100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
SBOLC SEC+ final exam V1-Answered $10.99   Add to cart

Exam (elaborations)

SBOLC SEC+ final exam V1-Answered

 4 views  0 purchase
  • Course
  • SBOLC
  • Institution
  • SBOLC

SBOLC SEC+ final exam V1-Answered

Preview 2 out of 6  pages

  • August 24, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • SBOLC
  • SBOLC
avatar-seller
CLOUND
SBOLC SEC+ final exam V1-Answered
An attacker makes processes execute out of sequence to control the result in a way that
accomplishes the attackers goals. *
A. Pre-emptive attack
B. Logic Bomb
C. Race Condition
D. SaaS - ANSWER-Race Condition

Another name for hashing is? *
3 points
A. Authentication
B. Authority
C. Integrity
D. Public Key Cryptography - ANSWER-Integrity

Average time it would take to repair a component *
3 points
A. MTTR
B. MTTB
C. MTTF
D. MTBF - ANSWER-MTTR

DNS Port - ANSWER-53

FTP Port numbers - ANSWER-20, 21

HTTP - ANSWER-80

Keyword for SIEM - ANSWER-Aggregate

Port Number DHCP - ANSWER-67

Port Number HTTPS - ANSWER-443

Port Number IMAP - ANSWER-143

Port Number SMTP - ANSWER-25

Port Number SNMP - ANSWER-161

Port Number TACAS - ANSWER-49

Port Number Telnet - ANSWER-23

, Port RDP - ANSWER-3389

SFTP Port number - ANSWER-22

SSH Port number - ANSWER-22

The chance of harm coming to an asset *
3 points
A. Vulnerability
B. Threat
C. Risk
D. Mitigation - ANSWER-Risk

TLS/SSL Port - ANSWER-443

True or False. Banner grabbing is a technique used to gain information about a
computer system on a network and the services running on its open ports - ANSWER-
True

True or False. Cross-site scripting is a type of computer security vulnerability typically
found in web applications. - ANSWER-True

True or False. SMIME encrypts email in the DoD - ANSWER-True

True or False. When using WEP you use RC4 - ANSWER-True

Used to find collisions in a cryptographic Environment *
3 points
A. Rainbow Attack
B. Birthday Attack
C. Xmas Attack
D. XXS - ANSWER-Birthday Attack

What are some asymmetric key algorithms? - ANSWER-DH, RSA

What are symmetric encryption algorithms?
A. AES
B. Twofish
C. Blowfish
D. RSA
E. DH - ANSWER-AES
Twofish
Blowfish

What are the 3 things associated with a digital signature? *
3 points

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller CLOUND. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart