Test Study 7 Flashcards

1
Q

What provides fundamental knowledge and definitions?

A

Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What provides tactical knowledge necessary for a job or task?

A

Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What imparts sensitivity or importance to a topic?

A

Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What incorporates people into the culture of the organization?

A

Indoctrination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What form of learning should be used if the person has no experience with the tools or job?

A

Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What form of learning should be used if the person has experience in similar positions or with similar tools?

A

Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What form of learning should be used if the person isn’t working well within the organization?

A

Indoctrination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is COBIT?

A

A risk management framework initially conceived to assist with financial and IT auditing, from ISACA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which risk management framework was initially conceived to assist with financial and IT auditing?

A

COBIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DEP?

A

Data Execution Prevention

Monitors programs to ensure they are using system memory safely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ASLR?

A

Address space layout randomization
Randomly arranges the address space of key data areas to make it more difficult to exploit memory corruption vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some protections against memory exploits?

A

DEP and ASLR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A rogue network has been created, but has no access point. What mode is it in?

A

Ad Hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A rogue network has been created and it has an access point. What mode is it in?

A

Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the CATs and their speeds?

A
Cat 3 - voice grade, 10 Mb/s
Cat 4 - 16 Mb/s, token ring
Cat 5e - 1Gb / 1000BASE-T, 100m
Cat 6 - 10 GB / 10 GBASE-T, 55m
Cat 7 - 10 GB / 10 GBASE-T, 100M or 100 GBASE-T 50m
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which CAT cable minimum should function at 10 Gb/s at 60m?

A

CAT 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which CAT cable was primarily used in token ring?

A

CAT 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which CAT cable minimum should carry 10 Gb/s for 30m?

A

Cat 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the dynamic, well known, and registered port ranges?

A

Well known - 0 to 1023
Registered - 1024 to 49151
Dynamic - Else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the name of the port range that services like LDAP and FTP live on?

A

Well known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the name of the port range that might contain a service like RDP?

A

Registered

22
Q

What is the name of a port range that applications may used randomly?

A

Dynamic

23
Q

What is the KDC in kerberos?

A

Key distribution server, focal point of authentication, must be protected.

24
Q

What is the most important part of kerberos to protect?

A

KDC

25
Q

What authentication method can be disturbed by bad NTP?

A

Kerberos

26
Q

What is code coverage?

A

Percentage of source code evaluated.

27
Q

What is function coverage?

A

Evaluation of the subroutines

28
Q

What is statement coverage?

A

Evaluating each line of executable code.

29
Q

What is branch coverage?

A

Evaluating if and case statements.

30
Q

What is condition coverage?

A

Evaluating true/false statements.

31
Q

What type of code review is the percentage of source code evaluated?

A

Code coverage.

32
Q

What type of code review is the evaluation of subroutines?

A

Function coverage

33
Q

What type of code review is reviewing each line of executable code?

A

Statement coverage

34
Q

What type of code review is evaluating if and case statements?

A

Branch coverage

35
Q

What type of code review is evaluating boolean operators?

A

Condition coverage.

36
Q

What are the principles of COBIT?

A
Meet the needs of the stakeholder
Cover the entirety of the project
Apply a single integrated framework
Enable a holistic approach
Separate governance from management
37
Q

What is real evidence?

A

Tangible, may be seen or touched

38
Q

What kind of evidence may be seen or touched?

A

Real

39
Q

What is direct evidence?

A

Evidence that provides a validation of a fact

40
Q

What evidence provides a validation of a fact?

A

Direct

41
Q

What does a grand jury require?

A

Probable Cause

42
Q

What type of hearing requires only probable cause?

A

Grand Jury / Indictment

43
Q

What is ECB?

A

Electronic code book
DES block cipher mode that is simple and fast, but predictable.
Works best for small files.
Lacks diffusion.

44
Q

What type of fast encryption would work best for small files?

A

ECB

45
Q

What part of a system does port filtering protect?

A

Applications

46
Q

What part of a system does address filtering protect?

A

Host

47
Q

What type of network filtering protects a host?

A

Address ranges or address filtering

48
Q

What type of network filtering protects applications?

A

Port

49
Q

What is the TCP header?

A

6

50
Q

What protocol has a header of 6

A

TCP

51
Q

What are the TCP/IP layers?

A

Network Access / Link
Internet
Host to Host / Transport
Application Layer / Process

52
Q

Which is the ‘bottom’ TCP/IP layer?

A

Network Access