Advertisement
Guest User

notes

a guest
Jun 21st, 2018
153
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.32 KB | None | 0 0
  1. Know these terms and who they are used:
  2.  
  3. HSM
  4. WAF
  5. HIDS
  6. MTTR
  7. MTTF
  8. HOTP
  9. TOTP
  10. IV
  11.  
  12. Know when the types and to use the specific hashing or encryption algorithm
  13.  
  14. Review all of the port numbers.
  15.  
  16. Understand the Controls concepts of : Operation, Technical, Management - the sim I got was to match these to a specific scenario - Sim 2
  17.  
  18.  
  19. 1. Linux command to list the items inside of a folder
  20. Xxxxx do not remember the option
  21. Xxxxxx
  22. ls -lz path/path - I choose this, but i am not sure
  23.  
  24. 2. Which uses the Port number of 389?
  25. RADIUS
  26. TACACS+
  27. Xxxx
  28. LDAP -
  29.  
  30. 3. Volatility order. (know the order) most volatile to least
  31. CPU cache, RAM, Swap file, hard disk
  32.  
  33. 4. Which attack gives you these flags, URG, PUSH, FIN ?
  34. Xmas attack
  35.  
  36. 5. What is not detected by a scanner or something else (do not remember what was the other thing?
  37. Rogue access point
  38. Evil twin
  39. Xxxx
  40. Xxxx
  41.  
  42. 6. You have two servers, one was updated and the other did not get the update.
  43. Where not on the switch. ---- i don't remember this
  44.  
  45. 7. Server is on the external network and customers need to access it by SSH.
  46. Know when to use VLAN , network hardening, network segmentation. One question had all of these for options.
  47.  
  48. 8. People are looking into the building, (like peeping toms) , what id a detective method?
  49. CCVT
  50. Lightning
  51. Barricades
  52. Xxx
  53.  
  54. 9. What is used for zone transfers ?
  55. DNS TCP/53
  56. Xxx
  57. Xxx
  58.  
  59. 10. You are a security tech and a vendor just sent you the SLA. To understand if the vendor fully follows his policies , what should you request?
  60. Xxx logs
  61. Xxx logs
  62. Audit data control
  63. Security logs
  64.  
  65. 11. Post-incident , to evaluate the incident, what is this process?
  66. Lesson learned
  67. Preparation
  68. Xxx
  69. Xx
  70.  
  71. 12. Traffic is going out to a bank and a antivirus company. What is the attack or malware, not sure of the wording?
  72. Spyware
  73. Ransomware
  74. Botnet
  75. Xxx
  76.  
  77. 13. Users are logging in with Aly user account, because it has privileges, What should . the IT tech do. You should also not disrupt Aly’s services?
  78. Account lockout
  79. Authorize workstations
  80. Xxxx
  81. Xxx
  82.  
  83. 14. Know when these take place
  84. Code review
  85. Design review
  86. Architecture review
  87.  
  88. 15. Know different ways of securing mobile devices
  89.  
  90. 16. Know how public and private keys are used in an email, digital signature, etc
  91.  
  92. 17. Understand the process of setting up a CA on a server
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement