MOD 17 Flashcards

1
Q

What are safeguards to avoid, detect, and counteract security risks?

A

security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 types of security controls?

A

Managerial, Operational, Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the product of all the company’s controls combined?

A

Information Security Mangement System (ISMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 threats?

A

Natural, Human, Environmental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which threat has storms, earthquakes, rain, and critters?

A

natural threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which threat is both malicious and non-maliciious?

A

human threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which threat is caused by humans that affects the environment?

A

Environmental threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 3 Controls?

A

Common, System Specific, Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Control manages whose protection is inherited by one or more systems?

A

Common controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Control manages something unique to a specific system?

A

System Specific controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Control is adjusted to provide more security to a subset of systems?

A

Hybrid controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What helps to prevent data loss? (Failover mode, network mapping)

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a way to store the same data in different places?

A

Raid arrays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which encryption protects a message in transit from host to host?

A

Link encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is there link encryption protection while on the host?

A

NO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many keys does link encryption require per host pair?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which encryption encrypts at the highest OSI layers and is protected at each host?

A

End-to-End encryption

18
Q

Which network uses link encryption between the client and a firewall?

A

Virtual Private Network (VPN)

19
Q

Sender and receiver addresses are _______, payload isn’t unless encrypted

A

hidden

20
Q

What is an error detection method that adds extra bits to each data units?

A

Parity check

21
Q

In a parity check, if they sum to an even number it’s _____.

A

0

22
Q

In a parity check, if they sum to an odd number it’s ______.

A

1

23
Q

What is a physical device that frequently generates a new, random password?

A

Password token

24
Q

What is similar to a password token except you also input your PIN?

A

Challenge-Response System

25
Q

What is the network name of the access point?

A

SSID (Service Set Identifier)

26
Q

What is 64 or 128 bit encyption that can be easily broken?

A

WEP (Wired Equivalent Privacy

27
Q

Which wireless security protocol uses TKIP which changes the encryption for each packet?

A

WPA

28
Q

Which wireless security protocol uses stronger than WPA, uses AES and is the current standard?

A

WPA2

29
Q

Which wireless security protocol was approved by the WiFi Alliance and is still being rolled out?

A

WPA3

30
Q

Which firewall can’t see inside the packet but can block input and output?

A

Packet Filter Firewall

31
Q

Which firewall tracks packets and puts them together, and stops attacks that hide in small packets?

A

Stateful Inspection Firewall

32
Q

Which proxy runs pseuoapplications?

A

Application Proxy

33
Q

What is like an application proxy with lots of rules

A

Guard

34
Q

Which detection system looks for patterns matching a known attack?

A

Signature-based

35
Q

Which detection system looks for anomalies/odd behavior?

A

Heuristic

36
Q

Which detection system runs on a single client or host?

A

Host-Based

37
Q

Which detection system is based on a computer network that acts like an IDS?

A

Network-based

38
Q

Most IDS run in ______ mode to prevent from being attacked.

A

stealth

39
Q

Vulnerability Management System is also known as __________

A

Patch Management

40
Q
A