Assessment Test Flashcards
Which of the following programming language is particularly vulnerable to buffer overflows? A. .NET B. Pascal C. C D. Basic
The C prog language is vulnerable because some of its functions do not perform proper bounds checking.
(CH.5)
Which of the following is not considered one of the three basic tenants of security? A. Integrity B. Non-repudiation C. Availability D. Confidentiality
B. Non-repudiation is not considered one of the three basic tenets of security. (Ch.3)
Many organizations start the Pre-employment process with a ___________ check.
Background (Ch.7)
In cryptography the process of converting clear text into something that is unreadable is known as ______.
Encryption (Ch.2)
Which transport protocol is considered connection based? A. IP B. TCp C. UDP D. ICMP
TCP (Ch.1)
Which of the following is not an advantage of cloud computing?
A. Reduced cost
B. The ability to access data and applications from many locations.
C. Increased Cot
D. The ability to pay as you go.
C. Increased cost (Ch.3)
The term ACL is most closely related to which of the following? A. Hub B. switch C. Bridge D. Router
D. The term ACL is most closely related to a router. ACL’s are used as a basic form of firewalls. (Ch.4)
A \_\_\_\_\_\_ is used to maintain session or state when moving from one web page to another. A. Browser B. Cookie C. Session ID D. URL
B. A cookie (Ch.5)
In the study of cryptography, \_\_\_\_\_\_\_ is used to prove the identity of an individual. A. Confidentiality B. Authenticity C. Integrity D. Availability
B. Authenticity (Ch.1)
Backtrack is an example of what? A. Linux bootable distribution B. Session hijacking C. Windows bootable preinstall program D. VoIP capture tool
A. Linux bootable distribution (Ch.8)
Which of the following is the basic transport protocol for the web? A. HTTP B. UDP C. TFTP D. FTP
A. HTTP (Ch.5)
This type of attack does not give an attacker access but blocks legitimate users? A. Sniffing B. session hijacking C. Trojan D. Denial of Service
D. Denial of service (Ch.6)
IPv4 uses addressed of what length? A. 8 B. 16 C. 32 D. 64
C. 32 (ch.1)
\_\_\_\_\_\_ can be used as a replacement for POP3 and offers advantages over POP3 for mobile users. A. SMTP B. SNMP C. POP3 D. IMAP
D. IMAP (Ch.10)
What port foes HTTP use by default? A. 53 B. 69 C. 80 D. 445
C. HTTP (Ch.4)
Which type of agreement requires the provider to maintain a certain level of support? A. MTBF B. SLA C. MTTR D. AR
B. SLA (Ch.6)
\_\_\_\_\_\_ is the name given to fake mail over the Internet telephony. A. Spam B. SPIT C. SPIM D. SPLAT
B. SPIT (Ch.10)
Which high-level document is used by management to set the overall tone? A. Procedure B. Guideline C. Policy D. Baseline
C. Policy (Ch.7)
Which method of encryption makes use of a single shared key? A. RSA B. ECC C. DES D. MD5
C. DES (Ch.2)
\_\_\_\_\_ prevents one individual from having too much power. A. Dual control B. Separation of duties C. Mandatory vacation D. An NDA
B. Separation of duties (Ch.9)
\_\_\_\_\_\_ is an example of virtualization. A. VMware B. TSWEB C. LDAP D. GoToMyPc
A. VMware (Ch.3)
What is the purpose of Wireshark? A. Sniffer B. Session hijacking C. Trojan D. Port Scanner
A. Sniffer (Ch.8)
One area of of policy compliance that many companies need to address is in meeting the credit card \_\_\_ Security standards. A. Sox B. PCI C. GLB D. HIPAA
B. PCI (Ch.7)
The OSI model consists of how many layers? A. 3 B. 5 C. 7 D. 8
C. 7 (Ch.1)
The set of regulations covers the protection of medical data and personal information. A. HIPAA B. GLB C. SOX D. Safe Harbor
A. HIPAA (Ch.6)
\_\_\_\_ is a well known incident response, computer forensics, and e-discovery tool. A. PuTTY B. Hunt C. Firesheep D. Helix
D. Helix (Ch.8)
Shawn downloads a program for his iPhone that is advertised as a game yet actually tracks his location and browser activity. This is best described as \_\_\_? A. Virus B. Worm C. Trojan D. Spam
C. Trojan (Ch.4)
\_\_\_\_ is used to send mail and to relay mail to other SMTP mail servers and uses port 25 by default. A. SMTP B. SNMP C. POP3 D. IMAP
A. SMTP (Ch.10)
\_\_\_\_ are used to prevent a former employee from releasing confidential information to a third party ? A. Dual controls B. Separation of duties C. Mandatory Vacations D. NDA's
D. NDAs (Ch.9)
This technique allows the review of an employee's duties while they are not on duty. A. Dual controls B. Separation of duties C. Mandatory vacations D. NDAs
C. Mandatory vacations (Ch.1)