Unit 2 Test Bullshit Flashcards

(153 cards)

1
Q

What is hashing?

A

Transforming any key or string of values into another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who created Message Digest 5 (MD5) and what value does it create?

A

Ron Rivest and it produces a 128-bit hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the variants of Secure Hash Algorithm SHA?

A

SHA-224 (224 bit)
SHA-256 (256 bit)
SHA-384 (384 bit)
SHA-512 (512 bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is salting?

A

Salting adds another layer of security to hashing by allowing the owner to choose a string before hashing starts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(HMAC) is used for what?

A

Providing a key input to a hash algorithm to make it more secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do digital signatures provide?

A

used to determine if someone edits a document after the user signs it, check the authenticity of a message, digital document, or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a digital certificate?

A

Enables users and orgs to exchange information securely over the internet.
Equivalent to an electronic passport.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hash functions are ______________ functions. It is computationally infeasible for two different sets of data to come up with the same output.

A

one-way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity ensures that data remains unchanged and __________________ by anyone or anything over its entire life cycle.

A

trustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Because a hash value changes every time data is changed, cryptographic hash values are often called digital ___________________________.

A

fingerprints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hashing is relatively easy to compute and equally easy to reverse.
T or F

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptographic hash functions have the following properties:

A

a.
The output has a fixed length.

b.
Two different input values will almost never result in the same hash values.

f.
The input can be any length.

g.
The hash function is one way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An 8-bit checksum calculates the hash by converting the message into ____________________ numbers

A

binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The 8-bit checksum 2’s complement converts a binary to its opposite value, and then it adds ___________

A

one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What malware compromised the security of MD5 in 2012?

A

Flame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SHA is short for what?

A

secure hash algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MD5 is short for what?

A

message digest 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What Cisco command verifies the integrity of IOS images used on Cisco routers?

A

verify / md5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hashing is vulnerable to ______________________ attacks and does not provide security to transmitted data.

A

man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A _________________________ attack attempts every possible combination of characters up to a given length.

A

brute-force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A _______________________ attack uses a file containing common words, phrases, and passwords.

A

dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___________________ creates a different hash result for two users who have the same password.

A

salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A ____________________ table stores the pre-computed hashes of passwords in a password dictionary along with the corresponding password.

A

lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CSPRNGs generate a random number that has a high level of randomness and is completely unpredictable, so it is cryptographically secure.
T or F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
VPNs using IPsec rely on HMAC functions to authenticate the origin of every packet and provide data integrity checking. t or f
True
26
A(n) ______________ trail tracks an electronic document’s history for regulatory and legal defense purposes.
audit
27
_________________________ is a way to ensure that the sender of an electronic message or electronic document cannot deny having sent the message or document and that the recipient cannot deny having received the message or document.
Non-repudiation
28
______________________ cryptography is the basis for digital signatures.
asymmetric
29
_____________________________________________________(PKI) is the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificates.
public key infrastructure
30
A bank clerk has exceeded a predetermined number of record modifications within a specific period of time block. Their manager must then flag the record as legitimate (or not). This is an example of what Data Field Validation Control?
maximum record modification trigger
31
System locks from unusual activity indicate what Data Field Validation Control?
unusual activity trigger
32
Data field validation via input ______________ prevents users from entering invalid data or help ensure that they enter data consistently.
masks
33
What data integrity constraints matches these descriptions? a. All rows must have a unique identifier called a Primary Key b. All data stored in a column must follow the same format and definition. c. A set of rules defined by a user which does not belong to one of the other categories d. Table relationships must remain consistent
a. Entity Integrity b. Domain Integrity c. User-defined Integrity d. Referential Integrity
34
_________________ in a database signifies missing or unknown values.
null
35
NIST developed a "best practices" for Business Continuity. Place these steps in the proper order as presented in our reading (and from NIST): ``` Develop recovery strategies Develop the contingency plan Identify preventive controls Calculate risk Conduct the business impact analysis Maintain the plan Develop the policy statement Test the plan ```
``` 1. Develop the policy statement 2. Conduct the business impact analysis 3. Calculate risk 4. Identify preventive controls 5. Develop recovery strategies 6. Develop the contingency plan 7. Test the plan 8. Maintain the plan ```
36
In regards to IT disaster recovery, preventative controls include keeping data backed up, keeping data backups off-site, using ____________________, or installing generators.
surge protectors
37
In regards to IT disaster recovery, Detective controls include using up-to-date _______________ software.
antivirus
38
An organization's DRP restores mission critical systems first. T or f
True
39
What are strikes and walkouts considered? (event
Labor events
40
What are vandalism, protests, sabotage ,terrorism, and war considered? (events
Social-political events
41
__________________ is a Cisco IOS technology that provides statistics on packets flowing through a Cisco router or multilayer switch.
NetFlow
42
An IPS device operates in __________________ mode.
inline
43
CSIRT is the acronym for what term?
computer security incident response team
44
______________________ is the methods and configurations used to make a system or network tolerant of failure.
resiliency
45
The ability of a network to dynamically recover from the failure of a device acting as a default gateway is known as ________________ redundancy.
first-hop
46
The _______________________________ is typically the router that provides devices access to the rest of the network or to the Internet. If there is only one router serving in this role, it is a single point of failure.
default gateway
47
_________________________ Protocol prevents loops on a network when switches interconnect via multiple paths.
Spanning tree
48
With RAID: _____[a]_____ detects data errors. _____[b]_____ writes data across multiple drives. _____[c]_____ stores duplicate data on a second drive.
parity striping mirroring
49
What is the minimum number of disks in a RAID 0+1 ?
2
50
What is the minimum number of disks in a RAID 1 ?
3
51
A car has four tires and a spare tire in the trunk in case of a flat. This is a comparative example of ____________ Redundancy
N + 1
52
If an organization implements complex systems that are hard to understand and troubleshoot, it may actually backfire. What type of defense best alleviates this issue?
Simplicity
53
Concealing certain types of information makes it more difficult for cyber criminals to attack a system. This would be considered what type of defense?
Obscurity
54
To accomplish a goal of _____________________, organizations can use security products manufactured by different companies for multifactor authentication.
Diversity
55
Employees in the the shipping department do not need access to marketing presentations to perform their jobs. This is an example of what defense?
Limiting
56
An organization stores its confidential documents on a server in a building surrounded by an electronic fence. This is an example of what defense?
Layering
57
Mitigation involves reducing the _____[a]_____ of the loss or the likelihood of the loss from occurring
Severity
58
Many technical controls mitigate risk including authentication systems, _____[b]_____, and firewalls.
file permissions
59
The ___________________ Corporation maintains the CVE List and its public website.
MITRE
60
When discussing asset and systems standardization, COTS is short for what?
commercial off-the-shelf
61
Asset management manages the __________________ and inventory of technology assets including devices and software.
lifecycle
62
_____[a]_____ management includes a complete inventory of hardware and software. This means that the organization needs to know all of components that can be subject to _____[b]_____ risks.
Asset Security
63
Fault _____________________ enables a system to continue operating if one or more components fail.
Tolerance
64
What environment corresponds to these high availability requirements? Maintain high availability for continuous trading, compliance, and customer trust Require high availability to provide around-the-clock care for patients Provide security and services to a community, state, or nation Efficient supply chains and the delivery of products to customers Communicate information on events as they happen
Finance industry healthcare facilities public safety industry retail industry news media industry
65
Five nines mean that systems and services are available _________________ % of the time.
99.999
66
With the Five Nines, ensuring high availability includes eliminating ________[a]_________ of failure, designing for reliability, and detecting _____[b]_____ as they occur.
a. single points | b. failures
67
List one component of a perimeter security system (as discussed in our reading):
Bollard (blocks cars)
68
implement VoIP security by encrypting voice message packets to protect against _____________________.
eavesdropping
69
Many DoS attacks use ICMP as part of the attack | T or F
True
70
Attackers can target DNS servers in order to deny access to network resources or redirect traffic to ________________ websites
rogue
71
A port ____________________________ is an application that probes a device for open ports by sending a message to each port and waiting for a response.
scanner
72
IEEE 802.__________ is now the industry standard for securing WLANs.
802.11g
73
Port security on these devices limits the number of valid MAC addresses allowed on a port.
switches
74
Threats to these devices include attacks against network protocols like ARP/STP.
switches
75
Threats to these devices include attacks against network protocols like RIP/OSPF.
routers
76
The ______________________ Operation Center (SOC) is a dedicated site that monitors, assesses, and defends the organization’s information systems such as websites, applications, databases, data centers, networks, servers, and user systems.
security
77
The _________________ Operation Center (NOC) is one or more locations containing the tools that provide administrators with a detailed status of the organization’s network.
network
78
Hardware-monitoring systems have become an essential security countermeasure T or f
True
79
Hardware monitoring systems are used to monitor the health of these systems and to minimize server and application ________________.
Downtime
80
Commercial HVAC systems and other building management systems now connect to the Internet for remote monitoring and control. These systems are often called "__________________ systems"
smart
81
Power degradation includes ______________, which are prolonged low voltage issues
brownout
82
Power degradation includes ___________________ current, which is an initial surge of power
inrush
83
A(n) _____[a]_____ log tracks user authentication attempts. A(n) _____[b]_____ log provides all of the details on requests for specific files on a system
a. audit | b. access
84
In all versions of Windows except Home edition, enter _______________ at the Run command to open the Local Security Policy tool.
secpol.msc
85
An account _________________ Policy locks a computer for a configured duration when too many incorrect login attempts occur.
lockout
86
When a computer is not part of an Active Directory domain, the user configures policies through Windows _______________ Security Policy.
local
87
Best practices for securing privileged accounts includes establishing a process for ______________________ of rights when employees leave or change jobs
revocation
88
Best practices for securing privileged accounts includes implementing a _________________ between the end-user and sensitive assets to limit network exposure to malware
gateway
89
Privileged accounts have the credentials to gain access to systems and they provide _____________________, unrestricted access.
Elevated
90
A simple method that many administrators use to help secure the network from unauthorized access is to disable all unused ________________ on a switch.
ports
91
Telnet is an older protocol that uses unsecure _____[a]_____ transmission of both the login authentication. Secure Shell (SSH) is a protocol that provides a secure _____[b]_____ management connection to a remote device.
a. Plaintext | b. Encrypted
92
SSH uses what TCP port?
22
93
Telnet uses what TCP port?
23
94
Remote Desktop used which port number (by default)?
3389
95
Remote ____________________ allows technicians to assist customers with problems from a remote location.
Assistance
96
Higher frequency RFID systems have a faster data transfer rate and shorter read ranges. T or F
False
97
Higher frequency RFID systems are more sensitive to radio wave interference. T or F
True
98
_________________________________ identification (RFID) uses radio waves to identify and track objects.
radio frequency
99
RFID tags contain an integrated circuit that connects to an ______________.
antenna
100
Using GPS to locate a cell phone without the user’s permission is legal.
false
101
GPS tracking can pinpoint a location within __________________ meters.
100 meters
102
A ________________________ lock uses buttons that a user presses in a given sequence to open the door.
cipher
103
Many portable devices and expensive computer monitors have a special steel bracket security slot built in to use in conjunction with __________________________.
cable locks
104
Disk _____________________ copies the contents of the computer’s hard disk to an image file.
cloning
105
With ________________, any applications installed or files saved are lost when the system restarts.
deep freezing
106
Always _________________________ backups to ensure the integrity of the data.
validate
107
Before using BitLocker, a user needs to enable Trusted Platform Module (TPM) in the BIOS. The TPM is a specialized chip installed on the ________________________________.
motherboard
108
A user can also choose to encrypt an entire hard drive in Windows using a feature called ______________________________.
BitLocker
109
With EFS, only the user that encrypted the data will be able to access the encrypted files or folders.
True
110
According to the Principle of ______________________________, users should be limited to only the resources they need on a computer system or on a network.
Least Privilege
111
Will these actions keep permissions or inherit new ones? Data moved to the same volume Data copied to the same volume Data moved to a different volume Data copied to a different volume
Moved to same/keep copied to save/new moved to diff/new copied to diff/new
112
To prevent rouge access points, the computer industry developed ____________________ authentication, also called two-way authentication
mutual
113
With WPA-PSK, the PSK is short for what?
pre-shared key
114
A significant security improvement from WPA to WPA2 was the mandatory use of AES _________________
algorithms
115
AES superseded TKIP for even key management and encryption protection. T or F
True
116
Mobile devices transmit data using ________________ signals that any device with a compatible antenna can receive.
radio
117
Remote-access users must have a VPN ___________________ installed on their computers to form a secure connection with the corporate private network.
client
118
Manufacturers may combine patches and upgrades into a comprehensive update application called a _______________________.
service pack
119
___________________________________________________ assesses missing security updates and security misconfigurations in Microsoft Windows.
Microsoft baseline security analyzer
120
MBSA checks blank, _______________________, or non-existent passwords
simple
121
An administrator hardens an operating system by modifying the default _____[a]_____ to make it more secure to outside threats. This process includes the removal of unnecessary programs and _____[b]_____.
a. configuration | b. services
122
Device hardening involves implementing proven methods of physically securing network devices.
True
123
A job site _________________________ is a job search site that gathers listings from other job board and company career sites and displays them in a single location.
aggregator
124
The _________________________________________ is the top information security officer reporting to the CIO. The CISO is a business manager first, technologist second.
chief information security officer
125
Kali _______________ incorporates more than 300 penetration testing and security auditing programs.
Linux
126
"Kali Linux is an open source project that is maintained and funded by _______________________, a provider of world-class information security training and penetration testing services."
offensive security
127
Pen testing is the same as vulnerability testing. t or f
False Pen testing is done by humans to determine the degree to which a malicious attacker can gain unauthorized access to your assets. A vulnerability scan is typically automated.
128
A vulnerability scanner looks for the following types of vulnerabilities: Use of _____[a]_____ passwords or common passwords Missing patches Open _____[b]_____ Misconfiguration of operating systems and software _____[c]_____ IP addresses
a. default b. ports c. active
129
The Advanced Cyber Security Center (ACSC) is a _____[a]_____ organization that brings together industry, academia, and government to address advanced cyber threats. The organization shares information on cyber threats, engages in cybersecurity research and development, and creates _____[b]_____ programs to promote the cybersecurity profession.
a. non-profit | b. education
130
"The ISC was created in 2001 following the successful detection, analysis, and widespread warning of the ______________ worm.
Li0n
131
The Internet Storm Center (ISC) gathers millions of _____________________ from intrusion detection systems every day using sensors covering 500,000 IP addresses in over 50 countries.
log entries
132
CERT (in regards to SEI) stands for what?
Computer emergency response team
133
The CERT Division of SEI studies and solves problems in the cybersecurity arena including security vulnerabilities in _____[a]_____ products, changes in _____[b]_____ systems, and training to help improve cybersecurity.
a. software | b. networked
134
SCAP is a method for using specific standards to automate vulnerability management, measurement, and policy compliance evaluation. t or F
True
135
The ________________________________________________________ is a U.S. government repository of standards-based vulnerability management data that uses SCAP.
National vulnerability database
136
The NVD uses the Common Vulnerability ________________ System to assess the impact of vulnerabilities.
scoring
137
SCAP is the acronym for what?
security content automation protocol
138
The Convention on Cybercrime is also known as the _______________________________________________________
Budapest convention on cybercrime
139
A _________________________________________________ (or PIA) ensures that personally identifiable information (PII) is properly handled throughout an organization.
privacy impact assessment
140
Computer Fraud and Abuse Act was created in 1986 | t of f
true
141
The Computer Fraud and Abuse Act (CFAA) makes it a crime to knowingly access a computer considered either a government computer or a computer used in interstate _________________, without permission.
commerce
142
What are the primary sources of laws and regulations in the United States?
statutory/written laws common/established by court administrative/government agencies
143
"BJA provides leadership and services in ____________________ administration and criminal justice policy development to support local, state, and tribal law enforcement in achieving safer communities."
grant
144
The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical ______________________________."
infrastructure
145
The Software & Information Industry Association is the principal trade association for the software and digital content industry. SIIA provides global services in government relations, business development, corporate education and ____________________________ protection to the leading companies that are setting the pace for the digital age."
intellectual property
146
"The mission of the Internet Crime Complaint Center is to provide the public with a reliable and convenient _______________________ mechanism to submit information to the Federal Bureau of Investigation concerning suspected Internet-facilitated criminal activity and to develop effective alliances with law enforcement and industry partners."
reporting
147
"NW3C provides a nationwide support system for ___________________________ and regulatory agencies involved in the prevention, investigation and prosecution of economic and high-tech crime."
law enforcement
148
A computer may be involved in a cybercrime in different ways (per our reading).
computer-targeted/ targeted computer-incidental/information like customer lists for traffickers computer-assisted/used as a tool
149
An open lobby that allows a visitor to walk straight through to the inside facilities represent what kind of common threat?
physical facilities
150
Malware represents what kind of common threat?
devices
151
A misconfigured firewall represents what kind of common threat?
LAN
152
Software as a service (SaaS) is a subscription-based model that provides access to software that is centrally hosted and accessed by users via a _____[a]_____. Platform as a service (PaaS) provides a platform that allows an organization to develop, run, and manage its _____[b]_____ on the service’s hardware using tools that the service provides. Infrastructure as a service (IaaS) provides _____[c]_____ computing resources such as hardware, software, servers, storage and other infrastructure components over the Internet. Note: no partial credit given
a. web browser b. applications c. virtualized
153
Data theft by users can cost organizations financially resulting in damage to an organization’s _____[a]_____ or posing a legal _____[b]_____ associated with disclosure of sensitive information.
a. reputation | b. liability