Mixed Flashcards
(143 cards)
Best way to minimize impact of DDoS
use firewall to identify and deny traffic to addresses
Main reason to measure impact of unplanned interruption
Provides insight into critical business processes
When to use digital signatures instead of Message Auth Code
When must be known that sender is the only one who made changes to doc
Distinctive characteristic of network tunneling process
encapsulation of packets
In what sec. mode is a system operating when 2 or more classification levels are processed and not all users have clearance for all data handled by system
Multi-Level
Primary reason for Code Obfuscation
increases diff. of reverse engineering
Which is a security service not defined in ISO 7498-2 Security Architecture model
Availability
Why are audit trails important
They provide individual accountability
Primary components of effective security program
People, Processes, Technology
Access Control attack used against a remote user’s callback
Call forwarding
Major Weakness of PPTP
Encryption key derived from User’s Password
BCP project scope identification includes
BIA, also most CRUCIAL factor for DRP
With 802.11B wireless, which tech protects users from each other
Firewall on each device/computer
Stack overflow that crashes TCP/IP service daemon can result in serious security breach because
process is executed by a privileged entity
ISO 27001 complements…
17799
17799 is evolution of
7799
Activation of virus attached in email is avoided by
configuring client to not automatically open attachments
Crypto attack that uses execution times and cryptographic device power requirement
Differential
Main reason to use IPsec in tunnel mode is
protect entire IP packet
Design phase in Software Development Life Cycle (SDLC) includes all but:
Developing maintenance and operations manual
Which EAL within Common Criteria provides security assurance “methodically tested and checked” ?
EAL 3
Which attack will a Network-Based IDS detect
Phone Book File attack from a browser using SSL
Term that defines what security properties of a product is evaluated in Common Criteria evaluation is:
Security Target
Regularly scheduled check of network cards in promiscuous mode is a countermeasure for:
Sniffer