from the test Flashcards

(147 cards)

1
Q

<p>\_\_ is an example of asymmetric cryptography</p>

A

<p>RSA </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

<p>which e-mail security method is defined in RFC 2632 and RFC 2634? </p>

A

<p>Secure Multipurpose Internet Mail Extensions (s/mime)</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

<p>\_\_\_ provides non-repudiation, authentication, and integrity for e-mail messages. </p>

A

<p>S/MIME 3 </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

<p>\_\_ \_\_ is a spyware technique that inserts a dynamic link library into a running process's memory. </p>

A

<p>DLL Injection </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

<p>\_\_ \_\_ occurs when the length of the input data is longer than the length processor buffers can handle. </p>

A

<p>Buffer Overflow</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

<p>The major security vulnerability of using FTP is --- </p>

A

<p>User ID and password are sent in clear text</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

<p>This layer of the OSI model segments and reassembles data into a data stream and provides reliable and unreliable end to end data transmission</p>

A

<p>(Layer 4) Transport</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

<p>This layer starts, maintains, and stops sessions between applications on different network devices. </p>

A

<p>(Layer 5) Session Layer</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

<p>This layer provides the functions to establish and maintain the physical link between network devices</p>

A

<p>(Layer 1) Physical </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

<p>\_\_\_ provides centralized remote user authentication, authorization and accounting. </p>

A

<p>RADIUS</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

<p>This mode ensures that wireless clients can only communicate with the wireless access point and not with other wireless clients.</p>

A

<p>Isolation Mode</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

<p>\_\_\_ is an intrusion detection system (IDS)</p>

A

<p>Snort</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

<p>\_\_\_ \_\_\_ is the practice of dispensing IP addresses and host names with the goal of traffic diversion.</p>

A

<p>DNS poisoning </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

<p>\_\_\_ \_\_\_ \_\_\_ allows an attacker to reroute data traffic from a network device to a personal computer</p>

A

<p>Network Address Hijacking </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

<p>\_\_ is a technique used by intruders to circumvent a lock</p>

A

<p>Raking</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

<p>\_\_\_ is a collection of programs that grants a hacker administrative access to a computer or network</p>

A

<p>Rootkit</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

<p>\_\_\_ risk analysis does not assign monetary values</p>

A

<p>Qualitative</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

<p>\_\_ risk analysis attempts to predict the likelihood a threat would occur and assigns a monetary value in the even a loss occus</p>

A

<p>Quantitative </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

<p>\_\_ this risk management is discouraging cerain actions from being taken to protect against risk</p>

A

<p>Deterrence </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

<p>\_\_ this risk management is deciding to no longer employ the actions associated with a particular risk.</p>

A

<p>Avoidance </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

<p>\_\_ this risk management is taking steps to reduce risk </p>

A

<p>Mitigation</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

<p>\_\_\_ \_\_\_ allows you to configure how many new passwords must be created before an old one can be reused. </p>

A

<p>gdfg</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

<p>A \_\_ test tests specific systems to ensure their operation at alternate facilities </p>

A

<p>Parallel Test </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

<p>The chain of custody guarantees \_\_\_ </p>

A

<p>the identity and integrity of the evidence from the collection stage to its presentation in the court of law. </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25

The revocation request grace period refers to __

The maximum time taken by the certification authority server to perform a revocation.

26

You should us a __ to determine if the performance of the server had degraded.

System Monitor

27

A __ scanner will provide iformation on the ports and services that are available on your network.

Port

28

A __ test checks your network for known vulnerabilities and provides methods for protection against the vulnerabilities

Vulnerability

29

During which phase of SSL communication do a web client and a web server establish a TCP/IP connection?

Handshake

30

Secure Hashing Algorithm (SHA) produces __ bit checksums

160

31

__ establishes a web of trust between the users.

Pretty Good Privacy (PGP)

32

PGP is a public key encryption standard that is used to __

to protect e-mail and files that are transmitted over the network.

33

PGP encrypts data using __ encryption

symmetric

34

Secure Code Review examines ____

all written code for any security holes that may exist

35

This type of tool tests your networks security to see if it can be penetrated.

Penetration tester

36

An Executive succession plan ensures __

that a vital corporate position is filled in the even it is vacated during a disaster

37

RSA is an example of __ cryptography with ___

asymmetric cryptography with authentication

38

Asymmetric algorithms include

include Diffie-Hellman, RSA,ElGamal, CAST

39

Symmetric algorithms include

Data Encryption Standard Triple DES (3DES) Advanced Encryption Standard

40

A _ virus can infect both executable files and boot sectors of hard disk drives.

Multipart

41

This command line utility is used to trouble shoot a domain name server.

Nslookup

42

This utility traces the route a packet takes and records the hops along the way.

Tracert/traceroute

43

___ is an application layer protocol whose purpose is to collect statistics from TCP/IP devices.

simple network management protocol. (SNMP)

44

What ports does snmp use?

Ports 161 and 162

45

_____ allows a user to dial in to the network via a modem or modem pool while providing the user with secure access during the he is connected

Remote access server (RAS)

46

What infrastructure provides the system for the secure exchange of data over a network through the use of an asymmetric key system?

Public key infrastructure (pki)

47

Another term for technical controls is __ controls

Logical

48

A backup control is an example of an ___ control

Operational Control

49

Software testing is an example of an ___ control

Operational Control

50

To implement hardware-based encryption on a Windows server 2008, you need a __

Trusted Platform Module (TPM) chip.

51

Symmetric keys do not ensure __ and ___ for key management because the same key is used for encryption and decryption

Security and Scalability

52

The best protection against cross-site scripting (XSS) is to __

Disable the running of the scripts

53

A __ contains a list of serial numbers for digital certificates that have not expired, but that a CA has specified to be invalid.

Certificate Revocation List (CRL)

54

__ is a hashing algorithm that creates a message digest, which can be used to determine whether a file has been changed since the message digest has been changed

Secure Hashing Algorithm (SHA)-1

55

This network device acts as an internet gateway, firewall and internet caching server for a private network.

Proxy Server

56

__ is traffic redirection to a site that looks identical to the intended site

Pharming

57

__ is an asymmetric public key encryption algorithm based on the Diffie-Hellman key agreement.

ElGamal

58

__ is a Microsoft Windows feature that supports file encryption on NTFS hard disk volumes.

Encrypting File System (EFS)

59

Sending data across an insecure network, such as the internet, affects __ and __

Confidentiality And Integrity

60

___ is a block cipher encryption standard that uses a single 56-bit encryption to encrypt 64- bit blocks of data.

Data Encryption Standard

61

__ IDS watches for intrusions that match a known identity.

Signature IDS

62

A __ IDS detects activities that are unusual.

Anomaly- based

63

Make sure to look up PBX attacks

PBX

64

__ was created to deal with Voice over IP and wireless services.

Diameter

65

__ is used to digitally sign packets that are transmitted on Internet Protocol Security (IPsec connections.

Kyed Hashing for Message Authentication Code (KHMAC

66

__ files contain information about viruses, such as examples of virus code and the types that a particular virus infects

Signature File

67

What is the purpose of Infrastructure as a Service in cloud computing?

It provides computer and server infrastructure, typically through a virtualization environment.

68

What is the main difference between virtualization and cloud computing?

The location and ownership of the physical components.

69

Which document lists the steps to take in case of a disaster to your main IT site?

Disaster Recovery Plan (DRP)

70

Which private-key encryption algorithm does PGP use to encrypt data?

International Data Encryption Algorithm (IDEA)

71

Which document is used when it is necessary to invoke legal action against an employee for inappropriate use of computer resources.

Acceptable use policy

72

Which error arises because data is not checked before input to ensure that it has an appropriate length?

Buffer overflow errors

73

Which business continuity planning factor includes vulnerability analysis

Business Impact Assessment

74

What is the name of the process for removing only the incriminating data from the audit logs?

Scrubbing

75

Which port does NNTP

119

76

Which audit category monitors changes to user accounts and groups?

The Audit Account Management category

77
What are the four types of water sprinklers?
Wet pipe, dry pipe, preaction and deluge.
78

__ based monitoring looks for behavior that is not allowed and acts accordingly

Behavior

79

A __ filtering firewall only looks at a data packet to obtain the source and destination addresses and the protocol and port used.

Packet Filtering Firewall

80

LDAP entries are contained in a __ which is a hierarchical structure that can be searched for directory information.

Directory Information Tree

81

__ is a private key encryption standard that was developed by the us government for the Clipper Chip.

Skipjack

82

Skipjack uses an _-bit key.

80

83

A ___ firewall is also referred to as an appliance firewall.

Hardware

84

__ provides a transparent firewall solution between an internal network and outside networks.

NAT

85

Separation of duties is employed when user accounts are __

created by one employee and user permissions are configured by another employee.

86

The primary loop protection on an Ethernet network is __

Spanning Tree Protocol (STP)

87

What is a disadvantage of a hardware firewall compared to a software firewall?

A hardware firewall has a fixed number of available interfaces.

88

What is an embedded firewall?

A firewall that is integrated into a router.

89

A software firewall is installed on a ___

server operating system.

90

A _ is an encryption method designed to be used only once.

One-time pad (OTP)

91

___ is an 802.11b communications mode that enables wireless devices to communicate directly.

Ad hoc

92

Classification of information is typically part of an __

information policy

93

Secure Hashing Algorithm (SHA) produces __ bit checksums.

160 bit

94

Which size checksum does MD5 produce?

128 bit

95
__ ensures that the coputer on the network meet an organizations security policies
Network Access Control
96
__ __ is a smart card attack that allows a hacker to uncover the encryption key using reverse engineering.
Fault generation
97
you should use __ to encrypt a single document from your web server.
S-http
98
Which Kerberos 5 entitiy authenticates users?
The Authentication Service
99
___ is the process in which the management accepts system functionality and assurance.
Accreditation
100
What is authentication?
verifying the identity of users
101
You should use a __ analyzer to determine if passwords are being transmitted in plain text
protocol analyzer
102
What does the message authentication code (MAC) ensure?
MAC ensures the integrity of messages.
103
___ indentifies sensitive data and ensures that unauthorized entities cannot access it
Confidentiality
104
___ ensures that data and resources are available to authorized entities in a timely manner
Availability
105
__ is the process of identifying a subject requesting system access.
Authentication
106
__ ensures that data and resources are edited only in an approved manner by authorized entities.
Integrity
107
Which security service does encryption provide?
Confidentiality
108
__ is an error-control technique that ensures that files have not been changed.
packet checksum
109
__ refers to the quantitative amount of loss incurred by a single event.
Single Loss Expectancy
110
A network protocol analyzer is also known as a
Packet Sniffer
111
A __ right occurs when user inherits a permission based on group membership.
Implicit
112
An __ right occurs when a user is directly give a permission.
Explicit
113
A __ plan is primarily concerned with recovering major systems and applications after a disruption.
Contingency
114
In low encryption mode, which level of encryption does WEP provide?
64-bit
115
__ allows organizations to deploy web servers, databases, and delelopment tools in a cloud
Platform as a service
116
__ allows organizations to run applications in a cloud.
Software as a service
117
__ allows organizations to deploy virtual machines, servers, and storage in a cloud.
Infrastructure
118
__ is a protocol that secures messages between the Application and Transport layer
SSL
119
__ is a protocol used to test and report on path info between network devices
ICMP
120
__ is a protocol that allows files to be copied over a secure connection.
SCP
121
Look up EAP methods
dfg
122
Log analysis is an example of a
network analysis
123
A __ copy of a hard disk refers to making a copy at the sector level to cover every part of the area that can store user data.
Bit-level
124
__ is synonymous with protocol analyzing.
Packet Sniffing
125
Layer 2 Tunneling Protocol operates at the ___ layer of the OSI model?
Data Link layer 2
126
A Fail-over system is a computer that does ___?
Is connected to a primary computer and takes over if the primary computer fails.
127
__ is an authentication framework used in wireless networks and point-to-point connections.
Extensible Authentication Protocol (EAP)
128
Which setting ensures that accounts are not used beyond a certain date and/or time?
account expiration
129
Which port does SSH use?
22
130
What is derived by multiplying single loss expectancy (SLE) by the annualized rate of occurrence (ARO) of an event?
Annualized loss expectancy (ALE)
131
what is the primary concern of RAID?
Availability
132
Which type of attack does Challenge Handshake Authentication Protocol protect against?
Replay attack
133
Which protocol is the combo of PPTP and Cisco's Layer 2 forwarding (L2F) technology?
Layer 2 Tunneling Protocol (L2TP)
134
What does SLA stand for?
Service Level Agreement
135
What does the SLA define?
Defines the level of service to be provided
136
What is a BPO?
Blanket Purchase Order
137
What does the BPO do?
It is an agreement between a government agency and a private company for ongoing purchases of goods or services.
138
What is a MOU?
Memorandum of Understanding
139
What does a MOU do?
Ii is a brief summary of which party is responsible for what portion of the work.
140
What is an ISA?
The Interconnection Security Agreement.
141
What does a ISA do?
This is an agreement between two organizations that have connected systems.
142
TCP/IP protocol suite operates at which layer of the OSI model?
Layer 4 Transmission
143
LDAP uses which port?
389
144
LDAP with SSL uses which port?
636
145
Which port does L2TP use?
1701
146
The audit __ __ category will audit all instances of users exercising their rights.
Audit privilege use
147
The audit __ __ audit category monitors changes to user accounts and groups
Account Management