Thor Easy 1 Flashcards

(13 cards)

1
Q

62 What is DNP3 protocol?

A

used tcp port 20000. used for scada systems.particularly within the electrical and water utility industries. access control is very important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

68 What is MITRE attack?

A

globally-recognized knowledge base of adversary tactics and techniques used in cyberattacks, based on real-world observations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

69 In prevention questions, which is most important? 2fa or software update

A

2fa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

70 What is a reciprocal site?

A

Reciprocal refers to an agreement between two organizations to host each other’s backup hardware and data in the event of a disaster. They are exact copies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

72 In Kerberos, what is KDC?

A

a central server that acts as a trusted third party for authenticating principals (users and services) and issuing Kerberos tickets. It is the heart of the Kerberos authentication protocol and consists of two main components: the Authentication Server (AS) and the Ticket Granting Server (TGS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you measure qualitative vs quantitative risk?

A

quantitiative risk is a number. qualitative risk is a wording (subjective)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

102 What is the best answer for security awareness?

A

security posture, not compliance because not all security awareness is related to compliance and regualtion. You can do awareness for productivity, not regulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

105 What is covert timing channel? And how to prevent?

A

It has to do with sending data in a busy time so that it won’t go noticed. The solution to prevent this is to analyze without regard to timing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

107 What is a spectre attack? How to prevent it?

A

It exploits cpu vulnerability and leaks info. You update the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

113 If question is asking highest security controls, what is the answer?

A

secuirty accessment and audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

115 When looking at log files, what is most important? What is not as important?

A

The source. Not the time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

119 In securing a network, what is most important? What is not as important?

A

access control is most. security assessment or audit is not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

122 What is broadcast domain? What is something you get wrong?

A

it sends to all devices in network. All. Something you get wrong is it send to all device but doesn’t send to some devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly