Other Flashcards

1
Q

Which audit category tracks access to all objects outside Active Directory

A

An Audit Object Access audit catagory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of SCADA

A

To collect data from factories, plants, or other remote locations, and send the data to a central computer that manages and controls the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary goal of a business continuity planning

A

To maintain the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which technique attempts to predict the likelihood that a threat will occur and assigns monetary value in the event a loss occurs

A

Quantitative risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which security concept ensures that data is protected from being accessed by unauthorized persons?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the greatest security threat of instant messaging

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

According to the security+ examination blue print, what are the three controls to provide confidentiality?

A

Encryption access control and steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the best way to prevent XMAS?

A

Disabling the running of scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The seven listed static environments that you need to know how to protect?

A
SCADA
Embedded
Android
iOS
Mainframes
Game consoles
In-vehicle computing systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What two modes does IPSec provide to ensure confidentiality?

A

Tunnel mode

Transport mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which standard is a specification for secure email, designed to prevent the decryption of an email message?

A

Secure Multipurpose Internet Mail Extension (S/MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four listed controls to provide integrity

A

Certificates
Hashing
Digital signatures
Non-repudiations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is CHAP?

A

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What security protocol is the standard for use with WPA2 standard?

A

Counter Mode Cipher Block Chaining message authentication code protocol (CCMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List the seven methods that social engineering attacks are effective

A
Authority
Intimidation
Consensus/social proof
Scarcity
Urgency
Familiarity/liking
Trust
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Other names for cross site request forgery (XSRF)?

A

Session riding

One-click attack

17
Q

What is the name for the list for the list of locations where software can check to see whether a user’s certificate has been revoked?

A

CRL Distribution Point (CDP)