6 Flashcards

1
Q

What are the two types of Ciphers?

A

Stream and Block

Stream is byte by byte (byte=characters)
Block encrypts blocks of bytes at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following answers refer to an office equipment that combines the functionality of multiple devices? (Select 2 answers)
* MFD
* IoT
* MFP
* PED
* MFA

A
  • MFD
  • MFP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of OS characterized by low delay between the execution of tasks required in specific applications, such as in military missile guidance systems or in automotive braking systems, is known as:
* UNIX
* Windows NT
* POSIX
* RTOS

A

RTOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An integrated circuit combining components normally found in a standard computer system is referred to as:
* HSM
* TPM
* SoC
* BIOS

A

SoC

A System on a Chip, or SoC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the answers listed below refers to an IoT technology designed to provide communication between appliances in a home automation network?
* Ant+
* Zigbee
* NFC
* RFID

A

Zigbee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:
* MicroSD card
* Common Access Card (CAC)
* Proximity card
* Personal Identity Verification (PIV) card

A

Proximity card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of preventive physical access controls would provide a basic means for securing a door access? (Select 2 answers)
* Air gap
* Proximity card reader
* CCTV
* Industrial camouflage
* Smart card reader

A
  • Proximity card reader
  • Smart card reader
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A lightly protected subnet (previously known as a DMZ) consisting of publicly available servers placed on the outside of the company’s firewall is called:
* Honeynet
* Virtual Private Network (VPN)
* Extranet
* Screened subnet

A

Screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?
* Standard format
* Overwriting data
* Degaussing
* Low-level format

A

Degaussing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital signatures provide: (Select 3 answers)
* Integrity
* Authentication
* Confidentiality
* Authorization
* Non-repudiation
* Accounting

A
  • Integrity
  • Authentication
  • Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as a key size or key length. The key length determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security.
* True
* False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In cryptography, the term “Key stretching” refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks.
* True
* False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Examples of key stretching algorithms include: (Select 2 answers)
* ROT13
* Twofish
* Bcrypt
* DSA
* PBKDF2

A

Bcrypt
PBKDF2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following answers refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks?
* Seed
* IV
* Salt
* Shim

A

Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the Three Data states that need to be protected?

A

Data in Transit
Data at Rest
Data in Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the Threat Actor Types?

A

Scirpt Kiddies
Insider Threats
Hacktivist
Advanced Persistent Threat (APT)
State Actors
Criminal Syndicates
Show IT
Competitors

17
Q

What are the types of Hackers?

A

White Hat
Black Hat
Gray Hat

18
Q

What is the percentage of the value of a given asset that gets lost as a result of a specific incident?

A

EF (Exposure Factor)

19
Q

What is the value of tangible or intangible assets such as servers, computers, expertise, databases, or sensitive information?

A

AV (Asset Value)

20
Q

What is the amount of money you expect to lose each time a specific asset is lost of compromised?

A

SLE (Single Loss Expectancy)

21
Q

How is SLE calculated?

A

AV X EF = SLE

22
Q

What is the total number of times you expect a specific incident to occur in one year called?

A

ARO (Annual Rate of Occurrence)

23
Q

What is the calculation that helps to determine the expected monetary loss of an asset due to a particule risk over a single year called?

A

ALE (Annual Loss Expectancy)

24
Q

What is the calculation for ALE (Annual Loss Expectancy)?

A

SLE x ARO = ALE

25
Q

What is the contract between a service provider and its customers that documents what services the provider will furnish and defines the serve standards that the provider is obligated to meet called?

A

SLA (Service-Level Agreement)

26
Q

RPO refers to the amount of time that an application, system, or process can be down without causing significant damage to the business and the time spent restoring the application and its data to resume normal business operations after a significant incident.

True or False?

A

False

RPO (Recovery Point Objective) refers to calculating how much data loss a company can experience within a period most relevant to its business before significant harm occurs from the point of a disruptive event to the last data backup.

The definition used in the question is for RTO (Recovery Time Objective)

27
Q
A