol?
A - SSH
See Ch. 4: Advanced Cryptography and PKI, Section - Secure Shell (SSH)
If Bob receives an encrypted reply message from Alice, whose private key is used to decrypt the received message?
A - Bob's private key
See Ch. 3: Basic Cryptography, Section - Asymmetric Cryptographic Algorithms
Of the 3 states of data, what term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer?
A - Data-in-use
See Ch. 3: Basic Cryptography, Section - Cryptography and Security
Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?
A - Gramm-Leach-Bliley
See Ch. 1: Introduction to Security, Section - Understanding the Importance of Information Security
In the process of a clients web browser initiating a session with a web server, what is used to create session keys?
A - Master secret
See Ch. 4: Advanced Cryptography and PKI, Section - Types of Digital Certificates
What length SSL and TLS keys are generally considered to be strong?
A - 4096
See Ch. 4: Advanced Cryptography and PKI, Section - Transport Layer Security (TLS)
Brokers and competitors could be considered among the many different types of what?
A - Threat actors
See Ch. 1: Introduction to Security, Section - Other Threat Actors
What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?
A - Intranet
See Ch. 6: Network Security Devices, Design, and Technology, Section - Security Zones
The name of the scrambled and unreadable output of encryption is:
A - Ciphertext (sometimes called Digest)
See Ch. 3: Basic Cryptography, Section - What Is Cryptography?