Mod B Flashcards

1
Q

this type of log monitors computer system events such as when a computer stops or starts and OS events, such as when a service starts or stops

A

system logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

successful and failed login attempts are most likely to be contained within what type of logs

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Diffie Hellman and ElGamal key exchange uses what mathematical function

A

discrete logarithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RSA uses what mathematical function

A

prime number factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ad hoc mode, also called peer to peer mode, is useful for sharing ___ from one computer to anotherr

A

files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Only ___ sites support DR testing in accordance with a company’s DRP

A

hot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a ___ attack, an attacker sends UDP pakcets with a spoofed source address to a directed broadcast address. Every device that receives one of thse UDP boradcasts will send a response to the spoofed source address

A

fraggle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ attacks use malformed IP packets in which the source and destination address and port are the same. When the victim with the destination receives the packet, it can become confused and crash

A

LAND (local area network denial)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In a ___ attack, an attacker uses serveral large overlapping ip fragments. The victim system will attempt to reassemble these packets, sometimes causing the system to crash

A

teardrop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What transport protocol was discovered to be vulnerable to POODLE?

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CVSS scoring is influenced by what 3 metric groups?

A

Base: severity, set by vendor

Temporal: urgency, set by vendor

Environment: how it effects end user of a specific organization, set by end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

password ___ restrictions will ensure that a specified number of time has passed before a user is allowed to manually change a newly changed password

A

age

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What routing protocol does not support MD5 authentication for secure route updates?

A

RIPv1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ is an access control principle that ensures information does not flow between groups and users

A

Compartmentalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A secure development metric that ranks security issues in order to quantify risk

A

risk density

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When is the archive bit cleared in a backup scheme?

A

every time a backup is performed

17
Q

What backup resets the archive bit

A

full and incremental

18
Q

What does the archive bit determine?

A

Which file needs to be backed up

19
Q

The process of authenticating to a biometric system

A

throughput

20
Q

Business practices that a resonable individual would consider appropriate

A

prudent man rule

21
Q

Unused space in a cluster is

A

slack space

22
Q

smallest unit of accessible space is a

A

sector

23
Q

___ evidence is evidence that includes copies or oral descriptions of original documents

A

secondary

24
Q

___ evidence can support a fact that was established by other evidence but cannot by itself establish that fact

A

corroborative

25
Q

__ evidence includes descriptions and accounts of facts of an event by eyewitnesses to the event in question

A

direct

26
Q

___ evidence is evidence that can indirectly establish a fact but cannot be used to directly establish that fact

A

circumstantial

27
Q

What are the two keys TPMs use and what do they do

A

endorsement key: created when tpm is manufactured, permanent

storage key: created when a user takes ownership of the TPM

28
Q

Name 4 security modes for systems and what they must have

A

Dedicated: security clearance, access approval, a valid need to know for all info processed

System high: security clearance, access approval for all info processed

Compartmented: security clearance for all info processed

Multilevel mode: security clearance, access approval, and a valid need to know that permits only info they will access

29
Q

What OASIS standard is most commonly used by SDN

A

XACML (extensible access control markup language)

30
Q

SPML (security provisioning markup language) is based on what language

A

DSML (directory services markup language)

31
Q

Transient authentication is authentication by something you ____

A

have

32
Q

OOP concept that enables data to be processed differently based on the data type when objects are instantiated from other objects.

A

Polymorphism

33
Q

OOP concept that enables 2 objects that are based on the same class to process data independently

A

polyinstantiation

34
Q

maximum time a business can survive without a service

A

RTO

35
Q

how long a system should run before failing

A

mean time between failure (MTBF)

36
Q

how long it will take to recover a failed system

A

mean time to repair (MTTR)