Study This Flashcards

(328 cards)

1
Q

If risks were categorized as either critical or normal, what risk assessment method is being used?

A

Qualitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What risk assessment method produces number results

A

Quantitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What document is intended to help deal with potential issues and conflict among partners

A

BPA

Business partner agreement addresses things like ownership, profits, losses and partner contributions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a more threat centered security program look like?

A

Focusing on understanding adversaries motivations and capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is characterized as an attempt to gain access to a systems resource

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What document defines the technical security requirements associated with two orgs and who are connecting their information systems /network?

A

Interconnection security agreement, ISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When do we normally build a risk matrix

A

Qualitative risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A developer composes a document that details all the entry points through which an attacker could attempt to introduce code into the app environment, what does this document represent

A

Attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Single loss expectancy equals (=) assets values times (x) exposure factor

A

The percentage of an asset that is lost due to a threat event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the minimum and customary practice of responsible protection of information assets is defined by which of the following terms?

A

Due care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Of two people are working together and we are concerned about collusion, what is performed?

A

Rotation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a central characteristic of accountability

A

A systems ability to determine the actions and behavior a single individual within a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the opposite of the CIA triad

A

Disclosure, alteration and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Report assessing design, suitability and effectiveness for a service organization security controls over a period of time

A

SOC 2 type 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What term is primarily concerned with enumerating an understanding the various ways an adversary might negatively impact the security of an application slated for development

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Policies standers guidelines in security awareness training fall under which of the following control categories

A

Directive controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What principal Requires multiple individuals authorization in order to carry out a particularly critical function

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security incident can be thought of in which of the following terms?

A

Confidentiality, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following terms describes the right to protect the expression of ideas

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When calculating the cost of risk I need to look for two factors which of the following choices one of these factors

A

Single loss expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your organization just discovered an incident in which PII looks to have been accessed But not ex filtrated. What should you do

A

Disclosure within 72 hours of the incident discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What document would be used to ensure that the IT department meeting is contractual obligations with the audit team

A

Ola

Operating level agreement which is an internal agreement that supports the SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

And quantitative risk management single loss expectancy is used to quantify what

A

The amount of financial impact that would result if a breach occurred that impacted an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Prior to excepting a risk what has most likely occurred

A

Risk mitigation
There will always be a residual risk even if mitigating counter measures are leveraged. Either this occurs explicitly and formally or risk is accepted implicitly by choosing not to employ additional avoidance, transfer, or mitigation measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which ISO information security standard focuses on auditing
27001
26
Which type of technology would be best suited to help monitor and possibly even bolster the security of a SaaS Solutions being used by on premise employees
CASB Cloud access security brokers are on premise or cloud base security policy enforcement points, place between cloud service consumers and cloud service providers to combine an interject enterprise security policies as cloud base resources are accessed
27
Identifying and labeling all personally identifiable information would be example of what
Data classification
28
What process customizes a standard for an organization, beginning with scoping, then adding compensating controls with parameters ( security configuration settings) 
Tailoring
29
What process determines the applicable portions of a standard that must be followed by organization
Scoping
30
Which of the following is considered nonvolatile memory
ROM Read only memory is nonfilel storage where locations can be directly access in basic implementation. Data cannot be altered dynamically. Nonfiled storage retains this information even when the computer loses power, and can be used to boot the system. Both dynamic ram static ram are volatile memory
31
Senior manager has grown particularly concerned about the potential for breach of PII data. Which of the following controls is most directly applicable to their concern
DLP Data loss prevention tools and software filter data streams on networks, control and monitor and point activities, and monitor data in the cloud. DLP tools protect data and use data in motion and data at rest. Data loss prevention programs also feature reporting, which aids both and identifying anomalies and problems for forensic response and in meeting audit in routine compliance requirements
32
What is true about dynamic ram
DRAM Data is rewritten multiple times each second Hint, dynamic RAM  It is always being rewritten hence dynamic
33
What are small extremely fast storage locations directly accessible to the CPU?
Registers
34
Which organization managers request for comments RFCs
IETF Request for comments RFC‘s are managed by the Internet engineering task force (IETF) 
35
Which role sets that information security priorities and supports the mission of the organization
Business owner
36
Which of the following choices is also referred to as flash memory
Electronically erasable programmable read only memory(EEPROM)
37
Which method of media sanitation is performed the other local device interface, but could still potentially loud data recovery through other advanced recovery methods
Clear Clearing is done locally via the device interface (the operating system) . Data are not recoverable the other device in her face but I may be recoverable the advanced recovery methods
38
Which ISO information security standard focuses on best practices
27002
39
Electronic versions courseware from your favorite security training organization plays technology that limit your ability to add your own notes to the files. The files also incorporate a unique identifier that can assist in determining the source of copyrighted information having been pirated. What type of technology are they using
DRM Digital rights management is a sweet of technology designed to protect copyrighted digital media
40
All types of programmable read only memory are actually special cases of a more general sort of technology
Programmable logic device (PLD)
41
What I associate was formally known as ISO 17799
ISO 27002
42
What is the best way to remove data from right once read many (worm) media
Destruction
43
When comparing DRAM AND SRAM. Which of the following statements is true
Dram is slower than sram
44
What term describes writing data to an EEPPROM
flashing
45
What is the best method to secure lead astray data on a DVD – r
Destruction
46
What role crazy manager sensitive data
Data controller
47
What role is in charge of computer hardware and software design, plans, and updates
System owners
48
What is a set of memory addresses managed by the OS that do not correspond directly to physical memory
Virtual memory
49
What refers to the computer’s capability to execute instructions in parallel due to the usage multiple CPUs
Multi processing
50
Low level commands that a CPU knows how to execute and performs many operations per instructions
CISC
51
The RSA algorithm uses what kind of intractable problem as the basis of its crypto system
Factoring certain large integers into their two prime factors
52
Which of the following coordinates systems activities during execution of code
CPU control unit
53
What model deals with potential conflict of interested
Brewer nash
54
What is a real time alternative to using CRL
OCSP Online certificate status protocol
55
What term indicates the degrees of randomness
Entropy
56
Security model includes the no read up (simple security property) and no write down
Bell LaPadula
57
What security integrity model focuses on internal consistency, external consistency, will form transactions, separation of duties
Clark Wilson
58
Which of the following ensures that previously captured communications are not decrypted if a session key is comprised
Perfect forward secrecy
59
which of the following performs the calculations or operations based on programs calls
CPU arithmetic logic unit
60
Terms the deceives the CPUs ability to process more than one program at a time
Multitasking
61
What’s a cutie model includes no re-down and no right up Simples integrity
Biba
62
What is a common operating system protection that prevents one software application from affecting another software application if it crashes
Process isolation
63
What is the term for copying memory data to a bd from hard disk
Page fault
64
What is the terms when the OS Copies virtual memory from hard disk to main memory
Paging
65
What protocol do routers use to determine the path that should be taken by a packet
IP
66
When you see 1E4DB3 they’re dealing with which numbering system
Hex
67
What network storage technology does not allow block level access, abut allows reading/arriving entering files via a network
NAS
68
What wireless protocol supports 54 mbps st 5 ghz
803.11 a
69
What allows you to uniquely identify a complete connection among all other connections on the internet
A socket pair
70
Which layer of the OSI model connects to the ohsucial part of the network with the Abstract pair
Data link
71
Which layer of the OSI mod converts. It’s i to electric signals or light impulses for transmissions
Physical layer
72
Which VOIP protocol is an application layer protocol used for communication signaling
SIP
73
What technology separates a routers control plane from the data plane
Software defined networking
74
Data encapsulation and the protocol stack work on which of the following ways
Each protocol or service at each layer in the OSI models adds its own information to the data as it is passed down the protocol stack
75
Which of the following network devices blocks (ip) limited broadcast traffic by default
Router
76
What encryption method should be used to secure a wireless connection
WPA2
77
Which wireless technology leverages battery powered radios and it’s commonly used for building automation and control
Zigbee
78
What IPsec method offers integrity and authentication but not confidentiality
Ah Authentication header
79
Which wireless technology could be employees when there are concerns about significant electromagnetic interference
Li-fi
80
What authentication mechanism exposes the password in plain text
PAP Password authentication protocol
81
Which layer of the OSI model converts bitch into electrical signals or light impulses for transmission
Physical layer
82
Which of the following layers of the OSI model handles establishment maintenance of connections between systems
Session layer
83
Which protocol to Rellis used to Termine the path that should be taken by a packet
IP
84
Which network component should be used with there’s a concern about internal network sniffing
Switch
85
It is desire to have one layer to lan available on multiple switches in different countries so that each system can communicate directly using frames LA or two. What technology…
Vlan
86
What technology separates routers control plane from the data forwarding plane 
Software defined networking
87
Which of the following is hopeful that work patchable soon to that shows each of the notes on a path between the local machine and a destination
Traceroute
88
Which of the following is popular LAN based technology
Ethernet
89
Which plaintext VOIP IP protocol is frequently used to transfer audio or video data
RTP
90
What network storage technology does not allow black level access, but allows reading and writing entire files via network
NAS
91
What is the measure of the when the system will be available to begin processing recovery work before being put back into a normalized production mode
Recovery time objective
92
RTO
Also means when the hardware, software and infrastructure are capable to start doing any necessary recovery work required before operations are resumed properly
93
What is it called when the amount of data loss that is acceptable for a business function called?
RPO recovery point objective The dictates the amount of data that can be lost for a critical function
94
What is useful at protecting custom applications from common vulnerabilities (SQL injection, cross site scripting etc )
WAF | Web application firewall
95
What are the deployments available for WAF
Reverse proxy Server install Cloud hosted
96
What are WAF used for
Protection of an org public facing web apps
97
Can WAF be used to increase the security of off the shelf web app?
True
98
What is an IPS used for
Blocks traffic Rather than alerting, the IPS will block suspicious traffic Can have false pos which can be a self imposed DoS condition
99
Does a false positive on an IDS cause an availability issue?
No
100
What is the main emphasis of malware sandboxing?
Trying to render or execute files before passing the on, or personals providing a report after analysis
101
What prevents unknown/unlisted binaries from executing
application whitelisting
102
Antivirus software attempts to block what
Various forms of malware
103
What are some examples of malware
Virus Worms Trojan Spyware
104
What involves simply making use of data about adversaries to improve security operations
IOC | Indicators of compromise
105
Is an IDS a passive system?
Yes It sends alerts when malicious act is an occur
106
NIDS has three fundamental designs
Signature based Protocol Analysis Anomaly based
107
IDS Can operate in which two modes
Passive and active Passive sends alerts but does not stop the attack Active stops the attack usually be sending resets
108
Where does an IDS sit
On a network and sniffs traffic
109
RFCs
Request for comments
110
When are anomaly detection models used for
Small, well designed networks and in specific high risk cases It alerts on anomalous behavior and is prone to false positives when behavior changes
111
What monitoring focuses on data leaving the org, system or interface
Engross monitoring
112
Monitoring oncoming traffic to an org or target system
Ingress
113
What does SIEm stand for
Security information and event management
114
What’s does a SEIM do
To deal with the volume and ease analysis of all the security related information and audit logs, a SEIM will go through all the logs and detect adversary tactics and problems.
115
What builds a behavior oriented profile of activity for both users and systems
UEBA user and entity behavior analytics
116
What are some key monitoring tools?
IDS and SEIM
117
What type of logs can a SEIM Monitor
System/event logs Web server logs Firewall and proxy logs And etc
118
What can be employed to ensure integrity of data remains
Digital signature
119
By default do syslogs provide integrity features that can confirm authenticity of the logs
No it does not A third party utility like syslogw-NG does
120
Layer of OSI closest to the users and programs Layer 7 Identification of communication partners Determines security aspects of communication
Application layer
121
Layer 6 Provides representation of information to be processed by the application Provides translations services such as EBCDIC and ASCII Performs data encoding, compression and decompression
Presentation layer
122
``` Layer 5 Organizes communication Management of data exchange Maintains the session Allows half duplex and full duplex ```
Session layer
123
``` Layer 4 Optimizes network service usage Uniquely identifies end points Maintain communication integrity Error detection ```
Transportation layer
124
``` Layer 3 Provides network addressing Performs touring and flow control Establishes network connection Provides network path IPv4 ```
Network layer
125
Layer 2 Formats messages to allow for transfer of physical media Provides addressing for physical hardware Ethernet or MAC addresses
Data link layer
126
Layer 1 Provides mechanical and electric activation, maintenance and deactivation oh physical connections for transmissions Defines the ohh oak means of communication Determines requirements for signal transmission. Over physical medium
Physical layer
127
What may be used to provide layer 2 authentication
802.1x
128
What layer of the OSI model connects the physical part of the network with the abstract
Data link
129
What DNS security protocol typically leverages browsers as the DNS client and provides increased confidentiality of DNS requests?
DoH
130
What layer of the OSI model interacts with informs and prepares it to be transmitted across the network
Transport layer
131
Dedicated security mode, this is not one
Systems handle multiple classification. Levels
132
What is two phase commit
Distributed database architecture that ensures that no transactions are finalized until all connected systems have successfully synchronize
133
Non violate storage that prevents existing data from being overwritten
Worm
134
What function Verifies the security of system, resources and test the effectiveness of the controls implemented and helps determine where more controls might be needed
Auditing
135
Which technique do layer to switch his employee to speed up forwarding data across ports
Cut through
136
On what environment are updates to the OSPF protocol handled by the co trip plane rather than a routers data plane
Software defined networking
137
Created a rule in the IDS to prevent attack. Anatomist wants to verify it tower and machine is protected. What tool would they use?
Metasploit
138
191.10.1.1-191.10.11.255
Class b
139
Class b ip range
128.0.0.0 though 191.255.255.255
140
Who should write up the lessons learned?
The on-site handler
141
When smart cards replace passwords as authentication, to access a system what is now a problem?
Lost tokens
142
The minimum and customary practice of responsible protection of information assets is defined by what
Due care
143
What pen test activities would be effective in validating TEMPTEST effectiveness
Radiation monitoring
144
The CMMI targets what specific aspect of software development
Processes
145
What can be used by developers to proved additional protection Against buffer overflow’s
Canaries
146
What causes chrome to have many processes instances when there are multiple tabs open
Sandboxing Google uses sandboxing in it a chrome browser. Each tab is separate process, each sandboxes from each other
147
What is the strategy behind the BIA
Maximum allowable downtime
148
A NDA is used to enforce which part of a security program
Data classification
149
What is the downside of selecting twisted pair cabling with more twists per segment
Higher costs
150
What type of security testing would be most likely to be performed on a monthly basis by a security team
Vulnerability scanning
151
Application fuzzing is a form of what
Pen testing
152
How does Linux NX protect against buffer overflows attacks?
It marks pages of the stack as non executable
153
In a pen test, what is used to exploit services
Core impact
154
What is the advantage of a 200 gigabyte rainbow table over a 100 huge byte rainbow table covering the same key space
Faster password cracking
155
A web application is provided a redirect URL information it that the subject has been successfully authenticated. What is being used?
Openid | Openid provides claims about a user identity and authentication
156
What is the principal of SSO
Authentication
157
What does the VNC payload in an attack with Metasploit give the attacker
Remote GUI
158
When involved in the US legal proceedings under what condition is ESI considers non discoverable
If deleted as part of previously established business process
159
Which of the following is an approved replacement for Halon?
Fm 200
160
What is a hash
A one way mathematical function
161
How many bits are in an IPv6
128
162
Early sign of a DoS
A packet with source IP/port matching the destination IP/port
163
What is context based access control
When access to something in the network is unavailable or available depending on the time of day or week
164
What is likely to be treated as PII by both company policy and law
A document that contains names and addresses of customers
165
What is the first step to be accomplished in a preliminary legal investigation
Determine if a crime has occurred
166
How is the annualize loss expectancy calculated
Single loss expectancy times annualize rate of occurrence
167
A helpdesk ticket regarding slow server response is escalated for investigation. The assigned administrator determines at the activities due to the running of a legitimate business application and closes a ticket. What phase of incident response does this occur during?
Detection Terrifying weather event report activity is infected in certain happens during the detection face
168
The following statement can best be described as what type of secure documentation? All and user systems on the network must be protected at the host level against malware and unauthorized access attempts
Policy
169
How many bits is IPV4
32
170
Which protocol Heather would be shown in screen shot when it has resignation port 443
TCP
171
What are key TCP header fields
Source in destination ports flags and sequence number
172
What is a relaying party
The party that uses the login credentials when using open ID 
173
What is the main difference between a third-party audit and an internal audit
Objectivity
174
Which of the following access control techniques require the use her to follow a transformation procedure to access protected data
The Clark Wilson model introduces the concept of transformation procedure that defines how changes can be made to objects in the system
175
Which of the following can be used for distributed denial of service attack
Sending TCP packets with the SYN flags set
176
Which of the following describes the purpose of LDAP
A centralized repository for user in system resources on a network
177
Operational security change control is a process that manages changes to which of the following
Hardware, software Netwerk
178
What technology would help a business that streams movies to customers worldwide ensure consistent performance
Content distribution network
179
Antivirus Blocked an executable and sent a notice to a security vendor information management system. What kind of control does antivirus represent
Preventative
180
What standard was introduced by the IEEE to address the issue of authentication
802.1x
181
At which critical step in the system development process should a risk assessment be performed
Project initiation
182
What is a mandatory component of a single sign-on system
Centralize credential storage
183
All the following statement can best be described as what type of security documentation While the company strongly recommends again sending sensitive or confidential data via email the data owner may authorize this method of communication of the center uses company provided email Christian to transmit data
Guideline
184
Who ultimately has ownership of the business continuity plan in an enterprise
Chief executive officer It belongs to the business
185
Media sanitation instruction prevent
Object reuse
186
How are processing task carried out in asymmetrical multiprocessing system
System processes will run on one CPU and the other CPUs will run the applications
187
During which phase of the fetch decode execute cycle does the CPU determine what actions the instructions to take
Decode
188
Which software development Methodist driven by the possible failure of the software project to achieve stated goals
Spiral It is driven by risk
189
With respect to the data classification wall which of the following is a responsibility of the system on her
Assist in the identification implementation assessment Of the common security controls
190
Which of the following is not an advantage of a centralized access control administration
Flexibility
191
And organization maintains a plan for emergency response, employee communications, back up operations, and post disaster recovery that will ensure that availability of critical resources and procedures to return to full production an existing office facilities. What type of plan is being described
Business continuity plan
192
What is likely to be done at five through an assessment of core security processes
The root cause of security failures
193
A programmer received an application error message that a requested Record was being accessed by another process. The programmer is the only person with access to the test database. After Rebooting her computer, she was able to access the record. What caused the error message
Deadlock condition has been put in place
194
What is the meterpreter on the Metasploit framework 
A payload
195
Which component of an account a management process is most likely to limit an attack
Scheduling retiring of inactive accounts
196
What uses a NOP sled
Bidder overflow
197
Which of the following is used for day to day protection of business critical resources and controlling access to computer facilities
Operational controls
198
When making online purchases what can a user easily check to see if the Information they are going to submit will not be observed by eavesdroppers
Using websites with HTTPS
199
A system is built so there is redundancy, but there are no dedicated hard drives for data, back up or parity. What system Is this
RAID 5
200
What does NSlookup command do
See the host name and The IP address and DNS
201
Which software development methodology is not primary code centric
DEVOPS
202
Which of the following development phases would be closer to the end of the process
Installment and implementation
203
Which component of IPsec uses a verification function similar to signing an email with a digital signature
Authentication header
204
What is a benefit of using Kerberos for authentication
Password remain encrypted during transfer
205
Which of the following is most likely to result in shell access to a users workstation
Social engineering Not port scanning or not war dialing
206
What type of security testing is being performed when a programmer compiles an application with all warnings enabled
Static Analysis
207
A single disk in a RAID array fails and data is lost. What kind of RAID was this
0
208
During an incident in what phase should the decision be made to pull an affected system off the network?
Response
209
What is the total number of UDP PORTS that could be open on a system
65,536
210
What must be included for a success exploitation
Payload
211
What security model requires every user of the system and every object in the system to be assigned a security label and allow access based solely on these labels
Lattice
212
Which security document would contain technical details about how a specific application must be configured
Baseline
213
Determining an individual is who they claim to be
Authentication
214
Which topology used two rings for fault tolerance
FDDI
215
What part of the file contains Info about the user and App that created the file
Metadata
216
Security model focuses on confidentiality of info
Bell lapadula
217
Security cameras are what type of control
Compensating
218
What term is used for programs stored on read only memory devices
Firmware
219
Why is computer generated documentation usually considered non reliable evidence
Too difficult to detect prior mods
220
What indicates a server side attack
The attack is launched against a network service that is listening on the victim host 
221
What does the Advanced Encryption Standard AES, use s boxes for during the encryption process
Substitution
222
What part of security assessment does pair programming belong to?
Technical security testing
223
Regarding OS protection mechanisms which is false about the ring
Wearing allows users processes to interact with a kernel as peer processes
224
Which statement correctly describes a relevant consideration when defending against client-side versus server-side attacks
Client side are usually harder to defend against
225
MTD = what
RTO+wrt
226
How to protect trade secrets
Auditing file access and controlling copying of intellectual property
227
What is covered by an SLA
Vendors agreed response time to a system outage
228
Writing a company’s security policy is what type of control
Administrative
229
Access control model is primarily which type of control
Preventative
230
What problem was TEMPEST designed to encounter
Data leakage through Electromagnetic radiation
231
Which type of access control and pops all users having a clearance
MAC
232
What is a business continuity plan
And overarching plan includes A collection of other plans
233
What type of packages tracert Receive a reply that used to determine the route
Time exceed
234
Which plan provides procedures for minimal loss of life
Occupant emergency plan
235
What is the least important item to be capture an audit logs
System performance output data
236
And organization hired a third-party to contact monthly vulnerability assessment. In which phase of business continuity plan does this belong
Current state assessment
237
Which process will reveal a buffer overflow vulnerability in an application
Fuzzing
238
Which extensible authentication protocol method authenticate a client at the server but is not manually authenticate the server to the client
EAP-MD5
239
What is the goal of technical security testing
To remediate vulnerabilities
240
What part of the waterfall model ensures that a product meets the specifications
Verification
241
What are used to care for CrossSite scripting attack to be successful
The victims computer must execute a Malicious script
242
Increasing availability of a service components of the cheap by implementing which of the following
Fault tolerance
243
DNS is what
Protocol for translating IP address is to names and Back again 
244
What is a typical length of an extended unique identifier
64
245
What is a fundamental principle of the waterfall model
Each development phase must be completed before the next begins
246
Due to differing privacy laws between countries a company uses a separate never to handle and stores data in each country it operates in. What is this an example of an terms of risk handling methods
Mitigation
247
Security analyst sends a scan packet to a live host wire open ports on the same network segment but the packets receives no response. Which protocol is the analyst using
UDP
248
Which of the following is not a high-level single sign-on access method
Public kiosks
249
In the process of employee termination which access management Activity most effectively controls access
Account revocation
250
And what pieces does a router for network traffic
IP address
251
Which model has an explicit practice of sending unexpected input into applications for the development cycle
Microsoft threat modeling
252
Oh what will trigger false positives on network that uses anomaly detection
Behavior changes
253
What is recommended cable that will allow for 100 MBPSD data rate
Category 5
254
What statement about biometrics is not true
Users can be authenticated by what they know
255
What risk Estimation approach uses establish practices and calculations
Quantitative risk analysis
256
Which of the following is an example of context dependent access control
File system quota
257
How does water suppress fire
Reduces temperature
258
What passengers your accountability for your actions taken within a system or domain
User Identification and authentication
259
What must be configured for an incident responded to review successful and field login attempts
Accounting Accounting is a system ability to determine the actions of a single individual
260
What data classification role responsible retaining records as per approve policy
Data custodian
261
What needs to be done for FW2 to be able to take the pivot from you use a workstation to server SRv2
SW2 Must be on later to only and have the server in a different VLAN
262
What type of testing used tools to LA source code vulnerabilities
Static Analysis
263
What is a characteristic of a MAC address on a network interface card
Remains the same regardless of the location
264
What IPSEC of protocols provides integrity but Not encryption
AH
265
And attackers preach to companies perimeter and penetrated her system. She’s attempting to maintain her access using tools that are already installed on the system. She creates a job that opens a port on the system every night at midnight. Which of the following is most likely to detect the creation of attackers back door
Baseline monitoring
266
If an attacker wanted to run their own program in the colonel what attack with the use
Privileged escalation
267
What collision avoidance of those Internet use
CSMA/CD
268
Which type of fallen this off to discover through dynamic analysis
Authentication bypass
269
How can triple your help in the Recovery process
Determine which files in the system were compromised
270
Which of the following is a set of low level commands a CPU knows how to execute
CISC
271
Which of the following address is it gonna be claimed, proper authentication, and authorization with users across different organizations
SAML
272
What web vulnerability exploit say system at the database layer allowing attacker to create read modifier delete sensitive data
SQL injection
273
What date it would be most useful in a situation where someone’s credentials may have been compromised
Successful logins
274
What is not a Common OS mechanism
Paging Current OS protection mechanisms include layering, extraction, process isolation and hardware segmentation
275
A DBMS should possess a number of characteristics to be considered secure. One characteristic that it should always maintain a stable state even after hardware/software failure. What is this
Fault tolerant
276
A network bridge learns which systems reside on a network segment by building a table that consist of which of the following
MAC addresses
277
What should security procedures be based off of
Organizational policies
278
In the context of Clark Wilson model of data integrity, maintaining external consistency and chairs which of the following
The system state is consistent with the data outside the system
279
Where are hash passwords stored on A Linux system
/etc/shadow
280
Which task within the excess provision Lifecycle should take place one employee Changes apartments
Maintenance
281
What would most effectively be used to block a malicious ACK packet sent to pour it doesn’t matter initials SYN packet
Stateful firewall
282
What technique used by malicious it’s too overly one frame on top of another, thereby tricking the user to perform an action they did not intend
Click jacking
283
What do the UDP and TCP protocol Have in common
Operates at the transport layer
284
What encryption algorithm is not using single key Encryption
Diffie Hellman
285
What intra Company document helps an organization meets service commitments to customers
OLA
286
Frame-relay is simplified version of which of the following
X.25
287
What are sprinkler systems and allow large volumes of water to be released in a short period of time
Deluge
288
The concept of subject/program binding aside to which of the following security models
Clark Wilson
289
What is a common problem about my truck access controls
False acceptance rate
290
What is the key difference between an internal audit in an external audit
Testing team members
291
What rate level uses byte level parity
3
292
 After forensic investigator Caesars a computer drive time investigation what is the next step
Make a bit level image copy of the desks
293
After reviewing your file service catalog a system admin notice is there a know if it’s locked for any type of file access. What type of issue is this
Accountability
294
What type of control can automatically initiate creative control
Detective
295
What is the primary disadvantage of a VPN
Unpredictable performance
296
What is not a characteristic of a distributed system
Rigid
297
Why would a company provide employees from using client to cite VPNs
Three use reduces effectiveness of subnetwork monitoring devices
298
What is the purpose of a network protocol like radius and tacacs
Authenticate users on behalf of other services
299
What approach insures new users initially have no access to sensitive application information
Secure by default
300
What is the most crucial piece of developing access recovery plan
Management support
301
Which maturity level of the CMMI model is this offer process characterizes as ad hoc
Initial
302
What software testing method can be used against compile code with no access to source
Fuzzing
303
What is caused by applications that request in later and properly release resources
Memory leak
304
Company has restricted options in the user interface for us users, preventing them from opening command line interface. What type of control this
Preventative
305
Which entity provides formal authorization on a system access decisions
Data owner
306
Which metric should be considered in the purchase of preventative control
tco
307
The spiral model of project management is primarily driven by what factor
Risk
308
What has can an untrusted Java apple perform on a client machine when run from the browser
Make network connection to the original host
309
When talking about data classification rolls a custodian is concerned with all the following except what
Determine the datas value to the organization in the threshold be on which absolutely does purged
310
Which protocols describe his best effort protocol
UDP
311
A system admin find the unknown user account they have been created several months prior to discovery. What process should be improved and evil more timely medication of the future
Log monitoring
312
Which component of the operating system includes an interrupt handler that handles all request that are competing for system service
The kernel
313
Battling weather patterns requires a computer design to execute a small set of instructions for efficiently. What type of computer is best for this
RISC | Reduce instructions set computer
314
What is assumed with a trusted computing base (TCB)
System components are securely designed and configured
315
What is a phishing attack and I was it, they carried out
Danity theft scheme that takes place to email in a bogus website
316
What software is both gratis and libre 
Freeware
317
What is a symmetric key algorithm
Blowfish
318
What can be attacked with a rainbow table
Hash
319
What access control measures a directive
Background check
320
When planning for physical security threats how can I smoke detector help
 spell detetric and sense smoke by interference of light or ionization
321
What common network Troubleshooting told makes use of Internet control message protocol packets with particular time to live values
Traceroute
322
With regards to access controls what differentiates a passphrase from a password
Passphrase is typically longer and more difficult to get guess 
323
What tool would best be used to record and send to use his password of an Internet
Keylogger
324
What is considered a potential Vulnerability specifically for hardware based thin clients
Lack of timely patching
325
How can organization share a single document repository were each company retains control over his authentication credentials
FIM
326
What functionality do open ID and Saml provide
Open ID performance authentication, while SAML encodes authentication related information
327
Worms have the ability to Joe directly to which type of the attack process by tutoring payloads to high numbers of IP addresses
Exploit vulnerable services
328
Under open ID which of the following are sites that can use identity information from sites that are sources of identity information
Relaying parties