Deck 1 Flashcards

(100 cards)

1
Q

What are two types of risk analysis?

A

Quantitative, qualitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An attacker has placed a URL on a website that, if clicked, will cause malicious JavaScript to execute in victims’ browsers. This attack is known as a ___________ attack.

A

cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four basic control requirements identified in the Orange Book?

A

Discretionary access control, mandatory access control, object reuse, labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of a Business Impact Assessment (BIA)?

A

To describe the impact that an event or disaster will have on business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The most extensive type of disaster recovery plan test is ______________.

A

an interruption test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Most security policies are categorized as what type?

A

Advisory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An IPsec SA consists of what three parameters to uniquely identify it in an IPsec session?

A

Destination IP address, Security Protocol ID (SPID), Security Parameter Index (SPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which U.S. government data classification level describes information that, if compromised, could cause grave damage to national security?

A

Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____________ monitoring records every key press and mouse movement on a system.

A

Keystroke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a civil case, the court may issue an order, known as a _________________ , allowing a law-enforcement official to seize specific evidence.

A

writ of possession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

192.167.4.1 is an example of what class of IP address?

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name three VPN protocol standards.

A

IPsec, PPTP, SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A third-party inspection of a system is known as ________________ .

A

an audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name three types of intrusion detection systems used for physical security.

A

Photoelectric sensors, dry contact switches, motion detectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three elements of the C-I-A triad?

A

Confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ___________ conveys information by altering a system resource’s performance or timing.

A

covert timing channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who is the individual responsible for assigning information classification levels to assigned information assets?

A

Information owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A baseline is what type of governance?

A

Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a primary technical concern with long-term audit log retention?

A

Whether any tape or disk drives will be available to read the media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name five types of attacks against voice communication systems.

A

Identity fraud, toll fraud, eavesdropping, denial-of-service (DoS), Spam over Internet Telephony (SPIT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Name three asymmetric key systems based on discrete logarithms.

A

Diffie-Hellman, Elliptic Curve, ElGamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Violation reports and audit trails are examples of what type of control?

A

Detective technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The two types of host or network intrusion detection are ______________ and ________________ .

A

signature-based systems, anomaly-based systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Name the three elements of the fire triangle necessary for a fire to burn.

A

Fuel, oxygen, heat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Name three factors that are used to determine data classification.
Value, regulations, policy
26
Name three types of general-purpose controls.
Detective, preventive, corrective
27
What are the four main functions of the operating system?
Process management, I/O device management, memory management, file management
28
A SYN flood is an example of what type of attack?
Denial-of-service (DoS)
29
Name four Wi-Fi access point infrastructure modes of operation.
Root, repeater, bridge, mesh
30
What type of water sprinkler system initially has no water present in the pipes and, at activation, delivers a large volume of water?
Deluge
31
To be admissible in a court of law, evidence must be ________________________.
relevant
32
The minimum number of SAs required for a two-way IPSec session between two communicating hosts using both AH and ESP is ____________.
four
33
An alternative information-processing facility where all systems, patches, and data are mirrored from live production systems is known as a _______________.
hot site
34
A ________________ model ensures that the actions of different objects and subjects aren’t seen by (and don’t interfere with) other objects and subjects on the same system.
noninterference
35
Name five protocols that can be used to secure email communication.
SMTP over TLS, S/MIME, MOSS, PEM, PGP
36
The Ethernet protocol is defined at what layer of the OSI model and in which IEEE standard?
Data Link, 802.3
37
A prolonged drop in voltage describes what electrical anomaly?
Brownout
38
True or false: Failure to implement a safeguard may result in legal liability if the cost of implementing the safeguard is less than the cost of the associated loss.
True
39
What term describes the legal evidence-gathering technique of luring an individual toward certain evidence after that individual has already committed a crime?
Enticement
40
Authentication can be based on any combination of what three factors?
Something you know, something you have, something you are
41
The process of wrapping protocol information from one layer in the data section of another layer describes .
encapsulation
42
An address used as the origin for calculating other addresses describes ________________.
base addressing
43
The total combination of protection mechanisms within a computer system (including hardware, firmware, and software) that’s responsible for enforcing a security policy defines a ______________.
Trusted Computing Base
44
Name four types of intellectual property.
Patents, trademarks, copyrights, trade secrets
45
Antimalware software that watches for anomalous behavior uses what technique?
Heuristics
46
What is the formula for calculating Annualized Loss Expectancy (ALE)?
SLE x ARO = ALE, where SLE is the Single Loss Expectancy and ARO is the Annualized Rate of Occurrence
47
The practice of regularly transferring personnel to different positions or departments within an organization is known as ___________.
job rotation
48
Which U.S. government data classification level describes information that, if compromised, could cause serious damage to national security?
Secret
49
Name three types of possible damages in a civil case.
Compensatory, punitive, statutory
50
A data network that operates across a large geographic area defines what type of network?
WAN
51
The Advanced Encryption Standard (AES) is based on what symmetric key algorithm?
Rijndael
52
What is the longest period of time that a business can survive without a critical function?
Maximum tolerable downtime
53
The process of reviewing and approving proposed changes to systems is known as ________________.
change management
54
Viruses, rootkits, and Trojan horses are broadly defined as ______________.
malware
55
Which ITSEC classification level is equivalent to TCSEC level B3?
E5
56
The LLC and MAC are sublayers of which OSI model layer?
Data Link
57
The ____________ protocol is used to facilitate user authentication across systems and among organizations through the exchange of authentication and authorization information among organizations.
Security Assertion Markup Language (SAML)
58
Name two protocols that can be used to implement one-time passwords.
S/Key and Diameter
59
The Clark-Wilson integrity model is based on the concept of a ___________, in which a transaction is sufficiently ordered and controlled that it maintains internal and external consistency.
well-formed transaction
60
Portable CO2 fire extinguishers are classified as what type of extinguishing system?
Gas-discharge
61
Name the four CPU operating states.
Operating (or run), problem (or application), supervisory, wait
62
What type of cabling should be used below raised floors and above drop ceilings?
Plenum
63
Sensitivity labels are a fundamental component of which type of access control system?
Mandatory
64
When should management be notified of a computer crime?
As soon as the crime is detected
65
A developer, suspecting that he may be fired soon, modifies an important program that will corrupt payroll files long after he is gone. The developer has created a _________________.
logic bomb
66
Which Internet specification provides secure e-commerce by using symmetric key systems, asymmetric key systems, and dual signatures?
Secure Electronic Transaction (SET)
67
A ______________ conveys information by altering stored system data.
covert storage channel
68
Name four examples of packet-switched WAN protocols.
IP, X.25, Frame Relay, SMDS
69
Electrical fires are classified as what type of fire and use what extinguishing methods?
Class C; CO2 or FM-200
70
Wardriving and port scanning are examples of ___________ tests.
penetration
71
A computer system that alternates execution of multiple subprograms on a single processor describes what type of system?
Multitasking
72
What type of firewall architecture employs external and internal routers, as well as a bastion host?
Screened-subnet
73
A system used to monitor and control end -user access to cloud-based services is known as a ________________.
cloud access security broker (CASB)
74
The simple integrity property and star integrity property are defined in which integrity model?
Biba
75
Name three methods of attack against access control systems.
Brute-force, dictionary, buffer overflow
76
Filling a system’s hard drive so that it can no longer record data is a type of __________ attack.
denial-of-service (DOS)
77
In biometric systems, what is a False Accept Rate (Type II) error?
Unauthorized users are incorrectly granted access.
78
To deter casual trespassers, fencing should be a minimum height of ______________ feet.
3 feet
79
Masquerading is a ___________ technique.
social engineering
80
Which PPP authentication protocol transmits passwords in clear text?
Password Authentication Protocol (PAP)
81
The decision whether to purchase an emergency generator should be based on the _________________ of electrical power outages.
average and worst-case duration
82
Name the four layers of the TCP/IP Protocol Model.
Application, Transport, Internet, Link (or Network)
83
A type of cipher that replaces bits, characters, or character blocks with alternate bits, characters, or character blocks to produce cipher text is known as a ______________.
substitution cipher
84
Name the four main components of a Public Key Infrastructure (PKI).
Certificate Authority (CA), Registration Authority (RA), Repository, Archive
85
“A user cannot deny an action” describes the concept of _____________
nonrepudiation
86
The restricted environment that Java applets occupy is known as a _______________.
sandbox
87
What is the main reason for establishing an asset classification program?
It isn’t practical to protect all data equally.
88
True or false: Risk avoidance is considered to be a general remedy for risk.
False
89
What is the required operating state of a network interface on a system running a sniffer?
Promiscuous mode
90
The logic present in an object is known as a ____________ .
method
91
PCI DSS is applicable to organizations that ______________________.
transmit, process, or store payment card information
92
A ________________ is useful in safeguard selection for determining cost-effectiveness.
cost-benefit analysis
93
A system that continues to operate following the failure of a network component describes which type of system?
Fault-tolerant
94
A system that accumulates knowledge by observing events’ inputs and outcomes is known as a ________________.
neural network
95
What type of network attack sends TCP packets from a spoofed source address with the SYN bit set?
SYN Flood
96
The purpose of session management in a web application is to ________________.
protect sessions from unauthorized access
97
True or false: Bell-LaPadula, Biba, and Clark-Wilson all address availability issues.
False
98
Data on backup media being sent by courier to an off-site storage location is known as what?
Data in transit
99
Name a type of extinguishing agent that fights fires by separating the elements of the fire triangle rather than simply removing one element.
FM-200
100
True or false: A signature-based IDS generally reports a high number of false positives.
False