CISA Refresher 2 Flashcards

1
Q

A validity chekc would be the most useful for the verification of passwords because it would verify that the required format has been used

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a certificate always includes

A

public key, expiration date and owner’s information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SSL provides end point authentication and communication privacy over internet using cryptography

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HTTPS uses prublic key certificates to verify the iddentity of end points

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSL uses a hyprid of hesed, private and public key cryptographic processes to secure transactions over the inernet through a PKI

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The SSL handshake protocol is based on the application layer but provides for the security of the communication sessions too

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP network layer packet security protocol establishes VPN via transport and tunnel mode encryption methods

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In establishing IPSec sessions in either mode

A

security associations are established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SA ( Security assosications)

A

define which security parameters should be applied between the communicating parties as encryption algorithms, Key , initialization vectors, life span of key etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSH is useful in securing telnet and FTP services, and it implemented as the application layer, as opposed to operating at network layer

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure multipurpose internet Mail Extensions (S/MIME)

A

A standard secure e-mail protocol that authenticates the identity of the sender and receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure electronic Transaction (SET)

A

is a protocol developed jointly by VISA and master card to secure payment transactions among all parties involved in credit card transactions on behalf of cardholders and merchants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SET is an application oriented protocal

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Worm

A

Variant of a virus frequently encountered, which unlike a virus, does not physically attach itself to another program. To propogate itself to host system. A work typically exploits security weaknesses in the operating systems configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Following are hardware tactics that can reduce the risk of infection

A

Use boot virus protection ( built in firmware based virus protections ), Use remote booting ( eg diskless workstations), Use hardware based password, Use write protected tabs on disc, Ensure that insecure protocols are blocked by firewall from external segment and internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Antivirus softwars

A

are both preventive and detective tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Scanners

A

Looks for sequence of bits called signatures that are typical of virus program

18
Q

Two type scanners

A

Virus masked or signature based, Heuristic scanners

19
Q

Heuristic scanners tend to generate a high level of false positive errors

A

TRUE

20
Q

Heuristic scanners

A

analyse the code and decides on the basis of stastical probability whether it could contain malicous code

21
Q

Active monitor

A

Interpret DOS andread onlymemory BIOS calls looking for virus like actions

22
Q

Active monitors can be problematic because

A

they cannot distinguish between a user request and a program or virus request

23
Q

Cyclic redundancy check

A

Compute a binary number on a known virus free program that is then stored in a database file. The number is called CRC

24
Q

CRC check can be done only after infection is occured

A

TRUE

25
Q

CRC check is infective againste new files that are virus infected and that are not recorded in the database

A

TRUE

26
Q

Behaviour blockers

A

can ptentially detect a virus at a early stage

27
Q

behaviour blocker

A

detects potentially abnormal behaviour such as writing to the boot sector or the master boot record, or making changes to the executable files

28
Q

Immunizers

A

defend against viruses byappending section of themselves to files

29
Q

Immunizers are not always practical sinceit is not possible to immunize files against all known viruses

A

TRUE

30
Q

Virus wall

A

virus scanning software used a integrated part of firewall technology

31
Q

Bloting door lock

A

These locks require the traditional metal key to gain entry

32
Q

Deadman doors

A

This reduces the risk of piggybacking, when an unauthorized person follows an authorized person through a secured entry

33
Q

Imaging is a process that allows one to obtain a bit for bit copy of dagt to avoid damage of original date or information, it is made to obtain reidual dat such as deleted files, fragments of deleted files and othere information present, from the disk for analysis

A

TRUE

34
Q

Ingestion/ normalisation

A

THie process converts the information extracted to a format that can be understood by investigators.

35
Q

short term interruptions such as sags, spikes and surges, which last from a few millionths to a few thousandths of a secons

A

can be preventeed by using properly placed surge protectors.

36
Q

Intermediate term interruptions which last from few seconds to 30 minutes

A

can be controlled by UPS devices

37
Q

Long term interruptions which last froma few hours to several days

A

require the use of alternate power generators

38
Q

since water and electricity do not mix

A

these systems must be combined with a automaticswitch to shutdownthe electricity suplly to the area protected

39
Q

Helon system

A

release pressurized Halon gases that remove ozygen from the air, thus starving the fire.

40
Q

Halon substitute is FM 200, which is the most effective alternative

A

TRUE

41
Q

Argonite

A

people have suffocagted by breathing argon by mistake

42
Q

Electrical surge protectors

A

reduce the risk of damage to equipment due to power spikes, Such protectors are typically built into the UPS system