Test 2 - Quiz Review Flashcards Preview

IT 350 - Fundamentals of Data Security > Test 2 - Quiz Review > Flashcards

Flashcards in Test 2 - Quiz Review Deck (58)
Loading flashcards...
1
Q

A ________ firewall handles all traditional firewall functions (SPI, ACLs, etc.) as well as additional security functions such as antivirus filtering, spam filtering, application proxy filtering, and so forth.

A

unified threat management

2
Q

What is the SPI firewall rule for packets that only have their TCP ACK bits set but no other flags set?

A

pass the packet if it is part of a previously approved connection

3
Q

Application proxy firewalls can always examine application layer content.

A

True

4
Q

________ drop packets.

A

IPSs

5
Q

A ________ port number designates a specific application running on a server.

A

well-known

6
Q

What is the SPI firewall rule for packets that do not attempt to open connections?

A

pass the packet if it is part of a previously approved connection

7
Q

The combination of high safety and low cost makes SPI firewalls extremely popular.

A

True

8
Q

What type of filtering do IDSs do?

A

Deep-packet inspection

9
Q

________ firewalls always examine application messages in depth.

A

Application proxy

10
Q

A ________ is a persistent conversation between different programs on different computers.

A

connection

11
Q

You can quickly assess the general security posture of your Windows Vista PC by using the status check in the Windows Security Center.

A

True

12
Q

After access is granted to a network, many NACs continue to monitor network PCs.

A

True

13
Q

Computer recover software reports its physical location to a recovery company that works with the local police to recover the notebook.

A

False

14
Q

UNIX offers more directory and file permissions than Windows.

A

False

15
Q

A(n) ________ is a security weakness that makes a program vulnerable to attack.

A

vulnerability

16
Q

The Local Users and Groups snap-in is available on the ________ MMC.

A

Computer Management

17
Q

A(n) ________ is a program that takes advantage of a(n) ________.

A

exploit, vulnerability

18
Q

To how many accounts and groups can different permissions be applied in Windows?

A

almost an unlimited number

19
Q

Assigning security measures to individuals within groups is cheaper than assigning security measures to groups.

A

False

20
Q

To get to the super user account in UNIX, the administrator can use the RunAs command.

A

False

21
Q

In Internet Explorer, the Security tab controls the website’s pop-up blocker.

A

False

22
Q

Operating system account passwords provide limited protection.

A

True (lack of granularity)

23
Q

Testers have permissions on the ________.

A

Testing server

24
Q

________ is a VoIP service that currently offers free calling among its customers over the Internet and reduced-cost calling to and from Public Switched Telephone Network customers.

A

Skype

25
Q

Java applets are large Java programs.

A

False

26
Q

Cookies can be used to track users at a website.

A

True

27
Q

In IM, all messages pass through a ________ server.

A

Relay

28
Q

The prevention of sensitive information from being sent out of a company is called ________.

A

Extrusion prevention

29
Q

In a(n) ________ attack, information that a user enters is sent back to the user in a webpage.

A

XSS

30
Q

Accepting cookies is necessary to use many websites.

A

True

31
Q

A system using an array of drives increases reliability.

A

True

32
Q

With image backup, even if the entire hard drive is lost, its content can be restored onto the same machine or a different machine.

A

True

33
Q

Typically, having enough shadow backup space for a few days is sufficient.

A

True

34
Q

Backing up data to a second hard drive on a computer is more expensive than backup onto to magnetic tape.

A

True

35
Q

Full backups are ________.

A

A. performed on all files and directories
B. slow
C. typically done weekly

36
Q

Mesh backup is where client PCs in an organization back up each other.

A

True

37
Q

Policies should not require that backup data be encrypted.

A

True

38
Q

Regarding retention policies, firms need to ________.

A

implement strong and clear backup policies. That’s it.

39
Q

Optical disks can safely hold data for decades.

A

False

40
Q

Properly hardened hosts and securely coded applications can help protect data while it is processed.

A

True

41
Q

Which of the following database events should be regularly audited?

A

A. warnings and exceptions
B. special access and logins
C. changes

42
Q

Changing the default listening port is an effective way of discouraging attackers from accessing the database.

A

True

43
Q

DDL triggers are used to ________.

A

Neither maliciously attack databases nor produce automatic responses if the data of the database has been altered

44
Q

DRM restricts what people can do with sensitive material.

A

True

45
Q

Databases are ________.

A

Both integrated collections of data and integrated collections of metadata

46
Q

Courts will often admit unreliable evidence if judges believe that juries can be trusted to evaluate it properly.

A

False

47
Q

If a defendant has already been prosecuted in a criminal trial, he or she cannot later be tried in a civil trial.

A

False

48
Q

Mens Rea usually is important in ________ trials.

A

Criminal

49
Q
Which of the following is not one of the three levels of U.S. federal courts?
  A. U.S. State Courts 	
  B. U.S. District Courts 	
  C. U.S. Circuit Courts of Appeal 	
  D. The U.S. Supreme Court
A

A. U.S. State Courts

50
Q

________ investigate(s) most violations of local and state computer laws.

A

Local police

51
Q

When a system runs out of storage space, ________.

A

the IDS will start a new log file

52
Q

With CDP, the backup site already has the proper equipment, and data and recovery is instantaneous.

A

True

53
Q

Total software reinstallation effectively addresses data loss.

A

False

54
Q

The business continuity team should be headed by ________.

A

A senior business manager.

55
Q

________ specify how a company will maintain or restore core business operations after disasters.

A

Business Continuity Plans

56
Q

How does the availability heuristic work?

A

The availability heuristic works by making people more prone to believing an event is more likely to happen if their memories of the class of event are easy to access. Memories of a class of event are easier to access the more vivid they are.

57
Q

The framing effect means that individual’s choices are affected by whether the a trade-off is presented as a loss or a gain.

A

True

58
Q

In prospect theory, how do people react to potential gains and losses?

A

In prospect theory, people are more likely to choose a certain gain over a theoretical greater one, and more likely to choose a theoretical greater loss over a certain one.