P/E 4 Flashcards
(250 cards)
- What security protocol was developed specifically to protect communications between web servers and web browsers?
A. L2F
B. SKIP
C. SWIPE
D. SSL
Answer: D
Secure Sockets Layer (SSL) is an encryption protocol developed by Netscape to protect the communications between a web server and a web browser.
- What is the difference between residual risk and total risk?
A. Budget
B. Human resource allocation
C. Controls gap
D. Fault tolerance
Answer: C
The controls gap is the difference between total risk and risudual risk.
- If you require the most advanced and complete method of off-site backup, what option do you choose?
A. Manual backups
B. Automated backups
C. Remote mirroring
D. Remote journaling
Answer: C
Remote mirroring is the most advanced, complete, and expensive off-site backup solution. With this solution, a live database server is kept off site at some secure remote location.
- If a specific step-by-step guide does not exist that prescribes how to accomplish a necessary task, which of the following is used to create such a document?
A. Policy
B. Standard
C. Procedure
D. Guideline
Answer: D
A guideline offers recommendations on how standards and baselines are implemented and serves as an operational guide for both security professionals and users. Guidelines are flexible so they can be customized for each unique system or condition and can be used in the creation of new procedures (i.e., step-by-step guides).
- In what level of the Capability Maturity Model for Software do software developers operate according to a set of formal, documented software development processes?
A. Initial
B. Repeatable
C. Defined
D. Managed
Answer: C
In the Defined stage of the CMM, all development projects take place within the constraints of a standardized management model.
- Which firewall type looks exclusively at the message header to determine whether to transmit or drop data?
A. Static packet filtering
B. Application-level gateway
C. Stateful inspection
D. Dynamic packet filtering
Answer: A
A static packet-filtering firewall filters traffic by examining data from a message header.
- Which of the following is not a risk related to cell phone usage?
A. Data interception
B. Switch console port access
C. Eavesdropping
D. Cloning
Answer: B
A switch console port exists only on a switch; a cell phone cannot be used to access such ports.
- In an agile software development process, how often should business users be involved in development?
A. Daily
B. Weekly
C. Monthly
D. At each release
Answer: A
The agile development process requires that business users interact with developers on a daily basis.
- A made-up network designed to lure unsuspecting attackers with low-hanging fruit is called what?
A. IDS
B. Honeynet
C. Padded cell
D. Vulnerability scanner
Answer: B
Honeynets are entire networks created to serve as a snare for intruders. They look and act like legitimate networks, but they are 100 percent fake. Honeynets tempt intruders with seemingly vulnerable systems with attractive artificial data.
- Which one of the following cipher types operates on individual characters or bits of a message without knowledge of what came before or after?
A. Stream cipher
B. Caesar cipher
C. Block cipher
D. ROT3 cipher
Answer: A
Stream ciphers operate on one character or bit of a message (or data stream) at a time.
- Which type of access control system relies on using classification labels that are representative of security domains and realms?
A. Nondiscretionary access control
B. Mandatory access control
C. Discretionary access control
D. Logical access control
Answer: B
Mandatory access control enforces an access policy that is determined by the system, not the object owner.
- What are the well-known ports?
A. 0 to 1,023
B. 80, 135, 110, 25
C. 0 to 65, 536
D. 32,000 to 65,536
Answer: A
Ports 0 to 1,023 are the well-known ports.
- Which of the following is nested RAID involving the mirroring of striped drive sets with evenly distributed parity data?
A. RAID 1
B. RAID 6
C. RAID 1+5
D. RAID 1+0
Answer: C
RAID 1+5 is nested RAID involving the mirroring (RAID 1) of striped drive sets with evenly distributed parity data (RAID 5).
- Which of the following is not an element of configuration management?
A. Supporting rollback
B. Detailed documentation
C. Systematic analysis of impending alterations
D. Use of the spiral model of project management
Answer: D
The spiral model of project management does not directly relate to configuration management. Configuration management is about managing change that could result in reduced security.
- Which of the following is not a technique to avoid a single point of failure?
A. RAID
B. Redundant servers or clusters
C. High-speed network connection
D. Failover solutions
Answer: C
A high-speed network connection is not a single point of failure avoidance technique, especially if you have only one.
- The __________ model focuses on preventing interference in support of integrity. This model is based on the idea of defining a set of system states, initial states, and state transitions. Through the use of and limitations to only these predetermined secure states, integrity is maintained and interference is prohibited.
A. Biba
B. Take grant
C. Goguen−Meseguer
D. Sutherland
Answer: D
The Sutherland model focuses on preventing interference in support of integrity. This model is based on the idea of defining a set of system states, initial states, and state transitions. Through the use of and limitations to only these predetermined secure states, integrity is maintained and interference is prohibited.
- Which state is not considered to have a very high risk for seismic hazard?
A. Alaska
B. Oregon
C. Idaho
D. Georgia
Answer: D
Alaska, Oregon, and Idaho are located in regions that are rated high on seismic activity; Georgia, however, has its own unique set of environmental weather conditions.
- Which of the following is not part of RFC 1918?
A. 169.254.1.1
B. 192.168.1.1
C. 172.16.1.1
D. 10.1.1.1
Answer: A
The 169.254.x.x range is usually employed by the Microsoft APIPA response to failed DHCP services.
- In a discussion of high-speed telco links or network carrier services, what does fault tolerance mean?
A. Error checking
B. Redundancy
C. Flow control
D. Bandwidth on demand
Answer: B
In a discussion of high-speed telco links or network carrier services, fault tolerance means to have redundant connections.
- What technique is used by antivirus software to detect behavior deviating from normal patterns of activity?
A. Signature detection
B. Heuristic detection
C. Data integrity assurance
D. Automated reconstruction
Answer: B
Heuristic detection techniques develop models of normal activity and then identify deviations from that baseline.
- Coordinated attack efforts that leverage key mechanisms in legitimate network traffic or protocol responses that disrupt or inhibit service to some network infrastructure are what form of attack?
A. Distributed denial of service
B. Denial of service
C. Diffracted denial of service
D. Distributed reflective denial of service
Answer: D
Coordinated attack efforts between cooperative machines using traffic in an entirely legitimate manner are distributed reflective denial of service attacks.
- The __________ of a process consist of limits set on the memory addresses and resources it can access. This also states or defines the area within which a process is confined.
A. Isolation
B. Bounds
C. Confinement
D. Authentication
Answer: B
The bounds of a process consist of limits set on the memory addresses and resources it can access. The bounds state or define the area within which a process is confined.
- How many keys are assigned each participant in an asymmetric cryptosystem?
A. One
B. Two
C. Four
D. One per user
Answer: B
Each participant in an asymmetric cryptosystem is issued two keys: a public key and a private key.
- Darcy’s Doodles is an electronic content provider hosting websites related to art. The IT staff of Darcy’s Doodles is concerned about the risk of an earthquake destroying their data center, which is valued at $8,000,000. After consulting with seismologists, they determined that an earthquake is likely to occur once every 50 years and, if one occurred, it would completely destroy the facility. What is the ARO?
A. 1 percent
B. 2 percent
C. 20 percent
D. 50 percent
Answer: B
The annualized rate of occurrence (ARO) is the likelihood that a risk will materialize in a given year. In this example, the risk will occur once out of every 50 years, 1/50 = 2%.