EXAM Flashcards
T or F. The potential for a hacker to compromise the system is called an attack.
F. The potential for a hacker to compromise the system is called an attack.
It’s a threat
T or F. A virus deletes all of the content of your hard drive at home. This was the virus’ transport mechanism.
F. A virus deletes all of the content of your hard drive at home. This was the virus’ transport mechanism.
It’s the payload – or what the virus does when it executes.
T or F. A particular type of malware looks for an Administrator’s name on the payroll. If its not found, it starts to delete files. This is known as a backdoor.
F. A particular type of malware looks for an Administrator’s name on the payroll. If its not found, it starts to delete files. This is known as a backdoor.
This describes a logic bomb
T or F. A virus is a fragment of code that requires user action to deliver its payload.
T. A virus is a fragment of code that requires user action to deliver its payload.
Worms are standalone code that automatically replicates across the network.
Sarbanes-Oxley applies to which industry?
- Publicly traded companies
- Healthcare
- Financial
- Retail
Sarbanes-Oxley applies to which industry?
-Publicly traded companies
GLBA applies to which industry?
- Publicly traded companies
- Healthcare
- Financial
- Retail
GLBA applies to which industry?
-Financial
PCI-DSS applies to which industry?
- Publicly traded companies
- Healthcare
- Financial
- Retail
PCI-DSS applies to which industry?
-Retail
Information about yourself, such as your SSN, is called _____ ________ ______.
Personally Identifiable Information.
True or False. FISMA only applies to federal agencies.
True
Which of the following is the estimated asset value loss for the year? (ALE, ARO, AV)
ALE
Risk acceptance means what, and would be used when?
Do nothing to mitigate (reduce) the risk. It would be used when the cost of the risk is less than the cost of the control.
T or F. Your boss asks you to do a port scan of a competitor’s website. This is OK as long as you document that the boss asked you to do this.
& What is the law you just broke if you did hack the competitor?
F
18 U.S.C. 1030
What section in the act governs unauthorized eavesdropping on transmitted communications?
Section 2511
Breaking a cipher by trying to use every possible key combination is a __________ attack.
Brute Force attack
The process of defeating cryptographic systems is known as ___________________.
- Cryptography
- Cryptanalysis
- Cryptology
- Decryption
Cryptanalysis
SNMP is a protocol that traps network messages into a MIB that can be logged into to access the data.
What version of SNMP should you be using and why?
3.0 or higher as it encrypts network traffic and the “community string” which is the SNMP password at the devices.
A wireless encryption protocol that has a weakness with its initialization vector
- WEP
- WPA
- DES
- WPA2 Enterprise
WEP – WPA2 is the one that you should be using (802.11i)
_______ is the protocol that resolves IP addresses to MAC addresses
ARP
T or F. Changing your IP Address to masquerade as someone else is called IP Poisoning.
F.
It’s called IP Spoofing
An _______________ ______________ is an attack on a wireless network in which an Access Point is configured exactly like an authorized AP.
Evil Twin
An address associated with an application running on the system is known as a (MAC address, IP address, port number). Pick one.
port number
This is an attack on a network layer protocol that resolves application layer addresses to network layer addresses. It can be used to redirect the user to a malicious Web site where authentication credentials can be obtained.
- DNS Poisoning
- ARP Poisoning
- IP Spoofing
- Smurf Attack
DNS Poisoning
Which of the following is not a range used by NAT for private IP Addresses.
a. 10.0. 0.0 – 10.255. 255.255.
b. 172.16. 0.0 – 172.31. 255.255.
c. 192.168. 0.0 – 192.168. 255.255.
172.16. 0.0 – 172.31. 255.255.
An attack in which the system is flooded with packets to make it unavailable to others is a _____________.
DoS or DDoS
Two documents that are hashed produce the same digest (output). This is called a/an ____________.
collision
A MAC function uses what as inputs?
Shared key and message
T or F. If the hashing algorithm is known, it can be reverse-engineered to figure out the object that was hashed.
F
T or F. Multi-factor authentication increases the probability of a false positive.
F
T or F. The most stringent form of access control is DAC.
F. MAC is the most stringent
Authentication through the process of measuring physiological or behavioral characteristics is ___________.
biometrics
T or F. A centralized access control system in which users from different companies can access resources using a single sign on is called identity management.
F
An authentication system that uses tickets to manage user access is called _______.
Kerberos
A firewall that checks data at an application layer is called a/an:
A. Stateful packet inspecting firewall
B. Stateful packet inspecting firewall
C. Deep packet inspecting firewall
D. Host-based IDS
Deep packet inspecting firewall
George’s IDS baselined the amount of traffic to the email server. One morning, his IDS alerts that the traffic at the server is in considerable excess to that expected. This type of IDS would be:
- Anomaly-based
- Host-based
- Signature-based
Anomaly-based
An IDS that takes action, such as blocking a port at the firewall, when an intrusion is identified is called a/an: _________________
IPS, or active IDS
A team that responds to a security incident is known as a/an _________________.
Computer Security Incident Response Team (CSIRT)
The first three steps in an Incident Response Process are Detection, Analysis, and ____________.
Escalation
The first three steps in an Incident Response Process are Detection, Analysis, and ____________.
Escalation
Law that deal with information technology are called ____________.
Cyberlaw
T or F. It is legal for email providers to read your personal email.
T
T or F. Backup tapes should be stored onsite so they are accessible.
F
Really a trick question – a copy should be accessible, however make certain you store them off-site so they are preserved if the building burns down.
The process of retrieving deleted data from a hard drive is called
A. Data carving
B. Data recovery
C. Anti-forensics
D. Data delineation
Data carving
Laws that criminalize bad behavior by imprisonment are known as ___________
A. Cyberlaw
B. Civil Law
C. Criminal Law
D. Administrative Law
Criminal Law
Disconnecting the systems infected with a virus so that other systems don’t become infected is done during the ___________ stage of an incident response.
- Containment
- Reporting
- Escalation
- Recovery
Containment
Which of the following forensics assessment types is characterized by looking active connections?
- Network analysis
- Media analysis
- Software analysis
- Forensic analysis
Network analysis
A DoS attack in which the attacker sets up multiple connections, but never completes the connections, is called a/an:
- TCP SYN Flood
- Fraggle
- Smurf
- Ping of Death
TCP SYN Flood
T or F. Blocking an attacker’s address at the firewall is known as IP Spoofing.
F
In a TCP 3-way handshake, which packet closes the communication?
A. SYNCED
B. SYN-ACK
C. ACK
D. FIN
SYN-ACK
129.10.15.8:80 is called a/an _______________.
socket – it’s a combination of an IP address and a port number
T or F. An attack in which network traffic is captured and re-sent is called a Replay Attack.
T
T or F. Users who bring in modems or other devices to circumvent security controls on a network create backdoors.
F
Which class of fire extinguisher would be used on an electrical fire?
- A
- B
- C
- D
C
What are the 3 As of Forensics?
- Acquisition (i.e. duplicating the drive, collecting evidence)
- Authentication (hashing the files on the drive)
- Analysis (finding the evidence).
A document that accompanies the evidence to show where it goes, who has it, and what was done is called a/an: ________________.
Chain of Custody
An attack in which an attacker’s content is viewed in your browser when you access the website is called a/an _____________.
Cross-site Scripting (XSS)
An attack in which the malware is delivered to your system using pixels on the page that are too small for you to see is called ____________.
iFrame attack
Small sensors or other devices with microcode or small amounts of firmware that are used to control the nation’s critical infrastructure is called _________.
Industrial Control Systems
T or F. A buffer overflow attack that redirects the system to instructions of the attackers choosing is a heap overflow.
F
This is a stack overflow
Which of the following would not be a method of preventing SQL Injection attacks?
-Least permissions on database accounts
-Encrypting input – what good would this do? The command would just be decrypted
before it executed.
-Use of stored parameters
-Input validation
Encrypting input – what good would this do? The command would just be decrypted
before it executed.
George performs full-volume backups every Friday. Mondays – Thursdays, he performs incremental backups. On Tuesday, he has a catastrophic failure of his hard drive array before the backup runs. What tapes, and in what order would be installed? How much data would he lose?
A drive array that provides fault tolerance by copying everything written to one set of drives to a spare set of drives is RAID ______.
A drive array that provides no fault tolerance is RAID _________.
- Friday full, Monday. Tuesday didn’t run, so it is not available. He lost all day on Tuesday.
- RAID 1 - Mirroring
- RAID 0 - Striping
The security service that deters an individual from claiming that he or she did not take part of a transaction is:
Non-Repudiation
Your student records contain a lot of personally identifiable information, such as SSNs, that can lead to identity theft. Which of the following security services is the most important to protect against that?
Confidentiality
You receive an email stating you won the London Lottery (although you’ve never played the London Lottery). Which of the following security services would be necessary to know that this email was really from the London Lottery?
Authentication
T or F. The more usable a system is, the more secure it is.
F