Chapter 13 Flashcards

1
Q

At what point in a vulnerability assessment would an attack tree be utilized?

Vulnerability appraisal

Risk assessment

Risk mitigation

Threat evaluation

A

Threat evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is NOT true about privacy?

Today, individuals can achieve any level of privacy that is desired.

Privacy is difficult due to the volume of data silently accumulated by technology.

Privacy is freedom from attention, observation, or interference based on your decision.

Privacy is the right to be left alone to the degree that you choose.

A

Today, individuals can achieve any level of privacy that is desired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is NOT a risk associated with the use of private data?

Individual inconveniences and identity theft

Associations with groups

Statistical inferences

Devices being infected with malware

A

Devices being infected with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT an issue raised regarding how private data is gathered and used?

The data is gathered and kept in secret.

By law, all encrypted data must contain a “backdoor” entry point.

Informed consent is usually missing or is misunderstood.

The accuracy of the data cannot be verified.

A

By law, all encrypted data must contain a “backdoor” entry point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, and any other entity that could cause potential harm?

Vulnerability assessment

Penetration test

Vulnerability scan

Risk appraisal

A

Vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of these should NOT be classified as an asset?

Business partners

Buildings

Employee databases

Accounts payable

A

Accounts payable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following command-line tools tests a connection between two network devices?

Netstat

Ping

Nslookup

Ifconfig

A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which statement regarding vulnerability appraisal is NOT true?

Vulnerability appraisal is always the easiest and quickest step.

Every asset must be viewed in light of each threat.

Each threat could reveal multiple vulnerabilities.

Each vulnerability should be cataloged.

A

Vulnerability appraisal is always the easiest and quickest step.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following constructs scenarios of the types of threats that assets can face to learn who the attackers are, why they attack, and what types of attacks may occur?

Vulnerability prototyping

Risk assessment

Attack assessment

Threat modeling

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following tools is a Linux command-line protocol analyzer?

Wireshark

Tcpdump

IP

Arp

A

Tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a command-line alternative to Nmap?

Netcat

Statnet

Mapper

Netstat

A

Netcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of these is NOT a state of a port that can be returned by a port scanner?

Open

Busy

Blocked

Closed

A

Busy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following data sensitivity labels is the highest level of data sensitivity?

Ultra

Confidential

Private

Secret

A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following data sensitivity labels has the lowest level of data sensitivity?

Unrestricted

Public

Free

Open

A

Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is NOT a function of a vulnerability scanner?

Detects which ports are served and which ports are browsed for each individual system

Alerts users when a new patch cannot be found

Maintains a log of all interactive network sessions

Detects when an application is compromised

A

Alerts users when a new patch cannot be found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following must be kept secure as mandated by HIPAA?

PII

PHI

PHIL

PLILP

A

PHI (Protected health information)

17
Q

Which statement regarding a honeypot is NOT true?

It is typically located in an area with limited security.

It is intentionally configured with security vulnerabilities.

It cannot be part of a honeynet.

It can direct an attacker’s attention away from legitimate servers.

A

It cannot be part of a honeynet.

18
Q

Which of the following sends “probes” to network devices and examines the responses to evaluate whether a specific device needs remediation?

Active scanner

Probe scanner

Passive scanner

Remote scanner

A

Active scanner

19
Q

If a tester is given the IP addresses, network diagrams, and source code of customer applications, the tester is using which technique?

Black box

White box

Gray box

Blue box

A

White box

20
Q

If a software application aborts and leaves the program open, which control structure is it using?

Fail-safe

Fail-secure

Fail-open

Fail-right

A

Fail-open