Practice C-D Flashcards

(46 cards)

1
Q

the National Fire Protection Association (NFPA) recommends that computer facilities be able to withstand ___ minutes of exposure to fire

A

60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the difference between a dry pipe and deluge sprinkler system is that in a deluge system the pipes are ___

A

always open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a change management process is most likely to interface with a configuration management process during the ___ phase

A

documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ is a buffer overflow protection that forces an application to fail immediately if a pointer is freed incorrectly

A

Heap Metadata Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

rights grant users the ability to perform specific actions (login, print, backup, etc.), while permissions grant ___

A

levels of access to specific objects (read, write to, execute)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

one improvement from WEP to WPA is the addition of ___ to protect against man in the middle attacks

A

Message Integrity Check (MIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a security policy should be no more than ___ pages long

A

2-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the ___ was created by the National Institute of Standards and Technology for the testing and certification of forensics equipment

A

Computer Forensics Tool Testing (CFTT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

smart card attacks fall into 4 categories:

A
  • Fault analysis (usually by denying full power);
  • Power differential (directly connecting to pins and analyzing fluctuations);
  • Timing attacks (analyzing time for cryptographic functions);
  • Emanation attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

wireless clients on a LAN typically operate in ___ mode, which allows them to communicate with other clients through a Access Point

A

Infrastructure (or Master)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

wireless printers are sometimes configured in ___ mode to allow direct communication without an access point

A

Ad Hoc (or Peer to Peer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

wireless devices that are designed to communicate only with an Access Point are configured in ___ mode

A

Client (or Managed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ programming languages restrict the ways data can be used to protect against attacks using memory pointers and arrays

A

type safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the linux file ___ contains secure user information and is only accessible by root

A

/etc/shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

stateful firewalls operate between OSI levels ___ and ___. They only allow traffic into a network if ___

A

Network; Transport; it is in response to a corresponding request sent out from that network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

while most cross site scripting attacks are typically mitigated through input validation and sanitization, cross-site request forgery (XSRF) attacks can be better mitigated through 3 controls:

A

CAPTHCHA;
two-factor authorization;
adding a nonce to website requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

___ (CSMA/CA or CMSA/CD) sends a jam signal to indicate that two devices are attempting to send simultaneously

A

CMSA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

___ (CSMA/CA or CMSA/CD) requires that the receiving device send acknowledgments

A

CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ can be used to encrypt cardholder data from the moment a card is swiped until it reaches the payment processor

A

P2PE (Point to Point Encryption)

20
Q

in ___ processes are assigned to time slots to access system resources in order to isolate and protect them

A

time multiplexing

21
Q

for memory protection, ___ copies an entire process to a secondary memory location (i.e. disk)

22
Q

in a ___ attack an IP packet is sent with the same source and destination address and port

A

LAN Denial (LAND)

23
Q

in web authentication using social media accounts for SSO, ___ is typically used for authentication and ___ for authorization

A

OpenID Connect; OAuth 2.0

24
Q

Microsoft requires the following 3 buffer overflow prevention measures for software vendors: ___ and recommends but does not require ___

A

Data Execution Prevention (DEP);
Heap Metadata Protection;
Address Space Layout Randomization (ASLR);
Pointer Encoding

25
___ is a client based technology that primarily uses a digital certificate as a security control
Active X
26
in pipelining, and second instruction is fetched while the first instruction is ___
decoded
27
___ is an aggregated threat-modeling methodology developed by Microsoft
STRIDE
28
___ is a risk-based threat-modeling methodology with seven stages
PASTA
29
___ is a classification used to rank threats numerically
DREAD
30
___ is a layer 2 LAN technology using primary and secondary nodes. Instead of using CSMA/CD, primary nodes poll secondary nodes to allow them to transmit data with permission
Synchronous Data Link Control (SDLC)
31
SDLC was succeeded by HDLC, which supports ___ and ___
flow control; error correction
32
___ is a type of RAM that uses flip flops, and ___ uses capacitors, requires constant refreshing and is slower and cheaper
SRAM; DRAM
33
RSA has built-in protection against ___ attacks
replay
34
the IPv6 loopback address is ___
::1
35
because of Meet in the Middle attacks, the effective security of 3DES is ___ bits
112
36
the EU-US Safe Harbor framework was replaced by the ___
EU-US Privacy Shield Framework
37
___ is a memory protection technique that maps hardware memory addresses to applications, allowing different applications to access library objects at the same memory location rather than loading their own copy
virtual memory
38
Carrier-sense multiple access with collision detection (CSMA/CD) was only used in networks with ___
half-duplex Ethernet connections
39
CHAP uses a ___-way handshake and also ___ to protect authentication
3; periodically reauthenticates
40
the vulnerability of Telnet is that is sends ___ in clear text
all data
41
the Ethernet Cyclic Frame Check (CFC) field contains a ___
4 byte cyclic redundancy check value
42
___ is an attack that tricks a browser by inputting hexadecimal data which references resources normally protected by directory traversal checks
double encoding
43
Single Loss Expectancy = ___ x ___
Asset Value (AV); Exposure Factor (EF)
44
the difference between Point to Point Encryption (P2PE) and End to End Encryption (E2EE) for credit card data is that with E2EE ___
the cardholder data is stored unencrypted before being sent to the payment processor, so merchants can do key management
45
in an evacuation, the ___ is responsible for making sure everyone exits the building safely, and the ___ is responsible for making sure everyone arrives at the designated meeting point
safety warden; meeting point leader
46
IP address ranges that can be used for LAN's and the internet are defined in the document RFC ___
1918