Educating and Protecting and user Flashcards

1
Q

As part of your training program, you’re trying to educate users on the importance of security.
You explain to them that not every attack depends on implementing advanced technological
methods. Some attacks, you explain, take advantage of human shortcomings to gain access
that should otherwise be denied. What term do you use to describe attacks of this type?

A. Social engineering
B. IDS system
C. Perimeter security
D. Biometrics

A

A. Social engineering uses the inherent trust in the human species, as opposed to technology,
to gain access to your environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which classification of information designates that information can be released on a
restricted basis to outside organizations?

A. Private information
B. Full distribution
C. Restricted information
D. Limited distribution

A

D. Limited distribution information can be released to select individuals and organizations,
such as financial institutions, governmental agencies, and creditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You’ve recently been hired by ACME to do a security audit. The managers of this company
feel that their current security measures are inadequate. Which information access control
model prevents users from writing information down to a lower level of security and prevents
users from reading above their level of security?

A. Bell-LaPadula model
B. Biba model
C. Clark-Wilson model
D. Noninterference model

A

A. The Bell-LaPadula model is intended to protect confidentiality of information. This is
accomplished by prohibiting users from reading above their security level and preventing
them from writing below their security level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Cyberspace Security Enhancement Act gives law enforcement the right to:

A. Fine ISPs who host rogue sites
B. Gain access to encryption keys
C. Restrict information from public view
D. Stop issuance of .gov domains

A

B. The Cyberspace Security Enhancement Act gives law enforcement the right to gain access
to encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

For which U.S. organization was the Bell-LaPadula model designed?

A. Military
B. Census Bureau
C. Office of Management and Budget
D. Executive Office of the President

A

A. The Bell-LaPadula model was originally designed for use by the military.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is another name for social engineering?

A. Social disguise
B. Social hacking
C. Wetware
D. Wetfire

A

C. Wetware is another name for social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Clark-Wilson model must be accessed through applications that have predefined capabilities.
This process prevents all except:

A. Modification
B. Spam
C. Errors
D. Fraud

A

B. The Clark-Wilson model must be accessed through applications that have predefined
capabilities. This process prevents all the choices listed except spam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

There are two types of implicit denies. One of these can be configured so that only users
specifically named can use the service and is known as:

A. at.deny
B. at.allow
C. at.open
D. at.closed

A

B. at.allow configurations allow only users specifically named to use the service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ information is made available to either large public or specific individuals,
while ______ information is intended for only those internal to the organization.

A. Private; Restricted
B. Public; Private
C. Limited distribution; Internal
D. Public; Internal

A

B. Public information is made available to either large public or specific individuals, while
Private information is intended for only those internal to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following actions would not be allowed in the Bell-LaPadula model?

A. General with Top Secret clearance writing at the Top Secret level
B. Corporal with Confidential clearance writing at the Confidential level
C. General with Top Secret clearance reading at the Confidential level
D. General with Top Secret clearance writing at the Confidential level

A

D. The first three actions would be allowed since you can write to your level and read at
your level (or below). The situation that would not be allowed is the General with Top
Secret clearance writing at the Confidential level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the best description of tailgating?

A. Following someone through a door they just unlocked
B. Figuring out how to unlock a secured area
C. Sitting close to someone in a meeting
D. Stealing information from someone’s desk

A

A. Tailgating is best defined as following someone through a door they just unlocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An NDA (nondisclosure agreement) is typically signed by?

A. Alpha testers
B. Customers
C. Beta testers
D. Focus groups

A

C. An NDA (nondisclosure agreement) is typically signed by beta testers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the form of social engineering in which you simply ask someone for a piece of
information that you want by making it look as if it is a legitimate request?

A. Hoaxing
B. Swimming
C. Spamming
D. Phishing

A

D. Phishing is the form of social engineering in which you simply ask someone for a piece of
information that you want by making it look as if it is a legitimate request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Users should be educated in the correct way to close pop-up ads in the workplace. That
method is to:

A. Click the word Close
B. Click the “X” in the top right
C. Press Ctrl+Alt+Del
D. Call IT

A

B. Pop-up ads should be closed by clicking the “X” in the top right.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which act mandates national standards and procedures for the storage, use, and transmission
of personal medical information?

A. CFAA
B. HIPAA
C. GLBA
D. FERPA

A

B. HIPAA mandates national standards and procedures for the storage, use, and transmission
of personal medical information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When you combine phishing with Voice over IP, it is known as:

A. Spoofing
B. Spooning
C. Whaling
D. Vishing

A

D. Vishing involves combining phishing with Voice over IP.

17
Q

Which of the following is the highest classification level in the government?

A. Top Secret
B. Secret
C. Classified
D. Confidential

A

A. Top Secret is the highest classification level in the government.

18
Q

at.allow is an access control that allows only specific users to use the service. What
is at.deny?

A. It does not allow users named in the file to access the system.
B. It ensures that no one will ever be able to use that part of your system.
C. It opens up the server only to intranet users.
D. It blocks access to Internet users.

A

A. The at.deny file does not allow users named in the file to access the system.

19
Q

Which of the following is the best description of shoulder surfing?

A. Following someone through a door they just unlocked
B. Figuring out how to unlock a secured area
C. Watching someone enter important information
D. Stealing information from someone’s desk

A

C. Shoulder surfing is best defined as watching someone enter important information.

20
Q

Which concept does the Bell-LaPadula model deal most accurately with?

A. Integrity
B. Trustworthiness
C. Confidentiality
D. Accuracy

A

C. The Bell-LaPadula model deals most accurately with confidentiality