Architecture and Design Flashcards

1
Q

What are the three issues that symmetric data encryption fails to address?

A
  • Digital integrity
  • Repudiation
  • Scalable Key Distribution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which encryption method is more scalable?

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the key length used by a one-time pad?

A
  • The key length is the same length as the message that is to be encrypted
  • The message length determines the key length
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which term refers to the assurance that data has not been altered in transmission?

A

Data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the size, in bits, of a Message Digest version 5 (MD5) hash?

A

128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is meant by the term VM escape?

A

An exploit in which the attacker runs code on a VM that allows an OS running within it to break out and interact directly with the hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What key is used to decrypt a digital signature: public or private

A

Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the acronym MFD denote?

A

Multi-functional device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which private-key encryption algorithm does Pretty Good Privacy (PGP) use to encrypt data?

A

International Data Encryption Algorithm (IDEA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why should you periodically test an alternate site?

A

To ensure continued compatibility and recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What bit length is the hash value provided by the Secure Hash Algorithm (SHA)

A

160 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the name of the array where hashed items are kept?

A

Hash table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the process by which a system determines that a specific user is authorized to perform certain functions?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a file’s MD5 hash value?

A

To verify file integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which servers are susceptible to the same type of attacks as their host, including DoS attacks, detection attacks, and escape attacks?

A

Virtual servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of a Message Authentication Code (MAC)

A

Message Authentication Code (MAC) helps protect against fraud in electronic fund transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the acronym IoT denote

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is meant by the term transitive trust?

A

A two-way relationship created between parent and child domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of DLP?

A

Data Loss Prevention (DLP) is a network system that monitors data on computers to ensure the data is not deleted or removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the acronym UAV denote?

A

Unmanned Aerial Vehicle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which fire suppression method, formally used to suppress fires involving electrical equipment or liquids, has been discontinued?

A

Halon gas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a pass-the-hash attack?

A

When an attacker obtains a hashed user credential and uses it to authenticate to a system without cracking it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Is the Data Encryption Standard (DES) algorithm asymmetric or symmetric?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which alternate computing facility takes the least amount of time to become operational?

A

Hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which fingerprint scan will analyze fingerprint ridge direction?

A

Minutiae matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the primary purpose of Tripwire?

A

To monitor the baseline configuration of a system and the changes made to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which type of attack on a cryptographic algorithm uses brute force methods to encrypt text strings until the output matches the ciphertext?

A

A mathematical attack?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the safest method for creating and managing key pairs: centralized or de-centralized key management?

A

Centralized key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is another name for RAID5

A

Disk striping with parity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the two most important security needs that are met using Secure Multipurpose Internet Mail Extensions (S/MIME)?

A
  • Authentication

* Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the two other names for single-key cryptography?

A
  • Symmetric key encryption

* Secret-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the most important biometric system characteristic?

A

Accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does the acronym FRR denote?

A

False rejection rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Should virtual servers have the same information security requirements as physical servers?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What was the first public-key algorithm ever user?

A

Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

When does fuzzing occur?

A

When unexpected values are provided as input to an application in an effort to make the application crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which cryptography technique is based on a combination of two keys:

  • A secret private key
  • A public key
A

Public-key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What public-key algorithm was the first to allow two users to exchange a secret key over an insecure medium without any prior keys?

A

Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the primary concern of RAID?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What does the acronym RAID denote?

A

Redundant Array of Inexpensive Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Is the Message Digest 5 (MD5) algorithm used with symmetric or asymmetric key algorithms?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the purpose of fuzz testing?

A

To identify bugs and security flaws within an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the purpose of a bollard?

A

A bollard is a physical security control that prevents cars from accessing certain areas. They are most often deployed in front of retail storefronts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is another name for RAID 1?

A

Disk mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is a hot site?

A

An alternate computing facility with telecommunications equipment and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Is the RSA algorithm symmetric or asymmetric?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is Microsoft Baseline Security Analyzer?

A

A Microsoft app that creates security reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is a cold site?

A

An alternate computing facility with no telecommunications equipment or computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which backup method backs up every file on the server each time it runs?

A

Full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are the two types of ciphers?

A
  • Block ciphers

* Streaming ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What does the acronym CER denote?

A

Crossover error rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the purpose of application hardening?

A

Ensures that an application is secure and unnecessary services are disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which type of disaster recovery site provides very little fault tolerance for the primary data center and relies on backups to bring the data center back online?

A

Cold site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Why is the location of an alternate site important?

A

You do not want it to be affected by the same disaster as your primary facility?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is the basis by which a device is measured for integrity

A

The secure baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which type of cryptography relies more on physics, rather than mathematics, as a key aspect of its security model?

A

Quantum cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What does thy acronym HVAC denote?

A

Heating, Ventilation, and Air Conditioning

58
Q

What is a honeynet?

A

When two or more honeypots are implemented on a network

59
Q

Which security concept ensures that data is protected from being accessed by unauthorized persons?

A

Confidentiality

60
Q

What block cipher and key size (in bits) are used by the Clipper Chip?

A

The skipjack block cipher and an 80-bit key length

61
Q

On what does the Pretty Good Privacy (PGP) mail standard rely?

A

A web of trust

62
Q

According to the CompTIA Security+ blueprint, what are the four authentication attributes?

A
  • Somewhere you are
  • Something you can do
  • Something you exhibit
  • Someone you know
63
Q

What does the acronym VM denote?

A

Virtual Machine

64
Q

What does the acronym EMP denote?

A

Electro-magnetic pulse

65
Q

What bit length is the hash value provided by the Message Digest 2 (MD2), MD4, and MD5 algorithms?

A

128-bits

66
Q

What is meant by the term VM sprawl?

A

When the number of virtual machines (VMs) on a network reaches a point where the administrator can no longer manage them effectively

67
Q

What is the main difference between virtualization and cloud computing?

A

The location and ownership of the physical components

68
Q

What does the acronym SoC denote?

A

System on a Chip

69
Q

What is another name for RAID 0?

A

Disk striping

70
Q

What is the purpose of Infrastructure as a Service (IaaS) in cloud computing

A

It provides computer and server infrastructure, typically through a virtualized environment

71
Q

What are the two types of eye scan?

A
  • Iris scans

* Retail scans

72
Q

What does the acronym FAR denote?

A

False acceptance rate

73
Q

What is the purpose of Platform as a Service (PaaS) in cloud computing?

A

It provides not only virtualized deployment platforms but also value-added solution stack and application development platforms

74
Q

What is the term for the process that applies a one-way mathematical function called a message digest function to an arbitrary amount of data?

A

Hashing

75
Q

What is a baseline?

A

The minimum level of security and performance of a system in an organization

76
Q

What is the term for a server that has been configured specifically to distract an attacker from production systems?

A

Honeypot

77
Q

Which standard is a specification for secure email, designed to prevent the decryption of email messages?

A

Secure Multipurpose Internet Mail Extension (S/MIME)

78
Q

Which type of cryptography is more secure: symmetric or asymmetric?

A

Asymmetric

79
Q

What is a honeypot?

A

A decoy system in the network installed to lure potential intruders away from legitimate systems

80
Q

What is the purpose of SCADA?

A

To collect data from factories, plants, or other remote locations, and send the data to a central computer that manages and controls the data

81
Q

What is the purpose of an airgap?

A

To ensure that a secure computer network is physically isolated from unsecure networks

82
Q

What backup method serves as the baseline for a backup set?

A

Full backup

83
Q

Which two fire suppression agents are used to suppress fires involving paper and wooden furniture?

A
  • Water

* Soda acid

84
Q

What does the acronym ICS denote?

A

Industrial Control System

85
Q

What is the purpose of hot and cold isles?

A

To control airflow in the data center

86
Q

What is most commonly used to provide proof of a message’s origin?

A

Digital signature

87
Q

What is the purpose of embedding a timestamp within ciphertext?

A

Decrease the chances of a message being replayed

88
Q

What does the acronym VDE denote?

A

Virtual Desktop Environment

89
Q

What is the purpose of a mantrap?

A

Prevent people from piggybacking on the credentials of legitimate personnel to gain entry into a building

90
Q

What does the acronym VDI denote?

A

Virtual Desktop Infrastructure

91
Q

What are the four types of water sprinklers?

A
  • Wet pipe
  • Dry pipe
  • Preaction
  • Deluge
92
Q

Which alternate computing facility is the least expensive to maintain before a disaster occurs?

A

Cold site

93
Q

Does Pretty Good Privacy (PGP) provide confidentiality?

A

Yes

94
Q

What does the acronym PGP denote?

A

Pretty Good Privacy

95
Q

Is the RC2 algorithm symmetric or asymmetric?

A

Symmetric

96
Q

Which encryption method is faster?

A

Symmetric encryption

97
Q

What is the opposite of confidentiality?

A

Disclosure

98
Q

According to the CompTIA Security+ bluepring, which category of embedded devices include wearable technology and home automation?

A

Smart Devices and IoT

99
Q

What is the purpose of input validation?

A

Ensure that data being entered into a database follows certain parameters

100
Q

What does the acronym DLP denote?

A

Data Loss Prevention

101
Q

What is the name of an encryption key that can be easily reversed-engineered from the encryption data by brute force methods?

A

Weak key

102
Q

What are four common service models of cloud computing?

A
  • Infrastructure as a Service (IaaS)
  • Monitoring as a Service (MaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
103
Q

Which eye scan measures the pattern of blood vessels in the back of the eye

A

Retinal scan

104
Q

How is a digital signature created from a message digest?

A

It is encrypted using the sender’s private key

105
Q

Which algorithms are asymmetric key algorithms?

A
  • Rivest, Shamir, and Adleman (RSA)
  • Elliptic Curve Cryptosystem (ECC)
  • Diffie-Hellman
  • El Gamal
  • Digital Signature Algorithm (DSA)
  • Knapsack
106
Q

What is another name for public-key encryption

A

Asymmetric encryption

107
Q

Is International Data Encryption Algorithm (IDEA) symmetric or asymmetric?

A

Symmetric

108
Q

Which encryption algorithm uses an 80-bit key to encrypt 64-bit blocks of data?

A

Skipjack

109
Q

Is the Skipjack algorithm symmetric or asymmetric

A

Symmetric

110
Q

According to the CompTIA Security+ blueprint, what are the three authentication factors?

A
  • Something you know
  • Something you have
  • Something you are
111
Q

If Alice wants to encrypt a message using asymmetric encryption that only Bob can read, which key must she use?

A

Bob’s public key

112
Q

What is the key size, in bits, of the Data Encryption Standard (DES)?

A

56-bits

113
Q

What is meant by the term integrity measurement in a secure staging development?

A

Monitoring a device to ensure that it has not deviated from the secure baseline?

114
Q

Is Advanced Encryption Standard (AES) symmetric or asymmetric?

A

Symmetric

115
Q

Which hashing algorithm produces a message digest of 160 bits in length?

A

Secure Hash Algorithm (SHA-1)

116
Q

Which application hardening method requires that your organization periodically checks with the application vendor?

A

Patch management

117
Q

Is the Tripple-DES (3DES) algorithm symmetric or asymmetric?

A

Symmetric

118
Q

In asymmetric encryption for a digital signature, which key is used for encryption: public or private?

A

Private

119
Q

What is steganography?

A

A cryptography method in which data is hidden in another media type

120
Q

What ensures that a user is who he claims to be?

A

Identification

121
Q

What is the length of an IDEA key?

A

128-bit

122
Q

What does the acronym RTOS denote?

A

Real-Time Operating System

123
Q

What is the purpose of a Faraday cage?

A

Prevent electromagnetic signals from penetrating the area inside the cage

124
Q

Which key should be encrypted and protected with a password when stored: a public key or a private key?

A

Private key

125
Q

Which type of eye scan is considered more intrusive than other eye scans?

A

Retinal scan

126
Q

Which type of cipher encrypts data in fixed-size blocks?

A

Block

127
Q

According to the CompTIA Security+ blueprint, what is included as specialized systems?

A
  • Medical devices
  • Vehicles
  • Aircrafts
  • Smart meters
128
Q

Which term refers to voice communication over a network

A

Telephony or Voice over IP (VoIP)

129
Q

What is the purpose of Software as Service (SaaS) in cloud computing?

A

It ensures on-demand, online access to an application suite without the need for local installation

130
Q

What is a warm site?

A

An alternate computing facility with telecommunication equipment but no computers

131
Q

What backup method backs up every file modified on the server since the last full backup, and reset the archive bit?

A

Incremental backup

132
Q

What are the four types of cloud computing based on management type?

A
  • Public
  • Private
  • Hybrid
  • Community
133
Q

What is meant by the term federation when referring to authentication systems?

A

A system that lets subscribers use the same identification data to obtain access to the networks of all enterprises in the group

134
Q

What algorithms are symmetric key algorithms

A
  • Data Encryption Standard (DES)
  • Triple DES (3DES)
  • Blowfish
  • IDEA
  • RC4
  • RC5
  • RC6
  • Advanced Encryption Standard (AES)
135
Q

Which type of fire suppression system is the safest for both computer equipment and personnel: FM-200 or Carbon Dioxide?

A

FM-200

136
Q

What does the acronym SCADA denote?

A

Supervisory Control And Data Acquisition

137
Q

What is the best method to preserve evidence on a computer: bit stream backup or standard backup

A

Bit stream backup

138
Q

What is the purpose of secure code review?

A

It examines all written code for any security holes that may exist

139
Q

What is the purpose of a fail-safe error handler?

A

To ensure that the application stops working, reports the error, and closes down

140
Q

What is the name for a hash algorithm that translates plaintext into an intermediate form

A

A cipher