08092017_Wiley_Test2 Flashcards
Trademark can be renewed for ____ years
10
Best intellectual property protection ..
Trade Secret
How many rounds of encryption for DES
DES uses 16 rounds
Waterfall allow you to return the last previous ____
State
3DES effective key length
168bit
What uses passwords for a challenge-response mechanism to create a one-time password
Asynchronous One Time Password
Disaster ________involves restoring a business facility and environment to a workable state
restoration
The ________ evidence rule states that when an agreement between parties is put into written form, the written document is assumed to contain all the terms of the agreement and no verbal agreements may modify the written agreement
parol
_____ _____ ____viruses infect the system’s boot sector and load when the system is started
Master boot record (MBR)
__________ espionage is usually considered a business attack
Industrial
The Agile ________ says that you should build projects around motivated individuals and give them the support they need
Manifesto
A custodian is someone who has been assigned to or delegated the _____ to _____responsibility of proper storage and protection of objects.
day-to-day
_________ tests are similar to the structured walk-throughs. In this test, disaster recovery team members are presented with a scenario and asked to develop an appropriate response
Simulation
Systems are usually disconnected from the network during the _______ and _______process
isolation and recovery
RESTORATION phase of incident response includes these steps:
Restoring backup data
Rebuilding compromised systems
Supplementing existing security controls
____________ XORs the plain text with a separate subkey before the first round of encryption. Used in TWOFISH
Prewhitening
The US Geological Survey provides detailed _________ risk data for locations in the United States
earthquake
__________ occurs when a person presents him- or herself as another user, typically to gain access to unauthorized information or processes.
Masquerading. Keyword is UNAUTHORIZED.
THis includes physical access
Loss expectancies are a measure of impact and are calculated during the ______ assessment phase
IMPACT
You are concerned about the risk that a tornado poses to your corporate headquarters in Indiana. The building itself is valued at $10 million. After consulting with the National Weather Service, you determine that there is a 2 percent likelihood that a tornado will strike over the course of a year. You hired a team of architects and engineers who determined that the average tornado would destroy approximately 25 percent of the building. What is the annualized loss expectancy (ALE)?
The ALE is computed by multiplying the SLE ($2,500,000) by the annualized rate of occurrence (2%) to get $50,000.
A ______ access control model is based on job functions such as a sales person or a sales manager, and it groups users into roles. .
role-based
A ______access control model is an identity-based access control model. This is also OWNER based
discretionary
A ________access control model is based on rules within an ACL
rule-based
A ______ access control model uses assigned labels to identify access.
mandatory
The _____ ______process provides an organized framework within which users can request modifications, managers can conduct cost/benefit analysis, and developers can prioritize tasks.
request control
S/MIME supports these symmetric encryption algorithms.
RC2,
RSA,
DES and 3DES
The ________ phase includes the restoration of the normal business operations of an organization
CLOSURE
What are the Incident response steps
Response Mitigation Reporting Recovery Remediation
_________extended infrastructure mode exists when a wireless network is designed to support a large physical environment through the use of a single SSID but numerous access points
Enterprise
Phil Zimmerman’s Pretty Good Privacy (PGP) package relies on the construction of a _____ of ___between system users.
web of trust
Which BCP (business continuity plan) task requires that you create a comprehensive list of business processes?
Criticality prioritization OR Priority Identification task
What organization created the Ten Commandments of Computer Ethics
Computer Ethics Institute
_____-______ access control is focused on the internal data of each field
Content-dependent
A database view is a content-dependent control. A
view retrieves specifi c columns from one or more tables, creating a virtual table.
The following items are critical pieces of information in the chain of evidence?
General description of the evidence
.
Name of the person collecting the evidence
Time and date the evidence was collected
What cryptographic goal does the challenge-response protocol support?
Authentication
What type of access control system is deployed to physically deter unwanted or unauthorized activity and access?
Preventive access control is deployed to stop unwanted or unauthorized activity from occurring.