CISA Refresher 2 Flashcards

1
Q

A validity chekc would be the most useful for the verification of passwords because it would verify that the required format has been used

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a certificate always includes

A

public key, expiration date and owner’s information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SSL provides end point authentication and communication privacy over internet using cryptography

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HTTPS uses prublic key certificates to verify the iddentity of end points

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSL uses a hyprid of hesed, private and public key cryptographic processes to secure transactions over the inernet through a PKI

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The SSL handshake protocol is based on the application layer but provides for the security of the communication sessions too

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP network layer packet security protocol establishes VPN via transport and tunnel mode encryption methods

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In establishing IPSec sessions in either mode

A

security associations are established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SA ( Security assosications)

A

define which security parameters should be applied between the communicating parties as encryption algorithms, Key , initialization vectors, life span of key etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSH is useful in securing telnet and FTP services, and it implemented as the application layer, as opposed to operating at network layer

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure multipurpose internet Mail Extensions (S/MIME)

A

A standard secure e-mail protocol that authenticates the identity of the sender and receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure electronic Transaction (SET)

A

is a protocol developed jointly by VISA and master card to secure payment transactions among all parties involved in credit card transactions on behalf of cardholders and merchants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SET is an application oriented protocal

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Worm

A

Variant of a virus frequently encountered, which unlike a virus, does not physically attach itself to another program. To propogate itself to host system. A work typically exploits security weaknesses in the operating systems configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Following are hardware tactics that can reduce the risk of infection

A

Use boot virus protection ( built in firmware based virus protections ), Use remote booting ( eg diskless workstations), Use hardware based password, Use write protected tabs on disc, Ensure that insecure protocols are blocked by firewall from external segment and internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Antivirus softwars

A

are both preventive and detective tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Scanners

A

Looks for sequence of bits called signatures that are typical of virus program

18
Q

Two type scanners

A

Virus masked or signature based, Heuristic scanners

19
Q

Heuristic scanners tend to generate a high level of false positive errors

20
Q

Heuristic scanners

A

analyse the code and decides on the basis of stastical probability whether it could contain malicous code

21
Q

Active monitor

A

Interpret DOS andread onlymemory BIOS calls looking for virus like actions

22
Q

Active monitors can be problematic because

A

they cannot distinguish between a user request and a program or virus request

23
Q

Cyclic redundancy check

A

Compute a binary number on a known virus free program that is then stored in a database file. The number is called CRC

24
Q

CRC check can be done only after infection is occured

25
CRC check is infective againste new files that are virus infected and that are not recorded in the database
TRUE
26
Behaviour blockers
can ptentially detect a virus at a early stage
27
behaviour blocker
detects potentially abnormal behaviour such as writing to the boot sector or the master boot record, or making changes to the executable files
28
Immunizers
defend against viruses byappending section of themselves to files
29
Immunizers are not always practical sinceit is not possible to immunize files against all known viruses
TRUE
30
Virus wall
virus scanning software used a integrated part of firewall technology
31
Bloting door lock
These locks require the traditional metal key to gain entry
32
Deadman doors
This reduces the risk of piggybacking, when an unauthorized person follows an authorized person through a secured entry
33
Imaging is a process that allows one to obtain a bit for bit copy of dagt to avoid damage of original date or information, it is made to obtain reidual dat such as deleted files, fragments of deleted files and othere information present, from the disk for analysis
TRUE
34
Ingestion/ normalisation
THie process converts the information extracted to a format that can be understood by investigators.
35
short term interruptions such as sags, spikes and surges, which last from a few millionths to a few thousandths of a secons
can be preventeed by using properly placed surge protectors.
36
Intermediate term interruptions which last from few seconds to 30 minutes
can be controlled by UPS devices
37
Long term interruptions which last froma few hours to several days
require the use of alternate power generators
38
since water and electricity do not mix
these systems must be combined with a automaticswitch to shutdownthe electricity suplly to the area protected
39
Helon system
release pressurized Halon gases that remove ozygen from the air, thus starving the fire.
40
Halon substitute is FM 200, which is the most effective alternative
TRUE
41
Argonite
people have suffocagted by breathing argon by mistake
42
Electrical surge protectors
reduce the risk of damage to equipment due to power spikes, Such protectors are typically built into the UPS system