11 Flashcards

1
Q

Private Branch Exchange (PBX) is an internal telephone exchange or switching system implemented in a business or office. PBX allows for handling of internal communications without the use of paid Public Switched Telephone Network (PSTN) service, also known as Plain Old Telephone Service (POTS). A Voice over Internet Protocol (VoIP) PBX, which takes advantage of existing LAN cables, can further reduce costs by removing the need for separate telephone cabling infrastructure in a building or office. VoIP endpoints are specialized hardware devices or application programs that enable VoIP calls from computing devices. VoIP gateways are network devices that convert voice and fax calls, in real time, between an IP network and PSTN/POTS.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following terms refers to an environmental control system?

A

** hvac **

HVAC stands for Heating, Ventilation, and Air Conditioning. HVAC refers to the different systems used for moving air between indoor and outdoor areas, along with heating and cooling both residential and commercial buildings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers refer to an office equipment that combines the functionality of multiple devices? (Select 2 answers)

A
  • MFD
    Multifunction device, an office all-in-one device (copier, printer, scanner)
  • MFP
    MFP is the acronym for a multifunction printer; it’s an all-in-one device with multiple uses: printing, copying, scanning, and faxing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of OS characterized by low delay between the execution of tasks required in specific applications, such as in military missile guidance systems or in automotive braking systems, is known as:

A

** RTOS **
A Real Time Operating System, commonly known as an RTOS, is a software component that rapidly switches between tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An integrated circuit combining components normally found in a standard computer system is referred to as:

A

SoC

SoC (System on a Chip). SoC integrates various components typically found in a standard computer system, such as processors, memory, input/output interfaces, and more, into a single integrated circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the answers listed below refers to an IoT technology designed to provide communication between appliances in a home automation network?

A

** Zigbee **
Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks. Zigbee is for low-data rate, low-power applications and is an open standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The term “Mantrap” (a.k.a. access control vestibule) refers to a physical security access control system used to prevent unauthorized users from gaining access to restricted areas by following another person. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protection provided by security personnel is an example of:

A

Physical security controL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following provides physical security measure against laptop theft?

A

Cable lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following physical security controls can be implemented as DLP solution?

A

USB data blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:

A

Proximity card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of preventive physical access controls would provide a basic means for securing a door access? (Select 2 answers)

A
  • Proximity card reader
  • Smart card reader
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following answers refer(s) to the characteristic feature(s) of Faraday cage? (Select all that apply)

A
  • Physical security control type
  • Provides protection against RFI
  • Provides protection against EMI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the physical security control types listed below provides isolation from external computer networks?

A

Air gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A lightly protected subnet (previously known as a DMZ) consisting of publicly available servers placed on the outside of the company’s firewall is called:

A

Screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Setting up hot and cold aisles in a server room allows for more efficient management of air flow.

A

True

17
Q

Which of the following destruction tools/methods allow(s) for secure disposal of physical documents? (Select all that apply)

A
  • Shredding
  • Burning
18
Q

Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?

A

** Degaussing **

( the destruction of the data on a data storage device by removing its magnetism)

19
Q

One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code has not been tampered with since it was signed. The authenticity and integrity of the application’s code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).

A

True

20
Q

One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code has not been tampered with since it was signed. The authenticity and integrity of the application’s code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).

A
  • Integrity
  • Authentication
  • Non-repudiation
21
Q

In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as a key size or key length. The key length determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security.

A

True

22
Q

In cryptography, the term “Key stretching” refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks.

A

True

23
Q

Examples of key stretching algorithms include: (Select 2 answers)

A
  • Bcrypt
    (Bcrypt is a hashing algorithm that transforms a plain text password into a fixed-length string of characters, called a hash)
  • PBKDF2
    In cryptography, PBKDF1 and PBKDF2 are key derivation functions with a sliding computational cost, used to reduce vulnerability to brute-force attacks.
24
Q

Which of the following answers refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks?

A

Salt

25
Q

Pseudo-random data added to a password before hashing is called:

A

Salt