Types of malware delivery, usually through a Trojan, includes demands for payment
Ransomeware
A tool scans for known security threats on groups of computers
Vulnerability scanner
You have a multilayer switch. Which layers does it operate at
2 & 3
The AAA model refers to Authorization, Accounting, and what?
Authentication
Refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates
PKI
act of pretending to be the proper owner of an address or the provider of a service, when another system is actually the true provider, is referred to as ___________.
Spoofing
Describes the deployment of a network device in order to conduct academic research or detect attackers inside the organization's network perimeter
Honeypot
A service on a local server cannot communicate with its database server running on another machine. The database server is functioning correctly and all network connections are working properly. What is most likely causing this issue?
Firewall
What term describes the automatic creation of a two-way relationship between child and parent domains in a Microsoft AD forest?
Transitive Trust
the number of _____ in a key used by a cryptographic algorithm is referred to as a key size or key length.
bits
Type of network penetration attack model requires an attacker to have the highest skill level
Black Box
UEFI is a new technology that is starting to replace the system BIOS and has several additional features. Which of these best identifies the security standard used along with UEFI to confirm that only trusted software and firmware is used to access a trusted operating system?
Secure boot
A simple way to keep virus, spyware and other malware from attacking your network while allowing BYOD is
Guest Network
What biometric authentication method that uses nodal points to identify the user.
Facial Recognition
A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as
CA
What method would generally speaking be the most basic method to mitigate security risks on a network?
Network Segmentation and security layers
(Defense in Depth)
Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses?
arp -a
BYOD security measures would allow separation between work and personal data?
Storage Segmentation (container)
The ability to verify that the sender of a message actually did send the message, and that it was not tampered with in transit, is a benefit of cryptography known as ____________.
Nonrepudiation
_____ divide data into separate fragments and encrypt each fragment separately.
Block Ciphers
Which term describes multiple inputs resulting in the same hash value?
Collison
Is a suite of Internet Engineering Task Force (IETF) specifications for securing certain kinds of information provided by the Domain Name System (DNS) as used on Internet Protocol (IP) networks.
DNSSEC
Deploying least functionality along with disabling unnecessary ports and services are two methods of ________________.
Secure System Design (hardening)
Which protocol enabled connection allows authentication to the Microsoft DC and provides additional services?
LDAP or LDAPS
Copies of lost private encryption keys can be retrieved from where?
Key escrow