Deck 1 Flashcards
(100 cards)
What are two types of risk analysis?
Quantitative, qualitative
An attacker has placed a URL on a website that, if clicked, will cause malicious JavaScript to execute in victims’ browsers. This attack is known as a ___________ attack.
cross-site scripting
What are the four basic control requirements identified in the Orange Book?
Discretionary access control, mandatory access control, object reuse, labels
What is the purpose of a Business Impact Assessment (BIA)?
To describe the impact that an event or disaster will have on business operations
The most extensive type of disaster recovery plan test is ______________.
an interruption test
Most security policies are categorized as what type?
Advisory
An IPsec SA consists of what three parameters to uniquely identify it in an IPsec session?
Destination IP address, Security Protocol ID (SPID), Security Parameter Index (SPI)
Which U.S. government data classification level describes information that, if compromised, could cause grave damage to national security?
Top Secret
____________ monitoring records every key press and mouse movement on a system.
Keystroke
In a civil case, the court may issue an order, known as a _________________ , allowing a law-enforcement official to seize specific evidence.
writ of possession
192.167.4.1 is an example of what class of IP address?
C
Name three VPN protocol standards.
IPsec, PPTP, SSL/TLS
A third-party inspection of a system is known as ________________ .
an audit
Name three types of intrusion detection systems used for physical security.
Photoelectric sensors, dry contact switches, motion detectors
What are the three elements of the C-I-A triad?
Confidentiality, integrity, availability
A ___________ conveys information by altering a system resource’s performance or timing.
covert timing channel
Who is the individual responsible for assigning information classification levels to assigned information assets?
Information owner
A baseline is what type of governance?
Standard
What is a primary technical concern with long-term audit log retention?
Whether any tape or disk drives will be available to read the media
Name five types of attacks against voice communication systems.
Identity fraud, toll fraud, eavesdropping, denial-of-service (DoS), Spam over Internet Telephony (SPIT)
Name three asymmetric key systems based on discrete logarithms.
Diffie-Hellman, Elliptic Curve, ElGamal
Violation reports and audit trails are examples of what type of control?
Detective technical
The two types of host or network intrusion detection are ______________ and ________________ .
signature-based systems, anomaly-based systems
Name the three elements of the fire triangle necessary for a fire to burn.
Fuel, oxygen, heat