Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Know these terms and who they are used:
- HSM
- WAF
- HIDS
- MTTR
- MTTF
- HOTP
- TOTP
- IV
- Know when the types and to use the specific hashing or encryption algorithm
- Review all of the port numbers.
- Understand the Controls concepts of : Operation, Technical, Management - the sim I got was to match these to a specific scenario - Sim 2
- 1. Linux command to list the items inside of a folder
- Xxxxx do not remember the option
- Xxxxxx
- ls -lz path/path - I choose this, but i am not sure
- 2. Which uses the Port number of 389?
- RADIUS
- TACACS+
- Xxxx
- LDAP -
- 3. Volatility order. (know the order) most volatile to least
- CPU cache, RAM, Swap file, hard disk
- 4. Which attack gives you these flags, URG, PUSH, FIN ?
- Xmas attack
- 5. What is not detected by a scanner or something else (do not remember what was the other thing?
- Rogue access point
- Evil twin
- Xxxx
- Xxxx
- 6. You have two servers, one was updated and the other did not get the update.
- Where not on the switch. ---- i don't remember this
- 7. Server is on the external network and customers need to access it by SSH.
- Know when to use VLAN , network hardening, network segmentation. One question had all of these for options.
- 8. People are looking into the building, (like peeping toms) , what id a detective method?
- CCVT
- Lightning
- Barricades
- Xxx
- 9. What is used for zone transfers ?
- DNS TCP/53
- Xxx
- Xxx
- 10. You are a security tech and a vendor just sent you the SLA. To understand if the vendor fully follows his policies , what should you request?
- Xxx logs
- Xxx logs
- Audit data control
- Security logs
- 11. Post-incident , to evaluate the incident, what is this process?
- Lesson learned
- Preparation
- Xxx
- Xx
- 12. Traffic is going out to a bank and a antivirus company. What is the attack or malware, not sure of the wording?
- Spyware
- Ransomware
- Botnet
- Xxx
- 13. Users are logging in with Aly user account, because it has privileges, What should . the IT tech do. You should also not disrupt Alyβs services?
- Account lockout
- Authorize workstations
- Xxxx
- Xxx
- 14. Know when these take place
- Code review
- Design review
- Architecture review
- 15. Know different ways of securing mobile devices
- 16. Know how public and private keys are used in an email, digital signature, etc
- 17. Understand the process of setting up a CA on a server
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement