Threat, Attacks, and Vulnerabilities
Technologies and Tools
Architecture and Design
Identity and Access Management
Cryptography and PKI
100

Types of malware delivery, usually through a Trojan, includes demands for payment

Ransomeware

100

A tool scans for known security threats on groups of computers

Vulnerability scanner

100

You have a multilayer switch. Which layers does it operate at

2 & 3

100

The AAA model refers to Authorization, Accounting, and what?

Authentication

100

Refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates

PKI

200

act of pretending to be the proper owner of an address or the provider of a service, when another system is actually the true provider, is referred to as ___________.

Spoofing

200

Describes the deployment of a network device in order to conduct academic research or detect attackers inside the organization's network perimeter

Honeypot

200

A service on a local server cannot communicate with its database server running on another machine. The database server is functioning correctly and all network connections are working properly. What is most likely causing this issue?

Firewall

200

What term describes the automatic creation of a two-way relationship between child and parent domains in a Microsoft AD forest?

Transitive Trust

200

the number of _____ in a key used by a cryptographic algorithm is referred to as a key size or key length.

bits

300

Type of network penetration attack model requires an attacker to have the highest skill level

Black Box

300

UEFI is a new technology that is starting to replace the system BIOS and has several additional features. Which of these best identifies the security standard used along with UEFI to confirm that only trusted software and firmware is used to access a trusted operating system?

Secure boot

300

A simple way to keep virus, spyware and other malware from attacking your network while allowing BYOD is

Guest Network

300

What biometric authentication method that uses nodal points to identify the user.

Facial Recognition

300

A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as

CA

400

What method would generally speaking be the most basic method to mitigate security risks on a network?

Network Segmentation and security layers
(Defense in Depth)

400

Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses?

arp -a

400

BYOD security measures would allow separation between work and personal data?

Storage Segmentation (container)

400

The ability to verify that the sender of a message actually did send the message, and that it was not tampered with in transit, is a benefit of cryptography known as ____________.

Nonrepudiation

400

_____ divide data into separate fragments and encrypt each fragment separately.

Block Ciphers

500

Which term describes multiple inputs resulting in the same hash value?

Collison

500

Is a suite of Internet Engineering Task Force (IETF) specifications for securing certain kinds of information provided by the Domain Name System (DNS) as used on Internet Protocol (IP) networks.

DNSSEC

500

Deploying least functionality along with disabling unnecessary ports and services are two methods of ________________.

Secure System Design (hardening)

500

Which protocol enabled connection allows authentication to the Microsoft DC and provides additional services?

LDAP or LDAPS

500

Copies of lost private encryption keys can be retrieved from where?

Key escrow