Practice A Flashcards

(38 cards)

1
Q

to calculate qualitative risk, multiply:

A

Threat x Vulnerability x Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a threat ___ is the party responsible for a threat, and the threat ___ is the potential medium of the attack

A

agent; vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a SEIM system is only used when there are multiple ___

A

servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

processors typically support two states: ___ which has highest privileges, or ___ which is associated with users

A

Supervisor/kernel; problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___, aka encapsulation is used in object oriented programming to separate subjects and objects

A

data hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the ___ wireless standard supports 2.4 or 5 GHz and increases throughput up to 600 Mbps by supporting multiple Input/output frequencies

A

802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a client device responds to a TFTP server using a ___ port, in the number range:

A

registered, or user; 1024 - 49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

temporary communication sessions are often established using ___ ports, in the number range:

A

ephemeral, or private; 49152 - 65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

of the fire sensing technologies, only ___ sensors require line of sight

A

flame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the main concern about Bluetooth on a network is ___

A

weak encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Extensible Access Control Markup Language (XACML), Security Provisioning Markup Language (SPML) and Security Assertion Markup Language (SAML) are all open standards created by ___

A

OASIS (Organization for the Advancement of Structured Information Standards)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the difference between Network Address Translation (NAT) and Port Address Translation (PAT) is:

A

PAT assigns multiple private IP’s to one public IP by assigning Port numbers, while NAT assigns one-to-one private to public IP’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

communicating with either IPv4 or IPV6 can be done by a ___ device, by using ___ to translate the traffic, or between LAN’s using ___

A

dual stack;
Network Address Translation-Protocol Translation (NAT-PT);
4to6 or 6to4 tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

while Kerberos does a good job preventing eavesdropping attacks, it is vulnerable to ___

A

theft of cached credentials which are not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

in network data encapsulation, bits are encapsulated into ___, then into ___, then into ___

A

frames; packets; segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

of the AAA protocols, one weakness of ___ is that it only encrypts passwords, not usernames

17
Q

HTTPS encrypts packets at OSI layer ___

A

4 - Transport

18
Q

any device with more than one network connection is considered multi-___

19
Q

mitigating electromagnetic leakage is the concern of the ___ program

20
Q

the OWASP top 10 vulnerability that increased since 2013 is ___

A

sensitive data exposure

21
Q

although security administrators generally have less privileges than system administrators, they often ___ of system admins

A

audit the activities

22
Q

the SHA algorithm can produce a hash of at most ___ bits

23
Q

in a brute force attack the attacker knows the ___

24
Q

the ISO 27000 security standards are based on a ___ standard

25
SYN flood attacks occur on OSI layer ___ because they use ___ protocol
Transport; TCP
26
to deny specific domains in an access control list while allowing all others, your rules should end with ___
Allow All
27
skimming attacks involve the capture and use of ___
credit card information
28
a teardrop attack is a kind of DOS attack using ___
large overlapping IP fragments the victim system attempts to reassemble
29
an emanation attack captures data through ___
electromagnetic leakage
30
following a malware attack which damaged files, anti-virus software used to purge the malware is a ___ control and restoring from backup is a ___ control
Corrective; Recovery
31
Kerberos is considered a ___ system because users only have to sign on once per session
Single Sign On (SSO)
32
security ___ of objects enable enforcement of organizational policies, standards, regulations, etc.
marking
33
when an identified vulnerability has a label beginning "MS.." then it was identified by the organization ___
Microsoft
34
technical Standards in an organization help ensure ___, whereas Baselines have more ___
consistency; discretion
35
in a relational database, ___ is another word for a table, ___ for a row and ___ for a column
relation; tuple; attribute
36
Tripwire is a ___ based intrusion ___ system
host; detection
37
SLIP is sometimes used instead of PPP because ___
it has lower overhead
38
a lockdown enclosure is designed to prevent ___
theft of computer equipment