Deck 1 Flashcards
What are two types of risk analysis?
Quantitative, qualitative
An attacker has placed a URL on a website that, if clicked, will cause malicious JavaScript to execute in victims’ browsers. This attack is known as a ___________ attack.
cross-site scripting
What are the four basic control requirements identified in the Orange Book?
Discretionary access control, mandatory access control, object reuse, labels
What is the purpose of a Business Impact Assessment (BIA)?
To describe the impact that an event or disaster will have on business operations
The most extensive type of disaster recovery plan test is ______________.
an interruption test
Most security policies are categorized as what type?
Advisory
An IPsec SA consists of what three parameters to uniquely identify it in an IPsec session?
Destination IP address, Security Protocol ID (SPID), Security Parameter Index (SPI)
Which U.S. government data classification level describes information that, if compromised, could cause grave damage to national security?
Top Secret
____________ monitoring records every key press and mouse movement on a system.
Keystroke
In a civil case, the court may issue an order, known as a _________________ , allowing a law-enforcement official to seize specific evidence.
writ of possession
192.167.4.1 is an example of what class of IP address?
C
Name three VPN protocol standards.
IPsec, PPTP, SSL/TLS
A third-party inspection of a system is known as ________________ .
an audit
Name three types of intrusion detection systems used for physical security.
Photoelectric sensors, dry contact switches, motion detectors
What are the three elements of the C-I-A triad?
Confidentiality, integrity, availability
A ___________ conveys information by altering a system resource’s performance or timing.
covert timing channel
Who is the individual responsible for assigning information classification levels to assigned information assets?
Information owner
A baseline is what type of governance?
Standard
What is a primary technical concern with long-term audit log retention?
Whether any tape or disk drives will be available to read the media
Name five types of attacks against voice communication systems.
Identity fraud, toll fraud, eavesdropping, denial-of-service (DoS), Spam over Internet Telephony (SPIT)
Name three asymmetric key systems based on discrete logarithms.
Diffie-Hellman, Elliptic Curve, ElGamal
Violation reports and audit trails are examples of what type of control?
Detective technical
The two types of host or network intrusion detection are ______________ and ________________ .
signature-based systems, anomaly-based systems
Name the three elements of the fire triangle necessary for a fire to burn.
Fuel, oxygen, heat
Name three factors that are used to determine data classification.
Value, regulations, policy
Name three types of general-purpose controls.
Detective, preventive, corrective
What are the four main functions of the operating system?
Process management, I/O device management, memory management, file management
A SYN flood is an example of what type of attack?
Denial-of-service (DoS)
Name four Wi-Fi access point infrastructure modes of operation.
Root, repeater, bridge, mesh
What type of water sprinkler system initially has no water present in the pipes and, at activation, delivers a large volume of water?
Deluge
To be admissible in a court of law, evidence must be ________________________.
relevant
The minimum number of SAs required for a two-way IPSec session between two communicating hosts using both AH and ESP is ____________.
four
An alternative information-processing facility where all systems, patches, and data are mirrored from live production systems is known as a _______________.
hot site
A ________________ model ensures that the actions of different objects and subjects aren’t seen by (and don’t interfere with) other objects and subjects on the same system.
noninterference
Name five protocols that can be used to secure email communication.
SMTP over TLS, S/MIME, MOSS, PEM, PGP
The Ethernet protocol is defined at what layer of the OSI model and in which IEEE standard?
Data Link, 802.3
A prolonged drop in voltage describes what electrical anomaly?
Brownout
True or false: Failure to implement a safeguard may result in legal liability if the cost of implementing the safeguard is less than the cost of the associated loss.
True
What term describes the legal evidence-gathering technique of luring an individual toward certain evidence after that individual has already committed a crime?
Enticement
Authentication can be based on any combination of what three factors?
Something you know, something you have, something you are