Wiley_08072017 Flashcards
(100 cards)
This is necessary to obtain a Search Warrant
PROBABLE CAUSE
ISC Code of Ethics:
- Protect society, the commonwealth, and the infrastructure.
- Act honorably, honestly, justly, responsibly, and legally.
- Provide diligent and competent service to principals.
- Advance and protect the profession.
Prudent Man Rule is from what guideline?
The Federal Sentencing Guidelines formalized the prudent man rule and applied it to information security
Christopher would like to send Renee a message using asymmetric encryption. What key should he use to encrypt the message? Renee’s public key is used to encrypt the message.
The sender of a message uses the recipient’s public key to encrypt it.
This is generated by the difference in power between the hot and ground wires of a power source or operating electrical equipment
Common mode noise
A Security Label protects against
Tampering
Warm Sites take ___ hours to recover
12
Packet Switching has ______ delays.
Circuit Switching has _______ delays.
Packet = Variable Delays
Circuit = Fixed Delays
Replaced SSL
TLS
_______ _________ mechanisms are set in place to establish a means of verifying the correctness of detection systems and sensors
Secondary verification
Audit Report Requirements:
purpose
scope
results
A ______ is created through the assignment of an IP address and a subnet mask.
subnet
________ connects disparate networks rather than creating network segments
Router
Routers only manage traffic between ______
subnets
_________ is a networking device that can be used to create digital network segments (i.e., VLANs) that can be altered as needed by adjusting the settings internal to the device rather than on end-point devices
Switch
Spoofing Countermeasures
SPOOFING Countermeasures:
Patching
Source/Destination Verification on Routers
IDS
CPU _________ are the fastest form of memory..
registers
______ is a subset of sampling, which is a process of extracting data from a large body of information but with a specified cut-off point or threshold
Clipping
IDSs can detect attacks from:
1) external connection attempts,
2) execution of malicious code,
3) unauthorized access attempts to controlled objects.
The document Ethics and the Internet was issued as RFC 1087 by the ____ ____ ____
Internet Advisory Board
CESAR Cipher is a ________ CIPHER
SUBSTITUTION
Block Cipher: Operate on __________and apply the encryption algorithm to the __________message block.
CHUNKS, ENTIRE
Used by most modern encryption algorithms used BLOCK.
Substitution Cipher: Replace with a different ________.
Character
Stream Ciphers: Operate on ____ bit or character at a time.
ONE