08092017_Wiley_Test2 Flashcards

1
Q

Trademark can be renewed for ____ years

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Best intellectual property protection ..

A

Trade Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many rounds of encryption for DES

A

DES uses 16 rounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Waterfall allow you to return the last previous ____

A

State

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3DES effective key length

A

168bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What uses passwords for a challenge-response mechanism to create a one-time password

A

Asynchronous One Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disaster ________involves restoring a business facility and environment to a workable state

A

restoration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ________ evidence rule states that when an agreement between parties is put into written form, the written document is assumed to contain all the terms of the agreement and no verbal agreements may modify the written agreement

A

parol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ _____ ____viruses infect the system’s boot sector and load when the system is started

A

Master boot record (MBR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__________ espionage is usually considered a business attack

A

Industrial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Agile ________ says that you should build projects around motivated individuals and give them the support they need

A

Manifesto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A custodian is someone who has been assigned to or delegated the _____ to _____responsibility of proper storage and protection of objects.

A

day-to-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_________ tests are similar to the structured walk-throughs. In this test, disaster recovery team members are presented with a scenario and asked to develop an appropriate response

A

Simulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Systems are usually disconnected from the network during the _______ and _______process

A

isolation and recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RESTORATION phase of incident response includes these steps:

A

Restoring backup data

Rebuilding compromised systems

Supplementing existing security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____________ XORs the plain text with a separate subkey before the first round of encryption. Used in TWOFISH

A

Prewhitening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The US Geological Survey provides detailed _________ risk data for locations in the United States

A

earthquake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

__________ occurs when a person presents him- or herself as another user, typically to gain access to unauthorized information or processes.

A

Masquerading. Keyword is UNAUTHORIZED.

THis includes physical access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Loss expectancies are a measure of impact and are calculated during the ______ assessment phase

A

IMPACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You are concerned about the risk that a tornado poses to your corporate headquarters in Indiana. The building itself is valued at $10 million. After consulting with the National Weather Service, you determine that there is a 2 percent likelihood that a tornado will strike over the course of a year. You hired a team of architects and engineers who determined that the average tornado would destroy approximately 25 percent of the building. What is the annualized loss expectancy (ALE)?

A

The ALE is computed by multiplying the SLE ($2,500,000) by the annualized rate of occurrence (2%) to get $50,000.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A ______ access control model is based on job functions such as a sales person or a sales manager, and it groups users into roles. .

A

role-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A ______access control model is an identity-based access control model. This is also OWNER based

A

discretionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A ________access control model is based on rules within an ACL

A

rule-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A ______ access control model uses assigned labels to identify access.

A

mandatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The _____ ______process provides an organized framework within which users can request modifications, managers can conduct cost/benefit analysis, and developers can prioritize tasks.

A

request control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

S/MIME supports these symmetric encryption algorithms.

A

RC2,
RSA,
DES and 3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The ________ phase includes the restoration of the normal business operations of an organization

A

CLOSURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the Incident response steps

A
Response
Mitigation
Reporting
Recovery
Remediation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

_________extended infrastructure mode exists when a wireless network is designed to support a large physical environment through the use of a single SSID but numerous access points

A

Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Phil Zimmerman’s Pretty Good Privacy (PGP) package relies on the construction of a _____ of ___between system users.

A

web of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which BCP (business continuity plan) task requires that you create a comprehensive list of business processes?

A

Criticality prioritization OR Priority Identification task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What organization created the Ten Commandments of Computer Ethics

A

Computer Ethics Institute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

_____-______ access control is focused on the internal data of each field

A

Content-dependent

A database view is a content-dependent control. A
view retrieves specifi c columns from one or more tables, creating a virtual table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The following items are critical pieces of information in the chain of evidence?

A

General description of the evidence
.
Name of the person collecting the evidence

Time and date the evidence was collected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What cryptographic goal does the challenge-response protocol support?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What type of access control system is deployed to physically deter unwanted or unauthorized activity and access?

A

Preventive access control is deployed to stop unwanted or unauthorized activity from occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What database security feature uses a locking mechanism to prevent simultaneous edits of cells?

A

Concurrency

38
Q

Christopher would like to send Renee a message using a digital signature. What key should he use to create the digital signature?

A

Christopher’s private key

39
Q

Tunneling prevents security control devices from __________ the actual content of the transmitted data.

A

inspecting

40
Q

When audit trails legally prove accountability, then you also reap the benefit of ________.

A

nonrepudiation

41
Q

Which one of the following is not a required component of a digital certificate?

A

Serial number

Validity period

X.509 version

42
Q

Process __________ allows a process to read from and write to only certain memory locations and resources.

A

confinement

43
Q

annualized loss expectancy FORMULA

A

Asset value * exposure factor * annualized rate of occurrence

ALE = AV x EF x ARO

44
Q

What term describes the processor mode used to run the system tools used by administrators seeking to make configuration changes to a machine?

A

USER MODE

All user applications, regardless of the security permissions assigned to the user, execute in user mode. Supervisory mode, kernel mode, and privileged mode are all terms that describe the mode used by the processor to execute instructions that originate from the operating system.

45
Q

Role-based access control restricts access to roles by grouping _________ (such as users).

A

SUBJECTS

Role-based access control restricts access to roles by grouping subjects (such as users). Groups are assigned privileges but privileges aren’t grouped in roles. Programs aren’t grouped in roles. Objects such as files are often grouped within folders, but objects are not assigned as roles.

46
Q

What attack involves an interruptive malicious user positioned between a client and server attempting to TAKE OVER?

A

HIJACK

47
Q

This attack is the abundance of unsolicited messages arriving to the extent it prevents legitimate activity.

A

Denial of service

48
Q

Malicious code or instruction as part of program input

A

Buffer-overflow

49
Q

What technique may be used if an individual wants to prove knowledge of a fact to another individual without revealing the fact itself?

A

Zero-knowledge

50
Q

__________ proof confirm that an individual possesses certain factual knowledge without revealing the knowledge.

A

Zero-knowledge

51
Q

Tunneling is an _______ means of communicating because all protocols include their own error detection, error handling, acknowledgment, and session management features, and using more than one protocol at a time just compounds the overhead required to communicate a single message.

A

inefficient

52
Q

In what type of attack does the intruder initiate connections to both a client and a server

A

Man in the Middle

53
Q

________ access control is deployed to restore systems to normal after an unwanted or unauthorized activity has occurred

A

Corrective

54
Q

The following are features of packet switching?

A

Bursty traffic focused

Sensitive to data loss

Supports any type of traffic

55
Q

circuit switching has _______ known delays.

A

fixed

56
Q

Packet switching has ______ traffic, ______ to data loss, supports ______ traffic.

A

Bursty traffic focused

Sensitive to data loss

Supports any type of traffic

57
Q

circuit switching has _______ known delays.

A

fixed

58
Q

What is the CLIENT source port of a secured web communication?

A

DYNAMIC port

randomly selected port number between 1024–65,535

59
Q

Which security role is ultimately responsible for due diligence in protecting a company’s data?

A

Data Owner

60
Q

_________ are precompiled lists of common passwords and their permutations and serve as the foundation for a dictionary attack on accounts.

A

Dictionary word lists

61
Q

What form of password attack utilizes a preassembled lexicon of terms and their permutations?

A

Dictionary Word List

62
Q

On what port do DHCP clients request a configuration?

A

68

63
Q

Port 68

A

DHCP

64
Q

Accountability is the ultimate goal of a process started by ________.

A

identification

65
Q

______ is a weakness in cryptography where a plain-text message generates identical cipher-text messages using the same algorithm but different keys

A

Clustering (aka key clustering)

66
Q

The ___________ model is based on predetermining the set or domain of objects that a subject can access. The set or domain is a list of those objects that a subject can access. This model is based on automation theory and domain separation. This means subjects are able to perform only predetermined actions against predetermined objects.

A

Goguen-Meseguer

67
Q

In _____________ mode, each block of unencrypted text is XORed with the block of cipher text IMMEDIATELY PROCEEDING it before it is encrypted using the DES algorithm.

A

Cipher Block Chaining (CBC)

68
Q

______ _______ use an iterative series of precomputed password hashes. These are precomputed password hashes kept as a series of iterative inputs are known as what

A

Rainbow tables

69
Q

_______removes the malicious code but does not repair the damage caused by it.

A

Removal

70
Q

_________not only removes the code, but it also repairs any damage the code has caused.

A

Cleaning

71
Q

Wifi 802.11__ can use the 2.4 GHz and 5 GHz frequencies

A

802.11n

72
Q

C++, Java, and Fortran are _______languages

A

compiled

73
Q

AES supports what length?

A

The strongest keys supported by the Advanced Encryption Standard are 256 bits. The valid AES key lengths are 128, 192, and 256 bits.

74
Q

Which networking technology assumes traffic collisions will occur and thus requires collision detection and avoidance mechanisms?

A

eTHERNET

75
Q

What database element is equivalent to a single attribute?

A

Column

76
Q

The five elements of AAA services in order are :

A
The five elements of AAA services in order are identification, 
authentication, 
authorization, 
auditing, 
accounting.
77
Q

________ the media is the best choice of the available answers to protect against mishandling media.

A

Marking (or labeling)

78
Q

________is the process by which online activities of user accounts and processes are tracked and recorded.

A

Auditing

79
Q

The security management task in which critical, significant, and sensitive work tasks are divided among several individual administrators or high-level operators is ________ __ ______.

A

separation of duties

80
Q

_________ access control enables the enforcement of systemwide restrictions that override object-specific access control.

A

Nondiscretionary

81
Q

_______viruses use filenames that mimic the filenames of legitimate system files.

A

Companion

82
Q

Companion Virus is…

A

viruses that use filenames that mimic the filenames of legitimate system files

83
Q

the ______and the cost/benefit equation—produce results that are primarily used to prioritize security efforts

A

ALE

84
Q

___is an authentication service and is simply a means to prevent unauthorized execution of code on remote systems

A

S-RPC

85
Q

__________ ATTACKS are coordinated efforts between cooperative machines using traffic in an entirely legitimate manner

A

DISTRIBUTED REFLECTIVE DENIAL OF SERVICE

86
Q

The ________of database transactions requires transaction execution in an all-or-nothing fashion.

A

atomicity

87
Q

______access control is deployed to provide various options to existing controls to help enforce and support a security policy

A

Compensation

88
Q

The ~ symbol represents the NOT function, which inverts the bits of the affected variable. In this case, the X value is not used.

A

X: 0 1 1 0 1 0
Y: 0 0 1 1 0 1

~Y: 1 1 0 0 1 0

89
Q

_______ control is any hardware, software, or organizational administrative policy or procedure that grants or restricts access, monitors and records attempts to access, identifies users attempting to access, and determines whether access is authorized

A

Access

90
Q

Cryptographic salt values are added to the passwords in password files before hashing to protect from which two attacks?

A

rainbow table and dictionary attacks.