Practice exam strengthening Flashcards
(39 cards)
What is the range of well known ports?
0-1023
What was the first international treaty seeking to address computer crimes?
Council of Europe (CoE) Convention on Cybercrime
What outlines the general requirements of an ISMS?
Answers questions like: What is an ISMS? What does it do?
ISO/IEC 27001
NIST SP 800-53 was initially created to tells agencies what needs to be put into place in order to be compliant with what?
A. HIPAA
B. FISMA
C. GLBA
D. PCI DSS
B
What is the best definition of a socket?
A port number and an IP address
Computer-generated or electronic information is most often categorized as what type of evidence?
Hearsay
How often should fire extinguishers be inspected?
A. Every two years
B. Once a year
C. Quarterly
D. Monthly
quarterly
What is the other name for Thin Net?
A. 10BaseT
B. 100BaseT
C. Fast Ethernet
D. 10Base2
10Base2
What SDLC model does this describe?
“Discrete phases of development requiring formal reviews and documentation” ?
Waterfall model
Which are the most used backup facility type?
A. Warm site
B. Hot Site
C. Redundant Site
D. Cold site
Warm site
A form of attack on a computer which takes advantage of the fact that the operating system is in a vulnerable state after an interrupt has occurred.
(Fun Fact: Also not mentioned in the book.)
NAK attack
This component of PPP establishes, configures, and maintains the connection.
Link Control Protocol
LCP
This component of PPP provides user authentication capabilities through PAP, CHAP, and EAP
Network Control Protocol
NCP
This is a framing protocol that is used mainly for device-to-device communication, such as two routers communicating over a WAN link. It is an improvement over SDLC
HDLC
High Level Data Link Control
This is the simplest SOO technology, but it is not very secure.
A. Kerberos
B. Thin Clients
C. SESAME
D. scripting
D. scripting
This is a symmetric block cipher developed while studying DES, an ICMP tunneling attack, and the name of a god i norse mythology.
Loki
Which of the following is not considered a
detective control.
A. Incident Response
B. Mandatory Vacations
C. Separation of Duties
D. Job Rotation
Separation of Duties
Put these change management steps in order.
A Request a change B, Document a change C. Implement a change D. Test a change E. Approve a change F. Report to management
Request a change Approve a change Document a change Test a change Implement a change Report to management
American Institute of Certified Public Accountants (AICPA) first had SAS 70, which originally had a focus on financial issues. In 2011 the AICPA released a new framework of auditing standards on ________, which are defined in the __________ .
SOC (Service Organization Controls)
SSAE 16 American Statement on Standards for Attestation Engagements
What is the single point of failure within an SOO implementation?
authentication server
OSI Model —-> TCP/IP model
Application, Presention, Session = ____________
Transport = __________
Network = ____________
Data Link, Physical = _____________
Application
Host-to-Host
Internet
Network Access
In 802.11, OSA has no authentication and all transactions are in cleartext, so wide open to sniffing. When the AP is configured to use ______, the AP sends a random value to the wireless device, which encrypts it and sends it back. AP decrypts it and verifies the value.
SKA
Shared Key Authentication
This is the most authoritative level of time source.
A. Stratum 0
B. Stratum 1
C. Stratum 2
C. Stratum 3
A
Which component of the IPSec suite provides confidentiality, data-origin authentication, and data integrity?
A. ISAKMP
B. ESP
C. AH
D. IKE
ESP
Encapsulating Security Payload