Cards from Book Flashcards

1
Q

What are some examples of detective access controls?

A

Security guards, supervising users, incident investigations, and intrusion detection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some examples of physical access controls?

A

Guards, fences, motion detectors, locked doors, sealed windows, lights, backups, cable protection, laptop locks, swipe cards, dogs, CCTV, mantraps, and alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three commonly recognized authentication factors?

A

Something you know, something you have, and something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a cognitive password?

A

A series of questions about facts or predefined responses that only the subject should know (for example, what is your birth date? What is your mother’s maiden name?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name at least eight biometric factors.

A

Fingerprints, face scans, iris scans, retina scans, palm topography, palm geography, heart/pulse pattern, voice pattern, signature dynamics, keystroke patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the issues related to user acceptance of biometric enrollment and throughput rate?

A

Enrollment times longer than 2 minutes are unacceptable; subjects will typically accept a throughput rate of about 6 seconds or faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What access control technique employs security labels?

A

Mandatory access controls. Subjects are labeled as to their level of clearance. Objects are labeled as to their level of classification or sensitivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Bell–LaPadula, Biba, and Clark–Wilson access control models were all designed to protect a single aspect of security. Name the corresponding aspect for each model.

A

Bell–LaPadula protects confidentiality; Biba and Clark–Wilson protect integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the three types of subjects and their roles in a security environment.

A

The user accesses objects on a system to perform a work task, the owner is liable for protection of data, the data custodian is assigned to classify and protect data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain why the separation of duties and responsibilities is a common security practice.

A

It prevents any single subject from being able to circumvent or disable security mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the principle of least privilege?

A

Subjects should be granted only the amount of access to objects that is required to accomplish their assigned work tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the four key principles upon which access control relies.

A

Identification, authentication, authorization, accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How are domains related to decentralized access control?

A

A domain is a realm of trust that shares a common security policy. This is a form of decentralized access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is monitoring an important part of a security policy?

A

Monitoring is used to watch for security policy violations and to detect unauthorized or abnormal activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the functions of an intrusion detection system (IDS)?

A

An IDS automates the inspection of audit logs and real-time system events, detects intrusion attempts, and watches for violations of confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the pros and cons of a host-based IDS?

A

It can pinpoint resources compromised by a malicious user. It can’t detect network-only attacks or attacks on other systems, has difficulty detecting DoS attacks, and can be detected by intruders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the pros and cons of a network-based IDS?

A

It can monitor a large network and can be hardened against attack. It may be unable to handle large data flows, doesn’t work well on switched networks, and can’t pinpoint compromised resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the differences between knowledge-based and behavior-based detection methods used by IDS?

A

Knowledge-based uses a signature database and tries to match monitored events to that database. Behavior-based learns about the normal activities on your system through watching and learning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a honeynet, and what is it used for?

A

Honeynets are fake networks used to lure intruders in order to create sufficient audit trails for tracking them down and prosecuting. Honeynets contain no real or sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does penetration testing improve your system’s security?

A

Penetration testing is a good way to accurately judge the security mechanisms deployed by an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a denial-of-service attack?

A

An attack that prevents the system from receiving, processing, or responding to legitimate traffic or requests for resources and objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a spoofing attack?

A

The attacker pretends to be someone or something other than whom or what they are. They can spoof identities, IP addresses, email addresses, and phone numbers. They often replace the valid source and/or destination IP address and node numbers with false ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are countermeasures to spoofing attacks?

A

Countermeasures to spoofing attacks include patching the OS and software, enabling source/destination verification on routers, and employing an IDS to detect and block attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a man-in-the-middle attack?

A

An attack in which a malicious user is positioned between the two endpoints of a communication’s link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a replay or playback attack?

A

A malicious user records the traffic between a client and a server and then retransmits them to the server with slight variations of the timestamp and source IP address. It is similar to hijacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a sniffer attack?

A

Any activity that results in a malicious user obtaining information about a network or the traffic over that network. Data is captured using a sniffer or protocol analyzer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a spamming attack?

A

Directing floods of messages to a victim’s email inbox or other messaging system. Such attacks cause DoS issues by filling up storage space and preventing legitimate messages from being delivered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are some countermeasures to common attack methods?

A

Patching software, reconfiguring security, employing firewalls, updating filters, using IDSs/IPSs, improving security policy, using traffic filters, improving physical access control, using system monitoring/auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Name the seven layers of the OSI model by their layer name and layer number.

A

Application (7), Presentation (6), Session (5), Transport (4), Network (3), Data Link (2), and Physical (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

List the security features offered by the Network layer of the OSI model.

A

The Network layer (Layer 3) offers confidentiality, authentication, and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the maximum throughput rate and maximum usable distance for 10Base2 cable?

A

10Base2 cable has a throughput of 10 Mbps and can be run up to distances of 185 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Name the common network topologies.

A

Ring, bus, star, and mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the four layers of the TCP/IP protocols, and how do they relate to the OSI model layers?

A

The four layers of TCP/IP are Application (layers 5–7 of OSI), Transport (layer 4 of OSI), Internet (layer 3 of OSI), and Link (layers 1 and 2 of OSI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the five generation types of firewalls?

A

Static packet filtering, application-level gateway, stateful inspection, dynamic packet filtering, and kernel proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Name at least five networking device types other than firewalls.

A

Routers, switches, hubs, repeaters, bridges, gateways, proxies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a proxy, and what is it used for?

A

Any system that performs a function or requests a service on behalf of another system. Proxies are most often used to provide clients with Internet access while protecting their identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Name at least 10 network and protocol security mechanisms.

A

IPSec, SKIP, SWIPE, SSL, S/MIME, SET, PEM, PGP, PPP, SLIP, PPTP, L2TP, CHAP, PAP, RADIUS, TACACS, S-RPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Name at least six protocol services used to connect to LAN and WAN communication technologies.

A

Frame Relay, SMDS, X.25, ATM, HSSI, SDLC, HDLC, ISDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

How are PVC, SVC, DTE, and DCE used in a Frame Relay network?

A

Frame Relay requires the use of a DTE and a DCE at each connection point. PVC is always available; SVC is established using the best paths currently available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are three remote access authentication mechanisms?

A

RADIUS, DIAMETER, and TACACS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is tunneling, and why is it used?

A

A process that protects the contents of packets by encapsulating them in another protocol. This creates the logical illusion of a communications tunnel through an untrusted intermediary network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is a VPN?

A

A virtual private network (VPN) is a communication tunnel that provides point-to-point transmission of both authentication and data traffic over an intermediary network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are the four primary VPN protocols?

A

PPTP, L2F, L2TP, and IPSec (Note: SSL is a valid VPN protocol as well, but it’s not necessarily recognized on the exam as such.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are the two modes available through IPSec, and what do they do?

A

In transport mode, the IP packet data is encrypted, but the header is not. In tunnel mode, the entire IP packet is encrypted, and a new header is added to govern transmission through the tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is NAT?

A

Network Address Translation (NAT) allows the private IP addresses defined in RFC 1918 to be used in a private network while still being able to communicate with the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is transparency?

A

A characteristic of a service, security control, or access mechanism that ensures it is unseen by users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What are some important aspects to consider when designing email security?

A

Nonrepudiation, access control, message integrity, source authentication, verified delivery, acceptable use policies, privacy, management, and backup and retention policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is the most serious threat of email?

A

Email is the most common delivery mechanism for viruses, worms, Trojan horses, documents with destructive macros, and other malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What are possible mechanisms for adding security to email?

A

S/MIME, MOSS, PEM, and PGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are elements of effective user training against social-engineering attacks?

A

Always err on the side of caution whenever communications are odd or unexpected. Always request proof of identity. Classify information for voice communications. Never change passwords over the phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are the most common threats against communication systems?

A

Denial of service, eavesdropping, impersonation, replay, and modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What are some countermeasures to eavesdropping?

A

Maintaining physical access security, using encryption, employing one-time authentication methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is an ARP attack?

A

The modification of ARP mappings. When ARP mappings are falsified, packets are not sent to their proper destination. ARP mappings can be attacked through spoofing. Spoofing provides false MAC addresses for requested IP addressed systems to redirect traffic to alternate destinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is privacy?

A

Prevention of unauthorized intrusion, knowledge that information deemed personal or confidential won’t be shared with unauthorized entities, freedom from being observed without consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What are the requirements for accountability?

A

Identification, authentication, authorization, and auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is nonrepudiation?

A

Nonrepudiation prevents a subject from claiming not to have sent a message, not to have performed an action, or not to have been the cause of an event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is layering?

A

Layering is the use of multiple controls in a series. The use of a multilayered solution allows for numerous controls to be brought to bear against whatever threats come to pass.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

How is abstraction used?

A

Abstraction is used to collect similar elements into groups, classes, or roles that are assigned security controls, restrictions, or permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is data hiding?

A

Data hiding is preventing data from being known by a subject. Keeping a database from being accessed by unauthorized visitors is a form of data hiding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is change control or change management?

A

A mechanism used to systematically manage change. Typically, it involves extensive logging, auditing, and monitoring of activities related to security controls and security solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What are the goals of change management?

A

Implementation of changes in an orderly manner, formalized testing, ability to reverse changes, ability to inform users of changes, systematical analysis of changes, minimization of negative impact of changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is data classification?

A

Data classification is the primary means by which data is protected based on categories of secrecy, sensitivity, or confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What criteria are used to classify data?

A

Usefulness, timeliness, value or cost, maturity or age, lifetime or expiration period, disclosure damage assessment, modification damage assessment, national security implications, storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is the government/military data classification scheme?

A

Top secret, secret, confidential, sensitive but unclassified, unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the commercial business/private sector classification scheme?

A

Confidential, private, sensitive, public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Name at least seven security management concepts and principles.

A

CIA Triad, confidentiality, integrity, availability, privacy, identification, authentication, authorization, auditing, accountability, and nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What are the elements of a termination procedure policy?

A

Have at least one witness; escort terminated employee off the premises immediately; collect identification, access, or security devices; perform exit interview; disable network account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is the function of the data owner security role?

A

The data owner is responsible for classifying information for protection within the security solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is the data custodian security role?

A

The data custodian is assigned the tasks of implementing the prescribed protection defined by the security policy and upper management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is the function of the auditor security role?

A

The auditor is responsible for testing and verifying that the security policy is properly implemented and the derived security solutions are adequate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What should the documents that make up a formalized security structure include?

A

Policies, standards, baselines, guidelines, and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is generally involved in the processes of risk management?

A

Analyzing an environment for risks, evaluating each risk as to its likelihood and damage, assessing the cost of countermeasures, and creating a cost/benefit report to present to upper management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What should be considered when establishing the value of an asset?

A

Cost of purchase, development, maintenance, acquisition, and protection; value to owners/users/competitors; equity value; market valuation; liability of asset loss; and usefulness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Name at least five possible threats that should be evaluated when performing a risk analysis.

A

Viruses; buffer overflows; coding errors; user errors; intruders (physical and logical); natural disasters; equipment failure; misuse of data, resources, or services; loss of data; physical theft, denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is single loss expectancy, and how is it calculated?

A

The cost associated with a single realized risk against a specific asset. SLE = asset value (AV) * exposure factor (EF). The SLE is expressed in a dollar value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is annualized loss expectancy, and how is it calculated?

A

The possible yearly cost of all instances of a specific realized threat against a specific asset. ALE = single loss expectancy (SLE) * annualized rate of occurrence (ARO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What are the basics distinctions between qualitative and quantitative risk analysis?

A

Quantitative risk analysis assigns real dollar figures to the loss of an asset. Qualitative risk analysis assigns subjective and intangible values to the loss of an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What are the four possible responses by upper/senior management to risk?

A

Reduce/mitigate, assign/transfer, accept, or reject/deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is residual risk?

A

Once countermeasures are implemented, the risk that remains is known as residual risk. Residual risk is the risk that management has chosen to accept rather than mitigate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is total risk?

A

The amount of risk an organization would face if no safeguards were implemented. A formula for total risk is threats * vulnerabilities * asset value = total risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is the controls gap?

A

The difference between total risk and residual risk. The controls gap is the amount of risk that is reduced by implementing safeguards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What are the three learning levels of security?

A

Awareness, training, and education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What are the three types of plans employed in security management planning?

A

A strategic plan is a long-term plan that is fairly stable. The tactical plan is a midterm plan that provides more details. Operational plans are short term and highly detailed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

How many primary keys may each database table have?

A

One

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What type of malicious code spreads through the sharing of infected media?

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What term is used to describe intelligent code objects that perform actions on behalf of a user?

A

Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What term is used to describe code sent by a server to a client for execution on the client machine?

A

Applet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What language by Sun Microsystems is often used for applet programming and development?

A

Java

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What type of database key enforces relationships between tables?

A

Foreign key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What security principle ensures that multiple records are created in a database table for viewing at different security levels?

A

Polyinstantiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What process evaluates the technical and nontechnical security features of an IT system?

A

Certification and accreditation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What type of accreditation evaluates the systems and applications at a specific, self-contained location?

A

Site accreditation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

In which phase of the Software Capability Maturity Model do you often find hardworking people charging ahead in a disorganized fashion?

A

Initial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

In which layer of the ring protection scheme do user applications reside?

A

Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What system mode requires that the system process only one classification level at a time and all system users have clearance and need to know that information?

A

Dedicated security mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What is another term for the master boot record?

A

Boot sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What type of virus embeds itself in application documents?

A

Macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What can antivirus programs do when they encounter a virus infection?

A

Delete the file, disinfect the file, or quarantine the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What type of virus modifies itself each time it infects a new system in an attempt to avoid detection?

A

Polymorphic virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What type of malicious code launches itself when certain conditions (such as a specific date) are met?

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What were the mechanisms of action used by Robert T. Morris’s Internet Worm of 1988?

A

The worm exploited vulnerabilities in the Sendmail debug mode and finger daemon, launched password attacks, and exploited trust relationships between systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Where are passwords stored in a UNIX system?

A

In the /etc/passwd or /etc/shadow file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What term is used to describe hackers rooting through trash looking for useful information?

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What is the cornerstone of computer security?

A

Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What are the three phases of the three-way handshake used by TCP/IP?

A

SYN, SYN/ACK, ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

How does the teardrop attack operate?

A

It sends overlapping packet fragments to the victim machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What is the term used to describe a secret method used by a programmer to gain access to the system?

A

Trap door (or back door)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

When is the XOR function true?

A

When only one of the input bits is true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What term describes a mathematical function that easily produces output values for each possible combination of inputs but makes it impossible to retrieve the input values?

A

One-way function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

True or false? All ciphers are meant to obscure the meaning of a message.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

True or false? All codes are meant to obscure the meaning of a message.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What occurs when a change in the plain text results in multiple changes spread throughout the cipher text?

A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What is the code name of the project in which the National Security Agency successfully broke a Soviet one-time pad system in the 1940s?

A

VENONA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What type of cipher is the Caesar cipher?

A

Simple substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

True or false? Modern cryptosystems rely on the secrecy of the encryption algorithm.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

What is the length of the key used by the standard DES algorithm?

A

56 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

How many rounds of encryption does DES utilize?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

True or false? The IDEA algorithm is available free for noncommercial use.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

What encryption algorithm was selected for the Advanced Encryption Standard (AES)?

A

Rijndael

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

What is the Diffie-Hellman algorithm is most commonly used for?

A

Key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

True or false? The Hashed Message Authentication Code provides nonrepudiation.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

What are the three encryption algorithms supported by the Digital Signature Standard?

A

DSA, RSA, and ECDSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

What ITU standard describes the contents of a digital certificate?

A

X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

What is the process by which you are issued a digital certificate?

A

Enrollment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Who issues digital certificates?

A

Certificate authorities (CAs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

True or false? PEM provides protection against replay attacks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

What protocol uses the RSA encryption algorithm to provide encrypted mail support for a number of common commercial email packages?

A

S/MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

True or false? S-HTTP secures individual messages between a client and a server.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

What cryptographic methods are used by the Secure Electronic Transaction (SET) protocol?

A

RSA public key cryptography and DES private key cryptography in connection with digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

What are the four components of IPSec?

A

Authentication Header (AH), Encapsulating Security Payload (ESP), IP Payload Compression protocol (IPComp), and Internet Key Exchange (IKE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

What type of cryptographic attack is used against algorithms that don’t incorporate temporal protections?

A

Replay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

What are some common reasons a certificate might need to be revoked?

A

The certificate was compromised, the certificate was erroneously issued, the certificate details changed, and there was a change of security association.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

What type of cryptography relies on the use of public and private keys?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

What technology allows multiple users to make use of the same process without interfering with each other?

A

Multithreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

What are some of the terms used to describe the CPU mode that gives access to the full range of supported instructions?

A

System mode, privileged mode, supervisory mode, and kernel mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

What is the greatest security risk to RAM modules?

A

Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

What addressing scheme supplies the CPU with the actual address of the memory location to be accessed?

A

Direct addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Magnetic/optical media devices are classified as what type of memory?

A

Secondary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Memory devices designed to retain their data when power is removed are known as .

A

nonvolatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

What two ways can storage devices be accessed?

A

Randomly and sequentially

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

What is the greatest security risk to computer monitors?

A

TEMPEST technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

What is another term often used for firmware?

A

Microcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Where are the operating system–independent primitive instructions that a computer needs to start and load the operating system stored?

A

BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

What concept ensures that data existing at one level of security is not visible to processes running at different security levels?

A

Data hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

What are the important factors in personnel management?

A

Hiring practices, ongoing job performance reviews, and termination procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

What security mechanisms are countermeasures to collusion?

A

Job rotation, separation of duties, mandatory vacations, workstation change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Why is antivirus protection important?

A

Viruses are the most common form of security breach in the IT world. Any communications pathway can and is being exploited as a delivery mechanism for a virus or other malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

What is need to know?

A

Need to know is the requirement to have access to, knowledge of, or possession of data or a resource in order to perform specific work tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

What principle states that users should be granted the least amount of access to the secure environment as possible for them to be able to complete their work tasks?

A

Principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

What are due care and due diligence?

A

Due care is using reasonable care to protect the interest of an organization. Due diligence is practicing the activities that maintain the due care effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

How are security and illegal activities related?

A

A secure environment should provide mechanisms to prevent the committal of illegal activities, which are actions that violate a legal restriction, regulation, or requirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

With what level of security precautions should backup media be treated?

A

Backup media should be handled with the same security precautions as any other asset with the same data classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

What are the goals of managing backup media?

A

Preventing disclosure, destruction, or alteration of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

What are the processes that can be applied to used media in order to prepare the media for reuse in various environments?

A

Erasing, clearing, and overwriting media that will be used in the same classification environments; purging, sanitizing, and degaussing if media is used in different classification environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

What are the classifications of security control types?

A

Preventive, deterrent, detective, corrective, recovery, compensation, directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

What is the purpose of auditing?

A

To ensure compliance with security policy and to detect abnormalities, unauthorized occurrences, or outright crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

What types of activities are labeled as auditing?

A

Recording of event/occurrence data, examination of data, data reduction, use of event/occurrence alarm triggers, log analysis, logging, monitoring, using alerts, intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

What is the purpose of compliance testing?

A

To ensure that all of the necessary and required elements of a security solution are properly deployed and functioning as expected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

How are audit trails used?

A

To reconstruct an event, to extract information about an incident, to prove or disprove culpability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

What types of activities can be used as penetration tests?

A

War dialing, sniffing, eavesdropping, radiation monitoring, dumpster diving, social engineering, port scanning, ping scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

What are some ways to keep inappropriate content to a minimum?

A

Address the issue in the security policy, perform awareness training, use content filtering tools to filter source or word content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Why is it important to protect against resource waste?

A

If the storage space, computing power, or networking bandwidth capacity is consumed by inappropriate or non-work-related (non-profit-producing) data, the organization loses money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Why is it important to protect against privilege abuse?

A

It can cause the disclosure of sensitive information, violating the principle of confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

What countermeasures are moderately effective against errors and omissions?

A

Input validators and user training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

How can you protect data against fraud and theft?

A

The use of access controls (auditing and monitoring, for example) reduce fraud and theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

What are some safeguards against sabotage?

A

Intensive auditing, monitoring for abnormal or unauthorized activity, keeping lines of communication open between employees and managers, and compensating and recognizing employees for excellence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Why isn’t there an effective direct countermeasure against the threat of malicious hackers or crackers?

A

Most safeguards and countermeasures protect against one specific threat or another, but it is not possible to protect against all possible threats that a cracker represents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

What is malicious code?

A

Malicious code is any script or program that performs an unwanted, unauthorized, or unknown activity on a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

True or false? Senior management should be included in the BCP process from the beginning.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

What resource is in greatest demand during the BCP testing, training, and maintenance process?

A

Manpower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

What type of decision making is mainly concerned with metrics such as dollar values and downtime?

A

Quantitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

What Business Impact Analysis/Assessment variable is used to describe the longest period of time a resource can be unavailable without causing irreparable harm to the business?

A

Maximum tolerable downtime (MTD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

What is the formula for computing single loss expectancy?

A

SLE = AV * EF [Single Loss Expectancy = Asset Value * Exposure Factor]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

What is the formula for computing annualized loss expectancy?

A

ALE = SLE * ARO [Annualized Loss Expectancy = Single Loss Expectancy * Annual Rate of Occurrence]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

What are some of the qualitative factors that must be taken into account when assessing the cost of a disaster?

A

Loss of goodwill among client base, loss of employees after prolonged downtime, social/ethical responsibilities to the community, and negative publicity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

What is the first thing you should do when a disaster strikes?

A

Ensure that people are safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

What are the two possible responses to a risk?

A

Acceptance and mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Provide two examples of devices that might be used to harden a system.

A

Computer-safe fire suppression systems and uninterruptible power supplies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

What is the goal of business continuity planning (BCP)?

A

To ensure the continuous operation of a business in the face of an emergency situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

What are some of the elements that should be included in emergency response guidelines?

A

Immediate response procedures, notification procedures, and secondary response procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

What are the five steps of the business impact assessment process?

A

Identification of priorities, risk identification, likelihood assessment, impact assessment, and resource prioritization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

What process brings order to the chaotic events surrounding the interruption of an organization’s normal activities by an emergency?

A

Disaster recovery planning (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Name some common natural disasters.

A

Earthquakes, floods, storms, tornadoes, and fires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

What organization sponsors the National Flood Insurance Program and is a good source of historical flood information?

A

Federal Emergency Management Agency (FEMA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

What disaster recovery system is often highly dependent on the public water supply?

A

Fire suppression system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

What type of disaster recovery separates recovery sites by business teams?

A

Workgroup recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

What are the three major options for alternative processing sites?

A

Hot sites, warm sites, and cold sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

What type of recovery site is particularly suited to workgroup recovery options?

A

Mobile site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

True or false? Organizations participating in a mutual assistance agreement are typically located in the same geographic region.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

True or false? There is an accepted standards document defining the requirements for an electronic vaulting solution.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

What is the most common document type used for emergency response plans?

A

Checklists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

What are the three major types of filesystem backups?

A

Full backups, incremental backups, and differential backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

What can be used to protect a company against the failure of a developer to provide adequate support?

A

Software escrow agreements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

It is sometimes useful to separate disaster tasks from disaster tasks.

A

recovery, restoration (in either order)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

True or false? In most circumstances, it is illegal for an employer to monitor an employee’s email.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

If a witness is not able to uniquely identify an object, how else may it be authenticated in court?

A

By establishing a chain of evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

What type of evidence is an authenticated computer log?

A

Documentary evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

What are the three major evidence admissibility requirements?

A

Evidence must be relevant, material, and competent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

What law created the category of mission-critical computer systems?

A

Government Information Security Reform Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

What are the two requirements for acceptance of a trademark application?

A

The trademark must not be confusingly similar to another trademark, and it must not be descriptive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

What are the three requirements for acceptance of a patent application?

A

The invention must be new, useful, and nonobvious.

202
Q

How long does trade secret protection last?

A

Indefinitely

203
Q

What type of license agreements are written on the outside of software packaging and require no action from the user other than opening the package?

A

Shrink-wrap

204
Q

What amendment to the U.S. Constitution forms the basis for privacy rights?

A

Fourth Amendment

205
Q

What law requires that websites provide parents with the opportunity to review any information collected from their children?

A

Children’s Online Privacy Protection Act

206
Q

What law grants privacy rights to students enrolled in educational institutions that accept government funding?

A

Family Educational Rights and Privacy Act

207
Q

Which type of computer crime attacks an organization’s computer system to extract confidential information?

A

Business attack

208
Q

Which type of computer crime would likely be timed to occur simultaneously with a physical attack to reduce the ability to effectively respond to the physical attack?

A

Terrorist attack

209
Q

What term refers to any hardware, software, or data that can be used to prove the identity and actions of an attacker?

A

Evidence

210
Q

What term describes any violation or threatened violation of a security policy?

A

Incident

211
Q

Which type of incident generally does not cause direct damage to the victim?

A

Scanning. The purpose of a scanning attack is to collect information. The real damage to the system occurs in later attacks.

212
Q

How do you protect your system from a malicious code incident?

A

Make sure your security policy restricts the introduction of untested files to your computer system. Have a good scanner with an up-to-date signature database. Frequently scan all files.

213
Q

Which two types of incidents are the easiest to stop by dynamically altering filtering rules?

A

Scanning and denial of service. They can both potentially be stopped by filtering out the offending packets.

214
Q

What must you do to make sure evidence is kept viable for use in a trial?

A

You must ensure that the evidence has not changed, and you must be able to validate its integrity.

215
Q

Where should you begin looking to find information about an incident that occurred in the recent past?

A

The first place to look is in the system and network log files.

216
Q

If an incident has occurred that has violated no laws or regulations, how do you determine whether to report it?

A

The incident reporting guidelines should be in your security policy.

217
Q

Is adherence to the (ISC)2 Code of Ethics recommended, mandatory, or optional for CISSPs?

A

Adherence to the (ISC)2 Code of Ethics is mandatory, and acceptance of the Code of Ethics is a condition of certification.

218
Q

What is the leading reason many incidents are not reported?

A

Because they are not recognized as incidents

219
Q

What are the three main types of physical security controls?

A

Administrative physical security controls, technical physical security controls, physical controls for physical security

220
Q

What is the primary purpose of lighting as a physical security device?

A

To discourage casual intruders, trespassers, prowlers, and would-be thieves

221
Q

What are the benefits of security guards?

A

They are able to adapt and react to any condition or situation, are able to learn and recognize attack patterns, can adjust to a changing environment, and are able to make decisions and judgment calls.

222
Q

What are the disadvantages of security guards?

A

Not all environments support them; prescreening, bonding, and training is not always effective; they are expensive, subject to illness, take vacations, and are vulnerable to social engineering.

223
Q

What are the benefits and disadvantages of guard dogs?

A

They can be deployed as a perimeter security control and as detection and deterrent agents, they are costly and require high maintenance, and their use involves insurance and liability issues.

224
Q

What are the 11 electrical terms and definitions you should be aware of?

A

Fault, blackout, sag, brownout, spike, surge, inrush, noise, transient, clean, ground

225
Q

What are the types of noise or interference and their sources?

A

Common mode noise is generated by the difference in power between the hot and ground wires. Traverse mode noise is generated by the difference in power between the hot and neutral wires.

226
Q

What are the typical HVAC requirements for a computer room?

A

A computer room should be kept at 60 to 75 degrees Fahrenheit (15 to 23 degrees Celsius). Humidity in a computer room should be maintained at between 40 and 60 percent.

227
Q

What type of damage occurs when static electricity discharges exceed 40 volts?

A

Destruction of sensitive circuits

228
Q

What is a Type C fire extinguisher used for, and what is it made of?

A

A Type C fire extinguisher is for use on electrical devices and uses CO2 or Halon.

229
Q

What are the four types of water-based fire suppression systems?

A

Wet pipe system, dry pipe system, deluge system, preaction system

230
Q

What are the alternatives for Halon?

A

FM-200 (HFC-227ea), CEA-410 or CEA 308, NAF-S-III (HCFC Blend A), FE-13 (HCFC-23), Aragon (IG55) or Argonite (IG01), Inergen (IG541), and low-pressure water mists

231
Q

Which security vulnerability conveys information by altering the performance of a system component or modifying a resource’s timing in a predictable manner?

A

Covert timing channel

232
Q

What is a separate object that is associated with a resource and describes its security attributes?

A

Security token

233
Q

In the Clark–Wilson security model, what is a procedure that scans data items and confirms their integrity?

A

Integrity verification procedure (IVP)

234
Q

In the Biba integrity model, what is the Simple Integrity Axiom, which states that a subject cannot read an object of a lower integrity, also called?

A

No read down

235
Q

Which organization developed the Bell–LaPadula security model?

A

The U.S. Department of Defense

236
Q

What is the collection of TCB components that work together to implement the reference monitor functions?

A

Security kernel

237
Q

What does ITSEC call the system that is being evaluated?

A

The target of evaluation (TOE)

238
Q

What TCSEC category is reserved for systems that have been evaluated but do not meet the requirements of any other category?

A

Category D (minimal protection)

239
Q

Which IPSec protocol provides integrity, authentication, and nonrepudiation to the secure message exchange?

A

Authentication Header (AH)

240
Q

Which type of controls considers static attributes of the subject and the object to determine the permissibility of an access?

A

Mandatory access controls

241
Q

What term is used to refer to the user or process that makes a request to access a resource?

A

Subject

242
Q

What is the imaginary boundary that separates the TCB from the rest of the system?

A

Security perimeter

243
Q

What term describes the technical evaluation of each part of a computer system to assess its concordance with security standards?

A

Certification

244
Q

What is the difference between analog and digital signals?

A

Analog communications occur with a continuous signal that varies in frequency, amplitude, and so on. Digital communications occur through the use of a state change of on-off pulses.

245
Q

What is the difference between synchronous and asynchronous communications?

A

Synchronous communications rely upon a timing or clocking mechanism. Asynchronous communications rely on a stop and start delimiter bit to manage transmission of data.

246
Q

What is the difference between baseband and broadband communications?

A

Baseband technology uses a direct current to support a single communication channel. Broadband technology uses frequency modulation to support multiple simultaneous signals.

247
Q

Describe broadcast, multicast, and unicast communications.

A

A broadcast supports communications to all possible recipients. A multicast supports communications to multiple specific recipients. A unicast supports only a single communication to one recipient.

248
Q

What is the difference between packet switching and circuit switching?

A

In circuit switching, a dedicated physical pathway is created between the two parties. Packet switching occurs when the message is broken up into segments and sent across the intermediary network.

249
Q

What are the characteristics of PPP?

A

The Point-to-Point Protocol (PPP) is an encapsulation protocol designed to support the transmission of IP traffic over dial-up or point-to-point links. PPP supports CHAP and PAP for authentication.

250
Q

What are the characteristics of SLIP?

A

Serial Line Internet Protocol (SLIP) offers no authentication, supports only half-duplex communications, has no error detection capabilities, and requires manual link establishment and teardown.

251
Q

What is CORBA?

A

Common Object Request Broker Architecture (CORBA) is an international standard (sanctioned by the International Organization for Standardization) for distributed computing.

252
Q

What’s the most desirable default setting for access control?

A

Denial. When access is not specifically granted, it should be denied by default. This is also known as implicit deny.

253
Q

What type of approach to security is considered better than a fortress mentality approach?

A

Defense in depth, multiple layers of security, concentric circles of security

254
Q

What form of password attack consists first of a dictionary attack and then a brute-force attack based on the dictionary list?

A

A hybrid attack. Sometimes called a one-upped password attack.

255
Q

What is the most acceptable form of biometrics to end users?

A

Iris scans

256
Q

What is the most unacceptable form of biometric control to end users?

A

Retina scans

257
Q

What is the stored sample of a biometric factor called?

A

A reference profile or a reference template

258
Q

With what other forms of single sign-on can Kerberos be combined?

A

Any or all of them, including SESAME, KryptoKnight, NetSP, thin clients, directory services, and scripted access

259
Q

How is the ticket-granting ticket used by Kerberos generated?

A

The user’s password is hashed, and a timestamp is added.

260
Q

What is a centralized database of resources available to the network?

A

A directory service

261
Q

What are examples of rule-based access control?

A

MAC, RBAC, TBAC

262
Q

What form of access control can combine levels of security domains with compartments of additional control and isolation?

A

MAC (specifically, a hybrid MAC environment)

263
Q

What form of access control is best suited to those organizations with a high rate of employee turnover?

A

RBAC

264
Q

When an intrusion is detected, what should be the first response?

A

Contain or constrain the intrusion.

265
Q

Once an intrusion has occurred, what is the most secure process for restoring the environment?

A

Format and reinstall from scratch.

266
Q

What form of IDS is easier for an intruder to discover and disable?

A

Host-based IDS

267
Q

What feature of network infrastructure is also usable as a countermeasure against rogue IDS and sniffers?

A

Switches

268
Q

What network device works primarily at the Application layer?

A

Gateway

269
Q

What are the most common causes of network failure?

A

Cable failures and misconfigurations

270
Q

What type of cabling must be used to comply with building code safety requirements?

A

Plenum-rated cable

271
Q

How many sockets does TCP have?

A

65, 536 (2^16) sockets (aka ports), numbered from 0 to 65,535

272
Q

What is the IP header protocol field value for TCP? UDP? ICMP? IGMP?

A

6, 17, 1, 2

273
Q

What protocol is used by ping, pathping, and traceroute?

A

ICMP

274
Q

What is the APIPA range?

A

169.254.0.1 to 169.254.255.254 along with the default Class B subnet mask of 255.255.0.0

275
Q

What port is used by IMAP?

A

143

276
Q

What port is used by DHCP?

A

Port 68 for client request broadcast and port 67 for server point-to-point response

277
Q

Network devices at what layer and above separate collision domains?

A

Layer 2

278
Q

Network devices at what layer and above separate broadcast domains?

A

Layer 3

279
Q

Which VPN protocol supports multiple simultaneous connections?

A

IPSec

280
Q

What is the primary weakness of satellite communications?

A

Large terrestrial footprint

281
Q

What makes the usable throughput of ISDN less than the stated bandwidth?

A

The D channel is used only for call management, not data.

282
Q

What type of system is a common target of attackers who want to disseminate email spam?

A

Open relay SMTP servers

283
Q

What is the primary method to improve fax security?

A

Disable automatic printing of received faxes.

284
Q

What is the form of new system deployment testing called when the new system and the old system are run simultaneously?

A

Parallel run

285
Q

When an asset no longer needs or warrants a high security sensitivity label, what should occur?

A

Declassification

286
Q

What is the name of the security management approach in which senior management calls the shots?

A

Top-down approach

287
Q

What is the cost/benefit analysis equation for countermeasures?

A

(ALE before safeguard – ALE after implementing the safeguard) – annual cost of safeguard = value of the safeguard to the company

288
Q

What type of relationships can be established with relational databases? With hierarchical databases? With distributed databases?

A

One-to-one, one-to-many, and many-to-many

289
Q

What are the six basic SQL commands?

A

Select, Update, Delete, Insert, Grant, and Revoke

290
Q

What is a placeholder for SQL literal values such as numbers or character strings?

A

Bind variable

291
Q

What database security feature uses locking to prevent simultaneous write access to cells?

A

Concurrency

292
Q

What database security feature can be used to subvert aggregation, inferencing, and contamination vulnerabilities?

A

Database partitioning

293
Q

What feature of databases allows two or more rows in the same table to appear to have identical primary key elements but contain different data for use at differing classification levels?

A

Polyinstantiation

294
Q

What acts as an interface between back-end database systems and user applications?

A

ODBC

295
Q

What attack collects numerous low-level security items or low-value items and combines them together to create something of a higher security level or value?

A

Aggregation

296
Q

What is more secure than a data warehouse and designed to store metadata?

A

Data mart

297
Q

What type of application analyzes business data and presents it in such a way to make business decisions easier for users?

A

Decision support system

298
Q

What security problem cannot be prevented or compensated for by environmental controls or hardware devices?

A

Bad coding

299
Q

What is a valid security response when an application violates OS-imposed security, such as interfering with other processes or accessing hardware directly?

A

Stopping the environment, a STOP error, a BSOD

300
Q

What is it called when programmers decompile vendor code in order to understand the intricate details of its functionality?

A

Reverse engineering

301
Q

What is the communications to or input of an object?

A

Message

302
Q

What is the internal code that defines the actions an object performs in response to a message?

A

Method

303
Q

What are the results or output exhibited by an object based upon processing a message through a method?

A

Behavior

304
Q

What is the collection of the common methods from a set of objects that is used to define the behavior of those objects?

A

Class

305
Q

What is it called when an object is an example of a class because the object contains a method from that class?

A

Instance

306
Q

What characteristic describes an object that exhibits different behaviors based upon the same message and methods because of variances in external conditions?

A

Polymorphism

307
Q

Highly objects are not as dependent on other objects.

A

cohesive

308
Q

Lower provides better software design because objects are more independent.

A

coupling

309
Q

What is a type of bar chart that shows the interrelationships over time between projects and schedules?

A

Gantt chart

310
Q

What is a project-scheduling tool that is used to judge the size of a software product in development and calculate the standard deviation for risk assessment?

A

Program Evaluation Review Technique (PERT)

311
Q

What form of testing examines the internal logical structures of a program?

A

White-box testing

312
Q

What form of testing examines the input and output of a program without focusing on the internal logical structures?

A

Black-box testing

313
Q

What form of testing examines the extent of the system testing in order to locate untested program logic?

A

Test data method

314
Q

Which form of antivirus response not only removes the virus from the system but also repairs any related damage?

A

Cleaning

315
Q

What is the name of the assumption that all algorithms should be public but all keys should remain private?

A

Kerchoff principle

316
Q

What is the range of valid values of keys for an algorithm called?

A

Key space

317
Q

What defines the hardware and software requirements of cryptographic modules in use by the federal government?

A

Federal Information Processing Standards (FIPS-140)

318
Q

What acts as a placeholder variable in mathematical functions and is used in random number generation?

A

Nonce

319
Q

What is a random bit string (a nonce) that is the same length as the block size that is XORed with the message and adds strength to cryptography systems?

A

Initialization vector (IV)

320
Q

What is the most significant bit in a string?

A

The leftmost bit

321
Q

What is it called when a plain-text message generates identical cipher-text messages using the same algorithm but different keys?

A

Clustering or key clustering

322
Q

What is a concept of communication whereby a specific type of information is exchanged but no real data is exchanged?

A

Zero-knowledge proof

323
Q

What is the basic idea that the information or privilege required to perform an operation is divided among multiple users (it is an application of separation of duties)?

A

Split knowledge

324
Q

What is an example of split knowledge employed to protect key escrow?

A

M of N Control

325
Q

What is a way of measuring the strength of a cryptography system by measuring the effort in terms of cost and/or time?

A

Work function or work factor

326
Q

What is an example of a polyalphabetic substitution cipher?

A

Vigenère cipher

327
Q

What attack is often successful against substitution ciphers?

A

Frequency analysis

328
Q

What attack is often successful against polyalphabetic substitution ciphers?

A

Period analysis

329
Q

What form of encryption is used to protect communications that occur in real time?

A

Stream ciphers

330
Q

What form of encryption can provide secure communications between two parties when they have no prior method of communicating securely?

A

Asymmetric cryptography

331
Q

What modes of DES employ an IV?

A

CBC, CFB, OFB

332
Q

What are the valid key sizes for RC5?

A

0 to 2,048 bits

333
Q

If a message is signed and encrypted, what security services are you providing?

A

Confidentiality, integrity, authenticity/access control, and nonrepudiation

334
Q

Who has the responsibility to ensure that communications are secured?

A

The sender

335
Q

What protocol is used to provide cryptographically secure wireless network access?

A

Wireless Application Protocol (WAP)

336
Q

What is the standard that wireless networking technology is based on?

A

802.11

337
Q

What cryptographic attack attempts to find a weakness in the algorithm?

A

Analytic attack

338
Q

What cryptographic attack attempts to find a weakness in the software code?

A

Implementation attack

339
Q

What cryptographic attack attempts to exploit weaknesses in the computer hardware or operating system?

A

Statistical attack

340
Q

A system is one in which all protection mechanisms work together to process sensitive data for many types of users while maintaining a stable and secure computing environment.

A

trusted

341
Q
               is simply defined as the degree of confidence in satisfaction of security needs.
A

Assurance

342
Q

What are the security requests of a client called under Common Criteria?

A

Protection profile

343
Q

What are the security features of a designed system called under Common Criteria?

A

Security target

344
Q

What method of verifying or establishing a trusted label of system security requires a DAA?

A

Accreditation

345
Q

What is the name of the accreditation process of the Department of Defense?

A

Defense Information Technology Security Certification and Accreditation Process (DITSCAP)

346
Q

What are the three forms of accreditation offered by National Information Assurance Certification and Accreditation Process (NIACAP)?

A

Site, type, system

347
Q

What is often added to passwords under Linux to make their resultant hash even more secure?

A

Salts

348
Q

When a disaster strikes but your ability to perform work tasks is only threatened, not actually interrupted, what response should be used?

A

BCP

349
Q

What is always your top priority when dealing with a disaster of any type or significance?

A

Safety of personnel

350
Q

What feature of insurance can improve your ability to replace lost or damaged assets?

A

Actual Cost Value (ACV)

351
Q

What is the most common cause of unplanned downtime?

A

Hardware failures

352
Q

What are some examples of alternate processing facilities that should be considered when designing a DRP?

A

Hot, warm, and cold sites; mobile sites; service bureaus; multiple sites; and reciprocal agreements

353
Q

What forms of backup always set the archive bit to 0?

A

Full and incremental

354
Q

What backup media is appropriate for personal backups but not for network backups?

A

Writable CDs and DVDs

355
Q

What form of backup, when used to restore data, will always result in some amount of data loss?

A

Periodic backups

356
Q

What law requires all communications carriers to make wiretaps possible for law enforcement with an appropriate court order regardless of the technology in use?

A

Communications Assistance for Law Enforcement Act (CALEA) of 1994

357
Q

What law extends the definition of property to include proprietary economic information so that the theft of this information can be considered industrial or corporate espionage?

A

Economic and Protection of Proprietary Information Act of 1996

358
Q
               controls are your first line of defense, while                 are your last line of defense.
A

Physical, people

359
Q

What is the functional order of controls when deployed for physical security?

A

Deterrence, then denial, then detection, then delay

360
Q

What type of lock consists of three elements: an electromagnet, a credential reader, and a door-closed sensor?

A

Electronic access control (EAC)

361
Q

Reviewing the recorded images from CCTV is what type of security control?

A

Detective

362
Q

What is the primary difference between memory cards and smart cards?

A

Processing capability

363
Q

At what stage of a fire is a flame visible?

A

Stage 3: Flame

364
Q

What is the most common cause of fires in a data center?

A

Overloaded electrical distribution outlets

365
Q

Where should fire detectors be placed?

A

In dropped ceilings, raised floors, server rooms, private offices and public areas, HVAC vents, elevator shafts, the basement, and so on

366
Q

What is the most common cause of failure of a water-based suppression system?

A

Human error

367
Q

Name one or more examples of vector routing protocol.

A

RIP, IGRP, BGP

368
Q

Name an example of a link state routing protocol.

A

OSPF

369
Q

At what layer does SSL and TLS function?

A

Transport layer (OSI layer 4)

370
Q

Name at least four technologies commonly called wireless.

A

802.11 networking, Bluetooth (802.15), mobile phones, and cordless phones

371
Q

What are the three unlicensed frequencies (at least in the United States as designated by the FCC)?

A

900 MHz, 2.4 GHz, and 5 GHz

372
Q

Name three wireless frequency access technologies.

A

FHSS, DSSS, and OFDM

373
Q

What protocol can be used to enable mobile phone access to Internet resources?

A

Wireless Application Protocol (WAP)

374
Q

What is the IEEE standard for Bluetooth?

A

802.15

375
Q

What is the IEEE standard for WiMax?

A

802.16

376
Q

What is another name for the area of Bluetooth connectivity?

A

Personal area network (PAN)

377
Q

What is the primary security feature of Bluetooth pairing?

A

A four-digit PIN

378
Q

What two items are required for infrastructure mode wireless networking?

A

Wireless access points and wireless clients

379
Q

What mode is used when a wireless network link is established without the use of an access point?

A

Ad hoc or peer-to-peer

380
Q

What is the minimum amount of information needed by a wireless client to connect to a network hosted by a wireless access point?

A

SSID

381
Q

Name four examples of infrastructure mode wireless networking.

A

Stand-alone, wired extension, enterprise extended, and bridge

382
Q

How many wireless networking channels exist on devices in the United States? In Europe? In Japan?

A

United States: 11, Europe: 13, Japan: 17

383
Q

What is the native authentication and encryption scheme of 802.11?

A

Wired Equivalent Privacy (WEP)

384
Q

Name two alternatives to WEP for 802.11.

A

WPA and WPA-2 (802.11i)

385
Q

What two forms of authentication are supported by 802.11?

A

Open System Authentication (OSA) and Shared Key Authentication (SKA)

386
Q

What is the minimum length of a TCP header?

A

20 bytes

387
Q

How long is a UDP header?

A

8 bytes

388
Q

What are the four TCP header flags that are used in virtual circuit setup and teardown?

A

SYN, ACK, FIN, and RES (or RST)

389
Q

What two ICMP type field values are employed in a successful ping activity?

A

8: echo request, 0: echo reply

390
Q

What is Control Objectives for Information and Related Technology (COBIT)?

A

A security concept infrastructure used to organize the complex security solution of companies.

391
Q

What form of testing examines the internal logical structures of a program from a developer’s perspective?

A

White-box testing

392
Q

What form of testing examines the input and output of a program without access to the internal logical structures?

A

Black-box testing

393
Q

What form of testing examines the input and output of a program with access to the internal logical structures?

A

Grey-box testing

394
Q

What kinds of items qualify as access controls?

A

Any hardware, software, or organizational administrative policy or procedure that maintains confidentiality, integrity, and/or accountability also counts as an access control.

395
Q

What is the proper term for ensuring that information is accessible only to authorized parties?

A

Confidentiality

396
Q

What is the proper term for the assurance that information and security controls used to protect information are accessible and usable when needed?

A

Availability

397
Q

What is it called when an authorized party indicates its intention to fulfill some contractual obligation and forgoes its right to dispute that fulfillment after the fact?

A

Nonrepudiation

398
Q

Items of information used to establish or prove authorized identities are known as what kind of factors?

A

Authentication

399
Q

What kind of access control enforces access policy determined by the owner of the object to which the control applies?

A

Discretionary access control (DAC)

400
Q

What kind of access control is determined by the system in which the object resides rather than its owner?

A

Mandatory access control (MAC)

401
Q

Which access control scheme requires organizational roles to be defined along with various task requirements and applicable object permissions?

A

Role-based access control (RBAC)

402
Q

Which access control scheme requires administrative rules to be defined along with the various conditions under which they apply as well as applicable object permissions?

A

Rule-based access control

403
Q

What is the practice of defense in depth called when it involves a multilayered security infrastructure that includes multiple combined individual applications and processes?

A

Concentric circle strategy

404
Q

What is the term for exercising reasonable care in protecting organizational assets and interests, including development of a formalized security structure consisting of policies, procedures, and protocols?

A

Due care

405
Q

When users are granted only the minimum access necessary to complete some task or process, what principle is involved?

A

The principle of least privilege

406
Q

What kinds of processes must be applied when confidential storage media is prepared for reuse in questionably secure environments?

A

Declassification

407
Q

What is the name for the demagnetization process used to erase disk drives or tapes to wipe out all previously stored data?

A

Degaussing

408
Q

What kind of control does any security tool provide when it’s used to guide the security implementation within an organization?

A

Directive control

409
Q

What kind of control does any mechanism, tool, or practice provide if it deters or mitigates undesirable actions or events?

A

Preventive control

410
Q

What kind of control should be used to verify the effectiveness of other security controls?

A

Detective control

411
Q

What kind of check should be applied to ensure that all necessary elements of a security solution are properly deployed and functioning as expected?

A

Compliance checking

412
Q

What do you call a person who is trained in responsible network security methods, who employs a philosophy of nondestructive and nonintrusive penetration testing, but who may also use underground or “black-hat” tools?

A

Ethical hacker

413
Q

What is the proper name for a criminal act committed against an organization by a current or former employee who exploits knowledge gained on the job in its perpetration?

A

Sabotage

414
Q

What is the proper name for the illegal intent behind obtaining and profiting from sensitive information that belongs to some third party (government, corporation, individual, and so on)?

A

Espionage

415
Q

When a person attempts to deceive an insider within an organization to divulge sensitive information or to perform sensitive actions on their behalf, what might this be called?

A

Social engineering

416
Q

When a penetration test team is privy to detailed information about organizational assets, including hardware and software inventory, but not to other information (accounts, users, naming conventions, and so on), how might this team be described?

A

Partial-knowledge team

417
Q

When a penetration test team is privy only to what it itself can learn about the target organizations for the test, how might this team be described?

A

Zero-knowledge team (performs black-box testing)

418
Q

What term identifies the data extraction technique whereby elements of data are extracted from a much larger body of data to construct a meaningful representation of its overall contents?

A

Sampling

419
Q

What governs how long records are kept to substantiate system security assessments and support system analysis?

A

Record retention

420
Q

What does BCP stand for, and what does it mean?

A

Business continuity planning (BCP) is the preventive practice of establishing and planning for threats to business flow, including natural and unnatural risk and threats to daily operations.

421
Q

What does DRP stand for, and what does it mean?

A

Disaster recovery planning (DRP) is the practice of establishing and executing recovery actions as part of an emergency response following a disaster.

422
Q

What term describes damage from disruptive and irresistible forces of nature (such as earthquakes, floods, storms, and so on)?

A

Natural disaster

423
Q

What term describes damage resulting from arson, human error, acts of terrorism, or power outages and other utility failures?

A

Man-made disaster

424
Q

What kind of strategy drives defining practices, policies, and procedures to restore a business to normal operation in the wake of some kind of outage or disaster?

A

Recovery strategy

425
Q

What label applies to a partial standby facility for which power and other infrastructure elements are available, but for which no operational computing facilities are supplied in advance of a disaster?

A

Cold site

426
Q

What label applies to a standby facility that is ready to take over for a primary facility as soon as notice is received that the primary facility has gone down?

A

Hot site

427
Q

What label applies to a site that is already provisioned with hardware and software to take over for a primary facility but that needs to obtain and install a backup or image of client-specific data before going online?

A

Warm site

428
Q

How might you describe a site housed in self-contained transportable units with all the control, hardware, and software elements necessary to establish an operational, safe computing environment?

A

Mobile site

429
Q

What roles can a service bureau play in disaster recovery?

A

Service bureaus lease computer time via contractual agreements and can meet an organization’s entire IT needs in the event of disaster or catastrophic failure.

430
Q

What is critical path analysis?

A

A systematic effort to identify relationships between mission-critical applications, processes, and operations and all of the necessary supporting elements

431
Q

Name three examples of administrative physical security controls.

A

Facility construction and selection, site management, personnel controls, security awareness training, emergency response, and procedures

432
Q

Name three examples of technical physical security controls.

A

Access controls; intrusion detection; alarm systems; closed-circuit television (CCTV); monitoring systems; heating, ventilation, and air conditioning (HVAC) systems; power supplies; fire detection and suppression systems

433
Q

Name at least three physical controls for physical security.

A

Fencing, lighting, locks, construction materials, mantraps, watchdogs, guards

434
Q

What term describes the act of gathering information about a system by observing the display or watching an operator at the keyboard?

A

Shoulder surfing

435
Q

What term describes the act of using another person’s security ID to gain unauthorized entry into a facility?

A

Masquerading

436
Q

When one person follows another though a secured gate or doorway without presenting identification or otherwise being authenticated, what is this entry technique called?

A

Piggybacking

437
Q

What kinds of system is designed to detect intrusions, breaches, or attack attempts as they are underway or after the fact?

A

Intrusion detection system (IDS)

438
Q

What does UPS stand for, and what does it mean?

A

An uninterruptible power supply (UPS) is a type of self-charging battery that can be used to supply consistent clean power to sensitive equipment.

439
Q

What does EMI stand for, and what does it mean?

A

Electromagnetic interference refers to any noise generated by electric current and can affect any means of data transmission or storage that relies on electromagnetic transport mechanisms.

440
Q

Describe the models of systems development.

A

The waterfall model is a sequential development process that results in the development of a finished product. Developers may step back only one phase in the process if errors are discovered. The spiral model uses several iterations of the waterfall model to produce a number of fully specified and tested prototypes. Agile development models place an emphasis on the needs of the customer and quickly developing new functionality that meets those needs in an iterative fashion.

441
Q

Describe the purpose of software development maturity models.

A

Maturity models help software organizations improve the maturity and quality of their software processes by implementing an evolutionary path from ad hoc, chaotic processes to mature, disciplined software processes.

442
Q

What are the important elements of change and configuration management?

A

The three basic components of change control are request control, change control, and release control.

443
Q

What is TEMPEST?

A

TEMPEST is a standard for the study and control of electronic signals produced by various types of electronic hardware, such as computers, televisions, phones, and so on. Its primary goal is to prevent EMI and RFI radiation from leaving a strictly defined area to eliminate the possibility of external radiation monitoring, eavesdropping, and signal sniffing.

444
Q

What is static software testing?

A

Static testing evaluates the security of software without running it by analyzing either the source code or the compiled application. Static analysis usually involves the use of automated tools designed to detect common software flaws, such as buffer overflows.

445
Q

What type of software testing is most appropriate when the tester does not have access to the underlying source code?

A

Dynamic testing

446
Q

What does malicious code often create on an infected system to allow the developers of the malicious code to remotely access the system at a later time?

A

Back door

447
Q

What name is given to the cryptographic concept of making the relationship between the plain text and the key so complex that an attacker can’t use known plain text attacks to determine the key?

A

Confusion

448
Q

What type of organizations need to comply with PCI DSS?

A

Those that store, process, or transmit credit card account information.

449
Q

What trend makes it especially important to incorporate an assessment of security controls in contracting and procurement reviews?

A

The increased use of third-party and cloud services

450
Q

What are the branches of forensic analysis?

A

Media analysis, network analysis, software analysis, and hardware/embedded device analysis

451
Q

What is it when a user has more access, privilege, or permission than their assigned work tasks dictate?

A

Excessive privileges (also known as the violation of least privilege)

452
Q

What is it called when a user accumulates privileges over time as their job roles and assigned tasks changes but unneeded privileges are not revoked?

A

Creeping privileges

453
Q

Which access control scheme requires administrative rules to be defined along with the various conditions under which they apply as well as applicable object permissions?

A

Rule-based access control

454
Q

Name at least three physical controls for physical security.

A

Fencing, lighting, locks, construction materials, mantraps, watchdogs, guards

455
Q

What term is used to refer to the user or process that makes a request to access a resource?

A

Subject

456
Q

What kind of control does any mechanism, tool, or practice provide if it deters or mitigates undesirable actions or events?

A

Preventive control

457
Q

What process identifies the actual value of assets so that assets can be prioritized?

A

Asset valuation

458
Q

What process identifies and categorizes potential threats?

A

Threat modeling

459
Q

What process is used to identify weaknesses?

A

Vulnerability analysis

460
Q

When evaluating access control attacks, what are three primary elements that must be identified?

A

Assets, threats, and vulnerabilities

461
Q

A group of attackers is sponsored by a government. They are highly motivated, skilled, and patient and focused on a single target. What is this group called?

A

Advanced Persistent Threat (APT)

462
Q

What is often added to passwords to make their resultant hash secure and resistant to rainbow attacks?

A

Salts

463
Q

What is a nonstatistical sampling method that only records or alerts on events that exceed a threshold?

A

Clipping levels

464
Q

What is a group of records from one or more databases or logs that can be used to reconstruct events after an incident?

A

Audit trail

465
Q

What is the purpose of an access review and audit?

A

Checks to ensure that users do not have excessive privileges and that accounts are managed appropriately

466
Q

What can a user entitlement review detect?

A

Violation of the principle of least privilege policy, as incidents of excessive privileges or creeping privileges

467
Q

What types of accounts are focused on during a user entitlement review?

A

Privileged accounts such as administrator or root user accounts

468
Q

Who should have access to audit reports?

A

Only people who have a need to know

469
Q

What determines how often an audit should be performed?

A

Risk

470
Q

What policy requires users to spend at least a week away from their jobs on an annual basis to help prevent fraud?

A

Mandatory vacations

471
Q

What method will remove all data with assurances that it cannot be removed using any known methods?

A

Purging, sanitization, or destruction

472
Q

What methods can be used to protect mobile devices such as a smart phone?

A

Encryption, GPS, password-protected screen locks, and remote wipe

473
Q

What can be used to remove data on a lost smart phone?

A

Remote wipe

474
Q

What should be done before disposing of a desktop computer at the end of its lifecycle?

A

Sanitization

475
Q

What is the term that identifies data on a disk after the data has supposedly been erased?

A

Data remanence

476
Q

What are the steps of a patch management program?

A

Evaluate, test, apply, and audit patches

477
Q

What can be used to verify patches have been applied?

A

Vulnerability scanner

478
Q

What should be done to verify patches have been applied?

A

Audit patches, or use a vulnerability scanner to verify patches have been applied

479
Q

What tool can check for weaknesses in systems?

A

Vulnerability scanner

480
Q

What would be completed to check an entire organization for weaknesses?

A

Vulnerability assessment

481
Q

What does imaging provide in relation to configuration management?

A

Baseline

482
Q

What helps prevent outages that can occur from unauthorized modifications?

A

Change management

483
Q

What helps prevent inadvertent weakening of security from unauthorized outages?

A

Change management

484
Q

What are the five steps in incident response quoted in the CISSP CIB?

A

Detection, Response, Reporting, Recovery, and Remediation and Review

485
Q

In which stage of incident response should a root cause analysis be conducted?

A

Remediation and Review

486
Q

While containing an incident, what is the next important consideration?

A

Protection of evidence

487
Q

An attack has a negative effect on the confidentiality, integrity, or availability of an organization’s assets. What is this called?

A

Computer security incident

488
Q

What is it called when malware is installed on a user’s system after visiting a website?

A

Drive-by download

489
Q

What three generic elements can help prevent malware infections?

A

Education, policies, and tools

490
Q

An attacker has launched an attack using a vulnerability known only to him. What is this called?

A

Zero-day exploit

491
Q

What type of attack disrupts the TCP three-way handshake?

A

SYN flood attack

492
Q

What are computers in a botnet commonly called?

A

Zombies

493
Q

What is the best protection against a computer joining a botnet?

A

Up-to-date antivirus software

494
Q

What type of IDS detects attacks based on known methods?

A

Knowledge-based (also called signature-based or pattern-matching)

495
Q

What type of IDS detects attacks based by comparing it to a baseline?

A

Behavior-based (also called statistical-intrusion detection or anomaly detection)

496
Q

After a network is upgraded, what must be done with a behavior-based IDS?

A

Upgrade the baseline

497
Q

What is required before starting a penetration test?

A

Knowledge and consent of management

498
Q

What is often the first step of a penetration test?

A

Vulnerability test or vulnerability scan

499
Q

When a penetration test team is privy to detailed information about organizational assets, including hardware and software inventory, but not to other information (accounts, users, naming conventions, and so on), how might this team be described?

A

Partial-knowledge team (performs gray-box testing)

500
Q

A penetration testing team has full knowledge about a target. What is this team called?

A

Full-knowledge team (performs white-box testing)