Certiport Network Security Study Guide - Comprehensive Vocabulary and Definitions

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/195

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

196 Terms

1
New cards

A VPN encapsulates and encrypts data to provide a secure connection.

True

2
New cards

Which controls are looked at as technical Controls

A) IDs

B) Training manual

C) Firewall

D) AUP

IDs & Firewall

2 multiple choice options

3
New cards

Which type of injection attack uses keywords such as select and update to manipulate data through a web form

SQL injection

4
New cards

An end user calls the help desk complaining about a webpage not loading the most current date for the page unless the user refreshes the page. What should the help desk agent have the user do first?

Clear out the cache

5
New cards

When one suspects a device has been affected by malware what is the first step that should be taken to remediate the device?

disconnect the device from the network

6
New cards

A good audit plan may collect both successful and failed events,

True

7
New cards

Audit events take up computer resources and personnel time so you should be selective about the events to audit

True

8
New cards

You should always audit log on successes

False, track failed logon attempts instead

9
New cards

_________________ redirects internet traffic from one website to an identical-looking site to trick the user into entering their username and password into their database

Spoofing

10
New cards

What must take place for someone trying to enter a physical area of a building before access control takes place

Authentication

11
New cards

What is true about networks

1) WPA, and WPA2 can require authentication servers

2) WEP has been cracked and should no longer be in use

3) MAc filtering is best used for small wireless networks as MAC addresses need to be added to a MAC filtering table manually

12
New cards

One of the layers of defence in the anti-phishing and malware protection strategies developed by Microsoft is?

Smartscreen filter

13
New cards

One of the ways you can protect your computer from hackers and malicious software to use _____________?

Windows firewall

14
New cards

What is considered the minimum length of a good password

8 Characters

15
New cards

______________________ allows multiple computers on an internal network to share one public address?

NAT (Network Address translation)

16
New cards

Which type of VPN will often have a user connect through a web browser?

SSL

17
New cards

Which type of VPN connection usually connects two business entities?

site-to-site

18
New cards

What email filtering technique uses a list of verified DNS domains to verify that an email is coming from a trusted IP address?

SPF (Sender policy framework)

19
New cards

Application-level firewalls can provide content filtering and virus protection

True

20
New cards

Application-level firewall support caching

True

21
New cards

Application-level firewalls tend to be less resource-intensive than that of a traditional firewall

False

22
New cards

Application-level firewalls tend to be less resource intensive than that of a traditional firewall when they process application-level queries

True

23
New cards

Which if the following are NTFS permissions

Read,

Write,

Modify,

List folder contents,

Read & execute,

Full control

24
New cards

Which protocols are considered unsecured and should be avoided in a server environment?

1.PAP

2. SSH

3. CHAP

4. telnet

5. SFTP

PAP, telnet

25
New cards

Which type fo DNS record contains an IP address that is then used to lookup an associated host or domain name?

PTR (reverse-lookup pointer)

26
New cards

IPsec encrypts data packets using AH (Authentication header)

False

27
New cards

IPsec is a set of protocols that protects data transmission between hosts by providing authentication and privacy

True

28
New cards

IPsec is used to create a secure tunnel between two computing devices

True

29
New cards

IPsec uses digital signatures to create a chain of authority

False

30
New cards

Which of the following will be considered the strongest password?

A) jOhn$m1T

B) P@ssw0rd

C) Johnny

D) Password

jOhn$m1T

3 multiple choice options

31
New cards

Your IT dept is getting a barrage of calls from users saying that their pop-up blockers are not blocking ads for huge discounts on software. Upon further research, you also determined that your current malware signature files are not sufficient for removing this nuisance from your systems. What type of attack is taking place?

Adware

32
New cards

Your IT dept is getting a barrage of calls from users saying that their pop-up blockers are not blocking ads for huge discounts on software. Upon further research, you also determined that your current malware signature files are not sufficient for removing this nuisance from your systems. Which characteristic of the attack indicated that it's not being eradicated by anti-malware programs?

Zero-day attack

33
New cards

A certificate authority provides keys used in a digital certificate for authentication

True

34
New cards

In a public key infrastructure, the public key encrypts data and corresponding public key decrypt it

False, the public key encrypts data and a corresponding private key decrypts it.

35
New cards

Forging a fake sender address with an email message is an example of _________________ malware

Spoofing

36
New cards

Where do most computers obtain a media access control MAC address?

Network Interface

37
New cards

The tool used to view audit logs is an event viewer

True

38
New cards

You can audit logon failures to warn off hacking attacks

True

39
New cards

You can't limit the size of audit logs

False

40
New cards

CIA: Ensuring the sales dept can access a document

Availiability

41
New cards

CIA: Encrypting a document as it travels across a network

Confidentiality

42
New cards

CIA: Verifying the sender of a document

Integrity

43
New cards

Backs up of all files and resets the archive bit

Full backup

44
New cards

Backs up all change files since the last full or incremental backup

Incremental backup

45
New cards

Backs up all changed files since the last full backup

Differential backup

46
New cards

Which protocol should be allowed only on email servers used to send email and should be blocked on all other servers and client machines?

SMTP (simple mail transfers protocol)

47
New cards

How can a wireless network best be set up to allow only specific devices onto the network?

Mac address filtering

48
New cards

A Network Sniffer can easily obtain ________.

unencrypted passwords

49
New cards

Which Windows app is used to help protect a device against malware?

Windows defender

50
New cards

Which of the following are advanced permissions in NTFS? Choose 2

A) Change permissions

B) Full control

C) Take ownership

D) List folder contents

Change permissions, Take ownership

51
New cards

Bitlocker, when possible, stores the encryption key on a computer's ___________.

TPM (trusted platform module)

52
New cards

________________ is an authentication method that identifies individuals based on physical characteristics such as fingerprints, facial recognition, retina scans or voice patterns

Biometrics

53
New cards

A junior administrator asked what it means to harden a server. Which 2 statements fit the description of hardening a server?

A) Place the server in a secure location

B) minimise crosstalk

C) uninstall and unnecessary features

D) disable unnecessary services

uninstall and unnecessary features, disable unnecessary services

54
New cards

Malware that steals and encrypts data and demands money for the return of data is known as what type of malware?

Ransomware

55
New cards

A worm typically doesn't corrupt or modify files

True

56
New cards

A worm is a self-replicating program that copies itself to other computers without user intervention

True

57
New cards

A worm only passed by email

False

58
New cards

A worm uses system resources like bandwidth memory and processor time which makes the computer run slow

True

59
New cards

A worm is contained in most music and videos

False

60
New cards

Which password policy prohibits reusing the same password

History policy

61
New cards

Which protocols are used to encrypt emails. Choose 2

A) S/MIME

B) SSL

C) PGP

D) TLS

S/MIME & PGP

62
New cards

The process of eliminating risk by choosing not to participate in an action or activity describes which of the following?

A) Risk acceptance

B) Residual risk

C) Risk avoidance

D) Risk mitigates

Risk avoidance

63
New cards

A Junior administrator noticed when looking at the permissions of a folder grey checkboxes in the Allow column for a group's permissions. What do the grey check boxes represent?

Inherited permissions

64
New cards

Where are password policies established for an Active Directory domain?

Group policy

65
New cards

An acceptable use policy (AUP ) is an adminstrative control and so is a disaster recovery plan (DRP)

True

66
New cards

An intrusion prevention system (IPS) is a technical control

True

67
New cards

Which type of backup backs up all changed files since the last full back up?

Differential

68
New cards

In private browsing, history isn't saved

True

69
New cards

In private browsing, the workplace doesn't know which site one visited while private browsing

False

70
New cards

An internet service provider will not know the sites one visited while private browsing

False

71
New cards

Securtity compliance manager is an example of a __________________

Tool for desktop data center and cloud configurations

72
New cards

Which windows registry hive stores file extensions for applications?

HKEY_CLASSES_ROOT

73
New cards

Which windows registry hive stores current settings on the current user?

HKEY_CURRENT_USER

74
New cards

Which windows registry hive stores current settings on the computer?

HKEY_LOCAL_MACHINE

75
New cards

Which windows registry hive stores runtime information?

HKEY_CURRENT_CONFIGURATION

76
New cards

A __________________ is a computer used to trap hackers and distract them from real targets when the hackers are trying to attack network

honey pot

77
New cards

Bitlocker will use software based encryption _____________________________ a TPM on a device

in absense of

78
New cards

You're an intern for a small company. Recently you started receiving complaints that employees are having difficulty connecting to one of the servers and the server is responding slowly or not at all. When you monitor the packet traffic you notice a very high volume of packets being sent from 3 computers in the HR dept. What kind of attack is demonstated?

Denial of service

79
New cards

Which type of malware gains administrator-level access of system and targets items such as the BIOS, hypervisor, and kernel?

Rootkit

80
New cards

Asymmetric encryption uses a single key to perform encryption and decryption

False

81
New cards

DES is an aysmmetric encryption algorithm

False

82
New cards

RSA is an aysmmetric encryption algorithm

True

83
New cards

__________________ monitors packet traffic on a network and report the sender destination and type of packet

Network Sniffer

84
New cards

DNSSEC helps prevent pharming and MITM attacks

True

85
New cards

DNSSEC is proprietary to microsoft domain name servers

False

86
New cards

DNSSEC uses digital signature to create a chain of authority

True

87
New cards

Which internet technology poses the greatest risk to a user?

ActiveX Controls

88
New cards

Which 3 of the following are group scopes defined by Active directory

A) Domain security

B) Universal

C) Global

D) Local user

E) Domain local

Universal, Global, Domain local

89
New cards

The router can divide physical network into segments called _______

Subnets

90
New cards

An attack on your company server is being mase using the following:

Cookie

Cookie1982

Cookie293

Ccookie75

cookies

cooler

coolcool.

What kind of attack is this?

Dictionary Attack

91
New cards

An attack on your company server is being mase using the following:

Cookie

Cookie1982

Cookie293

Ccookie75

cookies

cooler

coolcool.

How do you prevent the attack?

you should enable the policy to audit failed logon events and account lockout after a reasonable number of attempts

92
New cards

An administrator configures a software restriction policy using the local security policy editor. How can the administrator make this policy apply to the entire Active Directory domain?

Export the policy and then import it into the group policy

93
New cards

You recently purchased a new home router and a new laptop computer. You want to connect to your personal home router using the strongest security available. On your computer, you open the wireless window to manually configure a profile. What security and encryption type should you choose?

WPA2 (Security), AES (encryption)

94
New cards

In which locations can system audit policies be set? Choose 2

A) Local security policy

B) Syslog

C) Event viewer

D) Group policy

Local security policy & group policy

95
New cards

What should be done to mobile devices used for business purposes if it's lost/stolen?

Remote wipe

96
New cards

Which is the most common format used for digital certificates?

x.509

97
New cards

This feature in Windows informs the users when the program makes a change that requires administrator-level permission. This feature is called ___________

User account control (UAC)

98
New cards

What does the minimum password age policy do?

Forces users to wait a certain amount of time before changing their password.

99
New cards

In which ways can security templates be deployed? Choose 2

A) GPO's

B) Security configuration and analysis snap in

C) Security compliance manager

D) Microsoft security baseline analyzer

GPOs (group polocy objects) and Secuirty configuratiosn & anaylsis snap in

100
New cards

Which type of list can be used as part of an anti-spam solution? Choose 2

A) DNSBLs

B) DNSWLs

C) RWLs

D) RBLs

DNSBLs & RBLs