Assessment Test Flashcards

1
Q
Which of the following programming language is particularly vulnerable to buffer overflows?
A. .NET
B. Pascal
C. C
D. Basic
A

The C prog language is vulnerable because some of its functions do not perform proper bounds checking.
(CH.5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following is not considered one of the three basic tenants of security?
A. Integrity 
B. Non-repudiation
C. Availability
D. Confidentiality
A

B. Non-repudiation is not considered one of the three basic tenets of security. (Ch.3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Many organizations start the Pre-employment process with a ___________ check.

A

Background (Ch.7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In cryptography the process of converting clear text into something that is unreadable is known as ______.

A

Encryption (Ch.2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which transport protocol is considered connection based?
A. IP
B. TCp
C. UDP
D. ICMP
A

TCP (Ch.1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is not an advantage of cloud computing?
A. Reduced cost
B. The ability to access data and applications from many locations.
C. Increased Cot
D. The ability to pay as you go.

A

C. Increased cost (Ch.3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
The term ACL is most closely related to which of the following?
A. Hub
B. switch
C. Bridge
D. Router
A

D. The term ACL is most closely related to a router. ACL’s are used as a basic form of firewalls. (Ch.4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A \_\_\_\_\_\_ is used to maintain session or state when moving from one web page to another. 
A. Browser
B. Cookie
C. Session ID
D. URL
A

B. A cookie (Ch.5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
In the study of cryptography, \_\_\_\_\_\_\_ is used to prove the identity of an individual.
A. Confidentiality
B. Authenticity
C. Integrity
D. Availability
A

B. Authenticity (Ch.1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Backtrack is an example of what?
A. Linux bootable distribution
B. Session hijacking
C. Windows bootable preinstall program
D. VoIP capture tool
A

A. Linux bootable distribution (Ch.8)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following is the basic transport protocol for the web?
A. HTTP
B. UDP
C. TFTP
D. FTP
A

A. HTTP (Ch.5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
This type of attack does not give an attacker access but blocks legitimate users?
A. Sniffing
B. session hijacking 
C. Trojan
D. Denial of Service
A

D. Denial of service (Ch.6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
IPv4 uses addressed of what length?
A. 8
B. 16
C. 32
D. 64
A

C. 32 (ch.1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
\_\_\_\_\_\_ can be used as a replacement for POP3 and offers advantages over POP3 for mobile users.
A. SMTP
B. SNMP
C. POP3
D. IMAP
A

D. IMAP (Ch.10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
What port foes HTTP use by default?
A. 53
B. 69
C. 80
D. 445
A

C. HTTP (Ch.4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which type of agreement requires the provider to maintain a certain level of support?
A. MTBF
B. SLA
C. MTTR
D. AR
A

B. SLA (Ch.6)

17
Q
\_\_\_\_\_\_ is the name given to fake mail over the Internet telephony.
A. Spam
B. SPIT
C. SPIM
D. SPLAT
A

B. SPIT (Ch.10)

18
Q
Which high-level document is used by management to set the overall tone?
A. Procedure
B. Guideline
C. Policy
D. Baseline
A

C. Policy (Ch.7)

19
Q
Which method of encryption makes use of a single shared key?
A. RSA
B. ECC
C. DES
D. MD5
A

C. DES (Ch.2)

20
Q
\_\_\_\_\_ prevents one individual from having too much power.
A. Dual control
B. Separation of duties
C. Mandatory vacation
D. An NDA
A

B. Separation of duties (Ch.9)

21
Q
\_\_\_\_\_\_ is an example of virtualization.
A. VMware
B. TSWEB
C. LDAP
D. GoToMyPc
A

A. VMware (Ch.3)

22
Q
What is the purpose of Wireshark?
A. Sniffer
B. Session hijacking
C. Trojan
D. Port Scanner
A

A. Sniffer (Ch.8)

23
Q
One area of of policy compliance that many companies need to address is in meeting the credit card \_\_\_ Security standards.
A. Sox
B. PCI
C. GLB
D. HIPAA
A

B. PCI (Ch.7)

24
Q
The OSI model consists of how many layers?
A. 3
B. 5
C. 7
D. 8
A

C. 7 (Ch.1)

25
Q
The set of regulations covers the protection of medical data and personal information.
A. HIPAA
B. GLB
C. SOX
D. Safe Harbor
A

A. HIPAA (Ch.6)

26
Q
\_\_\_\_ is a well known incident response, computer forensics, and e-discovery tool. 
A. PuTTY
B. Hunt
C. Firesheep
D. Helix
A

D. Helix (Ch.8)

27
Q
Shawn downloads a program for his iPhone that is advertised as a game yet actually tracks his location and browser activity. This is best described as \_\_\_?
A. Virus
B. Worm
C. Trojan
D. Spam
A

C. Trojan (Ch.4)

28
Q
\_\_\_\_ is used to send mail and to relay mail to other SMTP mail servers and uses port 25 by default.
A. SMTP
B. SNMP
C. POP3
D. IMAP
A

A. SMTP (Ch.10)

29
Q
\_\_\_\_ are used to prevent a former employee from releasing confidential information to a third party ?
A. Dual controls
B. Separation of duties
C. Mandatory Vacations
D. NDA's
A

D. NDAs (Ch.9)

30
Q
This technique allows the review of an employee's duties while they are not on duty. 
A. Dual controls
B. Separation of duties 
C. Mandatory vacations
D. NDAs
A

C. Mandatory vacations (Ch.1)