Ch.15 Flashcards

1
Q

The goal of what type of threat evaluation is to better understand who the attackers are, why they attack, and what types of attacks might occur?

Question 1 options:

threat mitigation

threat profiling

risk modeling

threat modeling

A

threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name of the process that takes a snapshot of the current security of an organization?

Question 2 options:

threat analysis

vulnerability appraisal

risk assessment

threat assessment

A

vulnerability appraisal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which item below is an imaginary line by which an element is measured or compared, and can be seen as the standard?

Question 3 options:

profile

threat

control

baseline

A

baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The comparison of the present state of a system to its baseline is known as what?

Question 4 options:

Baseline reporting

Compliance reporting

Baseline assessment

Compliance review

A

Baseline reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In order to minimize vulnerabilities in software, code should be subject to and analyzed while it is being written in what option below?

Question 5 options:

black box

code review

white box

scanner

A

code review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the name for the code that can be executed by unauthorized users within a software product?

Question 6 options:

vulnerability surface

risk profile

input surface

attack surface

A

attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During a vulnerability assessment, what type of software can be used to search a system for port vulnerabilities?

Question 7 options:

threat scanner

vulnerability profiler

port scanner

application profiler

A

port scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A port in what state below implies that an application or service assigned to that port is listening for any instructions?

Question 8 options:

open port

empty port

closed port

interruptible system

A

open port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be in?

Question 9 options:

open port

open address

closed address

closed port

A

closed port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An administrator needs to view packets and decode and analyze their contents. What type of application should the administrator use?

Question 10 options:

application analyzer

protocol analyzer

threat profiler

system analyzer

A

protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which is the term for a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, yet they are actually imitations of real data files.

Question 11 options:

port scanner

write blocker

honeypot

honeycomb

A

honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the term for a network set up with intentional vulnerabilities?

Question 12 options:

honeynet

honeypot

honeycomb

honey hole

A

honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is another term used for a security weakness?

Question 13 options:

threat

vulnerability

risk

opportunity

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which scan examines the current security, in a passive method?

Question 14 options:

application scan

system scan

threat scan

vulnerability scan

A

vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the end result of a penetration test?

Question 15 options:

penetration test profile

penetration test report

penetration test system

penetration test view

A

penetration test report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which tester has an in-depth knowledge of the network and systems being tested, including network diagrams, IP addresses, and even the source code of custom applications?

Question 16 options:

white box

black box

replay

system

A

white box

17
Q

A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as a:

Question 17 options:

Blanket Purchase Agreement (BPA)

​Service Level Agreement (SLA)

​Memorandum of Understanding (MOU)

​Interconnection Security Agreement (ISA)

A

​Service Level Agreement (SLA)

18
Q

What term below describes a prearranged purchase or sale agreement between a government agency and a business?

Question 18 options:

​Service Level Agreement (SLA)

​Memorandum of Understanding (MOU)

​Blanket Purchase Agreement (BPA)

​Interconnection Security Agreement (ISA)

A

​Blanket Purchase Agreement (BPA)

19
Q

What security goal do the following common controls address: hashing, digital signatures, certificates, nonrepudiation tools?​

Question 19 options:

​Confidentiality

​Integrity

​Availability

​Safety

A

​Integrity

20
Q

What term below describes the start-up relationship between partners?​

Question 20 options:

​Off-boarding

​Uptaking

​On-boarding

​Uploading

A

​On-boarding