Mid 1-2-3-4 (Quiz-Review)
Mid 1-2-3-4 (Quiz-Review)
a. MITRE
d. CERT/cc
a. Vulnerability
b. Threat
c. Exploit
lack of a mechanism.
a. vulnerability
b. threat
c. exploit
computer system?
a. Exploit
b. Reverse shell
c. Searchsploit
a. Exploits
b. Vulnerabilities
c. Threat assessment
d. Threat intelligence
b. File infector
c. Macro infector.
___________.?
a. CVE
b. CVSS
c. PSIRT
a. XXE
b. HTML injection
c. SQL injection
d. XSS
b. Session sniffing
c. Man-in-the-middle attack
d. Man-in-the-browser attack
following?
a. Integrity
b. Availability
c. Confidentiality
b. Encryption
a. Integrity
b. Session keys
c. Encryption
model?
a. Public cloud
b. Community cloud
c. Private cloud
a. SaaS
b. PaaS
c. SDLC containers
a. Zigbee
b. INSTEON
c. LoRaWAN
d. 802.1x
b. JTAG analyzers
c. IDA
d. Ghidra
service?
a. An incident
b. An IPS alert
c. A DLP alert
d. A SIEM alert
information?
a. STIX
b. TAXII
c. CybOX
a. White hat
b. Black hat
c. Gray hat
ransomware?
a. WannaCry
b. Pyeta
c. Nyeta
d. Bad Rabbit
e. Ret2Libc
a. Chain of custody
b. Best evidence
c. Faraday
called ________.
a. CSIRT
b. Coordination Center
c. PSIRT
d. MSSP
CVSS?
b. INSTEON
c. LoRaWAN
d. A and B
e. A, B, and C
a. Community cloud
b. IaaS
c. PaaS
victim.
a. Reflected DDoS
b. Direct DoS
c. Backtrack DoS
d. SYN flood
a. CERT/cc
b. OWASP
c. AppSec
d. FIRST
d. IKE
a. Transposition
b. Substitution
c. Polyalphabetic
d. Polynomial
c. DSA
d. Blowfish
e. ElGamal
a. ASH-160
b. SHA-1
c. SHA-2
d. MD5
a. Authentication
b. Nonrepudiation
c. Encryption
d. Hashing
isolation.
data.
of a digital certificate?
a. FQDN
c. Default gateway
d. Public key
certificates?
the user.
CA.
a. IPsec
b. PKCS #10
c. PKCS #12
d. ISO33012
e. AES
following information?
a. Serial number
b. Signature
c. Thumbprint (fingerprint)
a. PKCS #12
b. PKCS #10
c. PKCS #7
of duties
d. Policy-based segmentation
a. Authentication by password
b. Authentication by knowledge
d. Authentication by characteristics
b. Out-of-band (OOB)
c. Biometrics
a. SAML
b. OAuth 2.0
c. OpenConnectID
d. DUO Security
ACLs?
b. An authorization model
c. An authentication model
d. An accounting model
apply.)
a. Implicit deny
b. Need to know
resource is accessed?
a. CoA
b. Authorization
c. Accounting
d. TACACS+ auditing
EtherTypes
destination IP addresses
exchanges.
command authorization.
access control?
a. 802.11ac
b. 802.1Q
c. 802.1X
d. pxGrid
b. 802.1X
c. TrustSec
d. SGTs
Cisco ISE?
and so on)
a. aaa new-model
an 802.1X-enabled port?
registered to ISE
identity certificate
15. Which of the following are Cisco ISE distributed
node types?
a. BeyondCorp
b. TrustSec
c. pxGrid
d. Duo
SSO implementations?
a. SAML
b. OpenID Connect
c. Microsoft Account
users.
systems.
unique identity.
port?
c. UDP 1645
databases.
messages mean?
message.
a. START
b. REPLY
c. CONTINUE
Mobility Client.
a. PAN
b. PSN
c. Supplicant
a. EAPoL
b. EAP
c. RADIUS
CoA?
network.
assessment simultaneously.
actions.
(C3PL)
c. Cisco TrustSec
a. GET
b. PUT
c. PATCH
standard.
a. JSON
b. XML
c. OWASP
d. RESTCONF
a. APIC
b. ACI
c. DevNet
d. NETCONF
_________.
a. YANG model
b. NETCONF model
c. RESTCONF model
d. gRPC model
API requests?
a. POST
b. GET
c. TRACE
d. PUT
a. ETA
b. ESA
c. WSA
a. OVS
b. Contiv
c. ODL
d. All of the above
underlying infrastructure?
a. A hypervisor
instances
c. A network controller
mechanisms?
a. VXLAN
b. SST
c. NVGRE
accountability planes
function.
overlays?
a. SDN-Lane
b. VXLAN
c. VXWAN
(APIC)
a. East-west traffic
b. North-south traffic
c. Micro-segmentation
d. Network overlays
transactions?
a. argparse
b. requests
c. rest_api_pkg
a. APIC
b. REST
c. SOAP
d. GraphQL
a. SOAP
b. REST
c. Swagger
d. WSDL
a. RESTCONF
b. NETCONF
c. SNMP
https://quizlet.com/540432880/sec-150-midterm-flash-cards/