1400 Flashcards
Which of the following cannot be used along with fencing as a security perimeter? A. vapor barrier B. rotating spikes C. roller barrier D. anti-climb pain
A. vapor barrier
A __________ can be used to secure a mobile device. A. cable lock B. mobile chain C. security tab D. mobile connector
A. cable lock
Which of the following is not used to secure a desktop computer? A. data encryption B. screen locking C. remote wipe/sanitation D. strong passwords
C. remote wipe/sanitation
Which is the first step in securing an operating system? A. implement patch management B. configure operation system security and settings C. perform host software baselining D. develop the security policy
D. develop the security policy
A typical configuration baseline would include each of the following except __________. A. changing any default settings that are insecure B. eliminating any unnecessary software C. enabling operating system security features D. performing a security risk assessment
D. performing a security risk assessment
Which of the following is NOT a Microsoft Windows setting that can be configured through a security template? A. account policies B. user rights C. keyboard mapping D. system services
C. keyboard mapping
__________ allows for a single configuration to be set and then deployed to many or all users. A. group policy B. active directory C. snap-in replication (SIR) D. command configuration
A. group policy
A __________ addresses a specific customer situation and often may not be distributed outside that customer’s organization. A. rollup B. service pack C. patch D. hotfix
D. hotfix
Which of the following is NOT an advantage to an automated patch update service? A. Administrators can approve or decline updates for client systems - force updates to install by a specific date - and obtain reports on what updates each computer needs B. Downloading patches from a local server instead of using the vendor’s online update service can save bandwidth and time because each computer does not have to connect to an external server C. users can disable or circumvent updates just as they can if their computer is configured to use the vendor’s online update service. D. Specific types of updates that the organization does not test - such as hotfixes - can be automatically installed whenever they become available.
C. users can disable or circumvent updates just as they can if their computer is configured to use the vendor’s online update service.
Each of the following is a type of matching used by anti-virus software except __________. A. string scanning B. wildcard scanning C. match scanning D. mismatch scanning
C. match scanning
How does heuristic detection detect a virus? A. a virtualized environment is created and the code is executed in it B. A string of bytes from the virus is compared against the suspected file C. The bytes from the virus are placed in different “piles” and then used to create a profile D. The virus signature file is placed in a suspended chamber before streaming to the CPU
A. a virtualized environment is created and the code is executed in it
A cross-site request forgery (XSRF) __________. A. is used to inherit the identity and privileges of the victim B. is identical to cross-site scripting (XSS) C. cannot be blocked D. can only be used with a Web-based e-mail client
A. is used to inherit the identity and privileges of the victim
Which of the following is a list of approved e-mail senders? A. whitelist B. blacklist C. greylist D. greenlist
A. whitelist
A(n) __________ can provide details regarding requests for specific files on a system. A. audit log B. access log C. report log D. file log
B. access log
Errors that occur while an application is running are called __________. A. exceptions B. faults C. liabilities D. conventions
A. exceptions
Which is the preferred means of trapping user input for errors? A. Input validation B. On-trap input C. escaping D. Fuzz testing
C. escaping
Each of the following is true about data loss prevents (DLP) except __________. A. it can only protect data in use B. it can scan data on a DVD C. it can read inside compressed files D. a policy violation can generate a report or block the data
A. it can only protect data in use
Network hardware that provides multiple security functions.
All-In-One Network Security Appliance
A monitoring technique used by an IDS that creates a baseline of normal activities and compares actions against the baseline. Whenever a significant deviation from this baseline occurs - an alarm is raised.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that uses the normal processes and actions as the standard and compares actions against it.
Behavior-Based Monitoring
A separate network that rests outside the secure network perimeter; untrusted outside users can access the DMZ but cannot enter the secure network.
Demilitarized Zone (DMZ)
A monitoring technique used by an IDS that uses an algorithm to determine if a threat exists.
Heuristic Monitoring
A software-based application that runs on a local host computer that can detect an attack as it occurs.
Host Intrusion Detection System (HIDS)
A device designed to be active security; it can detect an attack as it occurs.
Intrusion Detection System (IDS)
A device that can direct requests to different servers based on a variety of factors - such as the number of server connections - the server’s processor utilization - and overall performance of the server.
Load Balancer
A technique that examines the current state of a system or network device before it is allowed to connect to the network.
Network Access Control (NAC)
A technique that allows private IP addresses to be used on the public Internet.
Network Address Translation (NAT)
A technology that watches for attacks on the network and reports back to a central device.
Network Intrusion Detection System (NIDS)
A technology that monitors network traffic immediately react to block a malicious attack.
Network Intrusion Prevention System (NIPS)
A computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.
Proxy Server
Any combination of hardware and software that enables remote users to access a local internal network.
Remote Access
A computer or an application program that routes incoming request to the correct server.
Reverse Proxy
A device that can forward packets across computer networks.
Router
A monitoring technique used by an IDS that examines network traffic to look for well-known patterns and compares the activities against a predefined signature.
Signature-Based Monitoring
A technique that uses IP addresses to divide a network into network - subnet - and host.
Subnetting (Subnet Addressing)
A device that connects network segments and forwards only frames intended for that specific device or frames sent to all devices.
Switch
A technology that allows scattered users to be logically grouped together even though they may be attached to different switches.
Virtual LAN (VLAN)
A technology to use an unsecured public network - such as the Internet - like a secure private network.
Virtual Private Network (VPN)
A device that aggregates hundreds or thousands of VPN connections.
VPN Concentrator
A special type of firewall that looks more deeply into packets that carry HTTP traffic.
Web Application Firewall