P/E 1 Flashcards
(250 cards)
- What is the value of the logical operation shown here?
X: 0 1 1 0 1 0
Y: 0 0 1 1 0 1
___________________________
~Y: ?
A. 0 1 1 1 1 1
B. 1 1 0 0 1 0
C. 0 0 1 0 0 0
D. 0 0 1 1 0 1
Answer: B
The ~ symbol represents the NOT function, which inverts the bits of the affected variable. In this case, the X value is not used.
- In object-oriented programming, what term describes a collection of the common methods from a set of objects that defines the behavior of those objects?
A. Class
B. Instance
C. Message
D. Polymorphism
Answer: A
A class is a collection of the common methods from a set of objects that defines the behavior of those objects.
- Which of the following is not an illegal activity that can be performed over a computer network?
A. Theft
B. Destruction of assets
C. Waste of resources
D. Espionage
Answer: C
Although wasting resources is considered inappropriate activity, it is not actually a crime in most cases.
- Which of the following is not a protocol used by the standard Internet-based email system?
A. SMTP
B. POP3
C. PEM
D. IMAP
Answer: C
Privacy Enhanced Mail (PEM) is not a standard Internet email protocol; it is an add-on encryption mechanism that provides authentication, integrity, confidentiality, and nonrepudiation.
- Which IPSec mode provides for encryption of complete packets, including header information?
A. Transport
B. Encapsulating Security Paylod
C. Authentication Header
D. Tunnel
Answer: D
When IPSec is used in tunnel mode, entire packets, rather than just the payload, are encrypted. This mode is designed for use in gateway-to-gateway communications.
- You are implementing AES encryption for files that your organization plans to store in a cloud storage service and wish to have the strongest encryption possible. What key length should you choose?
A. 192 bits
B. 256 bits
C. 512 bits
D. 1024 bits
Answer: B
The strongest keys supported by the Advanced Encryption Standard are 256 bits. The valid AES key lengths are 128, 192, and 256 bits.
- Recently, a piece of malicious code was distributed over the Internet in the form of software claiming to allow users to play Xbox games on their PCs. The software actually launched the malicious code on the machines of users who attempted to execute it. What type of malicious code does this describe?
A. Logic bomb
B. Virus
C. Trojan horse
D. Worm
Answer: C
Trojan horses masquerade as useful programs (such as a game) but really contain malicious code that runs in the background.
- An abundance of unsolicited messages arriving to the extent it prevents legitimate activity is known as what?
A. Sniffing
B. Denial of service
C. Brute-force attack
D. Buffer-overflow attack
Answer: B
Denial of service is the abundance of unsolicited messages arriving to the extent it prevents legitimate activity.
- The term personal area network is most closely associated with what wireless technology?
A. 802.15
B. 802.11
C. 802.16
D. 802.3
Answer: A
802.15 (aka Bluetooth) creates personal area networks (PANs).
- Which network topology offers multiple routes to each node to protect from multiple segment failures?
A. Ring
B. Star
C. Bus
D. Mesh
Answer: D
Mesh topologies provide redundant connections to systems, allowing multiple segment failures without seriously affecting connectivity.
- When attempting to impose accountability on users, what key issue must be addressed?
A. Reliable log storage system
B. Proper warning banner notification
C. Legal defense/support of authentication
D. Use of discretionary access control
Answer: C
To effectively hold users accountable, your security must be legally defensible. Primarily, you must be able to prove in a court that your authentication process cannot be easily compromised. Thus, your audit trails of actions can then be tied to a human.
- What is a device that attempts to route first but will bridge if routing fails?
A Switch
B. Repeater
C. Bridge
D. Brouter
Answer: D
A brouter is a device that attempts to route first, but if that fails, it defaults to bridging.
- Which of the following statements is true?
A. An open system does not allow anyone to view its programming code.
B. A closed system does not define whether or not its programming code can be viewed.
C. An open source program can only be distributed for free.
D. A closed source program cannot be reverse engineered or decompiled.
Answer: B
A closed system is designed to work well with a narrow range of other systems, generally all from the same manufacturer. The standards for closed systems are often proprietary and not normally disclosed. However, a closed system (as a concept) does not define whether or not its programming code can be viewed. An open system (as a concept) also does not define whether or not its programming code can be viewed. An open source program can be distributed for free or for a fee. A closed source program can be reverse engineered or decompiled.
- ___________________ is any hardware, software, or administrative policy or procedure that defines and enforces access and restriction rights on an organizational level.
A. Logical control
B. Technical control
C. Access control
D. Administrative control
Answer: C
Access control is any hardware, software, or organizational administrative policy or procedure that grants or restricts access, monitors and records attempts to access, identifies users attempting to access, and determines whether access is authorized.
- Which of the following is not a reason for data classification?
A. To secure everything at a high security level because securing everything at a low security level means sensitive data is easily accessible
B. To determine how much effort, money, and resources are allocated to protect the data and control access to it
C. To secure everything at a low security level because securing everything at a high security level is too expensive and restricts access to unclassified, noncritical data
D. To provide for nonrepudiation
Answer: D
Providing for nonrepudiation is not a reason for data classification.
- Which of the following models allows the owner of an object to grant privileges to other users?
A. Mandatory access control model
B. Discretionary access control model
C. Role-based access control model
D. Rule-based access control model
Answer: B
A discretionary access control model allows the owner (or data custodian) of a resource to grant permissions at the discretion of the owner. The other answers are non-discretionary models.
- What database security feature uses a locking mechanism to prevent simultaneous edits of cells?
A. Semantic integrity mechanism
B. Concurrency
C. Polyinstantiation
D. Database partitioning
Answer: B
Concurrency uses a “lock” feature to allow an authorized user to make changes and then “unlock” the data elements only after the changes are complete. This is done so another user is unable able to access the database to view and/or make changes to the same elements at the same time.
- What cryptographic goal does the challenge-response protocol support?
A. Confidentiality
B. Integrity
C. Authentication
D. Nonrepudiation
Answer: C
The challenge-response protocol is an authentication protocol that uses cryptographic techniques to allow parties to assure each other of their identity.
- Which of the following is an effective means of preventing and detecting the installation of unapproved software?
A. Workstation change
B. Separation of duties
C. Discretionary access control
D. Job responsibility restrictions
Answer: A
Workstation change is an effective means of preventing and detecting the presence of unapproved software.
- What are the well-known ports?
A. 0 to 1,023
B. 80, 135, 110, 25
C. 0 to 65, 536
D. 32,000 to 65,536
Answer: A
Ports 0 to 1,023 are the well-known ports.
- John is configuring a router that will stand between the network 10.8.6.0/24 and the Internet. He would like to configure egress filtering rules to minimize the potential of crackers originating a DDoS attack from his network. What type of traffic should be filtered out to help achieve this goal?
A. Inbound traffic with a private IP address
B. Outbound traffic with a private IP address
C. Inbound traffic with an address in the range 10.8.6.0/24
D. Outbound traffic with an address outside the range 10.8.6.0/24
Answer: D
Although it is true that John would probably want to filter out all of these types of traffic for various reasons, he would be specifically interested in filtering out outbound traffic with an address not belonging to his network to achieve his stated goal.
- Which of the following requires keeping archives of audit logs for a specific time?
A. Data remanence
B. Record retention
C. Data diddling
D. Data mining
Answer: B
Record retention policies define the amount of time to keep any data, including logs. Data remanence is data remnants on media. Data diddling refers to the modification of data before or during data entry resulting in incorrect or corrupt data. Data mining refers to extracting meaningful knowledge from large amounts of data.
- What network devices operate within the Physical layer?
A. Bridges and switches
B. Firewalls
C. Hubs and repeaters
D. Routers
Answer: C
Network hardware devices that function at layer 1, the Physical layer, are hubs and repeaters.
- Which type of access control system relies on using classification labels that are representative of security domains and realms?
A. Nondiscretionary access control
B. Mandatory access control
C. Discretionary access control
D. Logical access control
Answer: B
Mandatory access control enforces an access policy that is determined by the system, not the object owner.