Exam Flashcards

1
Q

NETWORK ASSESSMENT TOOLS

A

ISS, SATAN, BALLISTA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HDSL

A

1.55MBPS UPSTREAM 1.55MBPS DOWNSTREAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SODA ACID

A

SUPPRESSES FUEL SUPPLY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TIME TO SWITCH AND TIME PRESSING KEY

A

FLIGHT TIME AND DWELL TIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RED BOOK

A

NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

GREEN BOOK

A

PASSWORD MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TEMPERATURE THAT DAMAGES MAGNETIC MEDIA

A

100 DEGREES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RED BOX

A

SOUND OF COINS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BLUE BOX

A

TONE, FREQ FOR LONG DISTANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BLACK BOX

A

LINE VOLTAGE, RECEIVER’S END

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FRAGMENTATION

A

TEAR DROP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ABSTRACT MACHINE THAT MEDIATES ALL ACCESS BETWEEN SUBJECTS AND OBJECTS

A

REFERENCE MONITOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NUMBER OF COLUMNS IN TABLE

A

DEGREE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APPLICATION LAYER, 2 ASYMMETRICAL KEYS -or- 2 DIGITAL CERTIFICATES

A

SET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MD5 SIZE OF DIGEST

A

128 BITS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SHA-1 SIZE OF DIGEST

A

160 BITS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

B2

A

STRUCTURED, SEPARATION OF DUTIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

B3

A

SECURITY DOMAIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

PASSWORD-TWO UNRELATED WORDS

A

COMPOSITION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SATISFY REAL WORLD REQUIREMENTS

A

VALIDATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DECISION SUPPORT SYSTEM (DSS) PROVIDES

A

FLEXIBILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BEST PROGRAMMING HAS

A

HIGH COHESION AND LOW COUPLING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

COHESION

A

ONLY ONE PROCESS OR ONLY RELATED PROCESSES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

COUPLING

A

INTERACTION REQUIRED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RISK

A

LIKELIHOOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IP HEADER-TCP NUMBER

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

IP HEADER-ICMP NUMBER

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

IP HEADER-IGMP NUMBER

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

IP HEADER-UDP NUMBER

A

17

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

IMPORTANT FOR EVIDENCE

A

CHAIN OF CUSTODY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DATABASE ROWS

A

TUPLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

NETWORK REDUNDANCY

A

DUAL BACKBONE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

DRAW CONCLUSIONS

A

INFERENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

SUSTAINING-DURING AND AFTER

A

BUSINESS CONTINUITY PLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

FIRST STEP

A

POLICY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

STEP-BY-STEP

A

PROCEDURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

RECOMMENDED

A

GUIDELINES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

CONTENT DEPENDENT-ADVANTAGE

A

MORE GRANULAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

CONTENT DEPENDENT-DISADVANTAGE

A

OVERHEAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

PROTECT ONLY WITHIN A FEW INCHES

A

CAPACITANCE DETECTOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

TRANSMIT ONLINE TRANSACTIONS TO REMOTE FACILITY

A

ELECTRONIC VAULTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

CELL PHONE-PREVENT MONITORING

A

TIME DIVISION MULTIPLEXING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CCTV IS MAINLY

A

DETECTIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

LINUX, PREVENTS USERS FROM SEEING DATA

A

SHADOW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

ORANGE BOOK

A

TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

RADIUS-ACT AS CLIENT

A

NETWORK ACCESS SERVER (NAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

LOCK PICKING TECHNIQUE FOR COMBINATION LOCKS

A

SHIMMING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

DES NUMBER OF ROUNDS

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

FLEXIBLE SUPPORT FOR O/S

A

FLASK FLUX ADVANCED SECURITY KERNEL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

ID PICTURE, VERIFY AUTHENTICITY ON A DOCUMENT

A

WATERMARK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

PROPER LIFECYCLE OF EVIDENCE

A

COLLECTION, ANALYSIS, STORAGE, PRESENT IN COURT, RETURN TO OWNER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

ALGORITHMS BASED ON DISCRETE LOGARITHMS

A

EL GAMAL, DIFFIE-HELLMAN, ECC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

24 HOURS A DAY PROCESSING, GOOD ALTERNATIVE TO TAPE BACKUP

A

BACKUP TO JUKEBOX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

NUMBER OF COMBINATIONS FOR A NUMERIC PASSWORD THAT IS 1-4 DIGITS

A

10,000 COMBOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

SSO BENEFIT

A

MORE EFFICIENT LOG-ON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

ACCOUNTABILITY=TRACED BACK TO

A

INDIVIDUAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

IPSEC LAYER AND PROTOCOLS USED

A

L3, AH AND ESP, ESP=INTEGRITY AND CONFIDENTIALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

REASONABLE MEASURES TO ENSURE

A

DUE CARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

LIABILITY

A

DUE CARE, DUE DILIGENCE

60
Q

SINGLE UNIT OF ETHERNET DATA

A

FRAME

61
Q

1ST STEP IN A PENETRATION TEST

A

FORMULATION OF SPECIFIC MANAGEMENT OBJECTIVES

62
Q

COVERT CHANNEL

A

1 PROCESS SIGNALS ANOTHER BY MODIFYING ITS OWN USE OF SYSTEM RESOURCES

63
Q

QUALITATIVE

A

PRIORITIZES RISK

64
Q

REGISTERED PORTS

A

1024-49151

65
Q

WELL KNOWN PORTS

A

1-1023

66
Q

DYNAMIC AND OR PRIVATE PORTS

A

49152-65535

67
Q

ISDN BRI

A

2B AND 1D

68
Q

WITH PUBLIC KEY CRYPTOGRAPHY, FOR CONFIDENTIALITY, WHICH KEY IS USED FIRST

A

RECEIVER’S PUBLIC KEY

69
Q

WITH PUBLIC KEY CRYPTOGRAPHY, FOR AUTHENTICATION, WHICH KEY IS USED FIRST

A

SENDER’S PRIVATE KEY

70
Q

INTEGRITY

A

HASHING

71
Q

GUARDS

A

DISCRIMINATING JUDGMENT

72
Q

SSO-TYPES

A

KERBEROS, SESAME, KRYPTOKNIGHT

73
Q

KERBEROS

A

TICKETS, MIT, PROJECT ATHENA, SYMMETRIC, CONFIDENTIAL & INTEGRITY, 3-HEADED DOG, GREEK MYTHOLOGY

74
Q

EVIDENCE MUST BE

A

RELEVANT

75
Q

PACKET FILTERING FIREWALL (GENERATION)

A

1

76
Q

APPLICATION LEVEL FIREWALL (GENERATION)

A

2

77
Q

STATEFUL INSPECTION FIREWALL(GENERATION)

A

3

78
Q

DYNAMIC PACKET FILTERING FIREWALL (GENERATION)

A

4

79
Q

KERNEL PROXY FIREWALL (GENERATION)

A

5

80
Q

TRINOO/TRIN00

A

DDOS, TRIBAL FLOOD NETWORK

81
Q

AUTOMATICALLY LEAVES SYSTEM PROCESSES & COMPONENTS IN A SECURE STATE AFTER FAILURE

A

FAIL-SAFE

82
Q

MOST CRUCIAL LINK IN THE COMPUTER SECURITY CHAIN

A

MANAGEMENT

83
Q

RESPONSIBLE FOR ENSURING PROPER CONTROLS ARE IN-PLACE FOR DATA

A

DATA OWNER

84
Q

SCHEMA

A

STRUCTURE

85
Q

RELATION

A

HOW DATA & SCHEMA ARE RELATED (ASSOCIATED)

86
Q

DEGREE

A

NUMBER OF COLUMNS

87
Q

CARDINALITY

A

NUMBER OF ROWS IN A RELATION, HOW TABLES LINK TO ONE ANOTHER

88
Q

CONTINGENCY PLAN SHOULD ADDRESS

A

RESIDUAL RISK

89
Q

LEAST PRIVILEGE-MODEL

A

TCSEC

90
Q

RETROFITTING SECURITY FOR A DATABASE

A

TRUSTED FRONT-END

91
Q

SCRAMBLED

A

TRANSPOSITION

92
Q

REPLACED

A

SUBSTITUTION

93
Q

HIDE IN MEDIA (PICTURES)

A

STEGANOGRAPHY

94
Q

EVERY X NUMBER OF WORDS IS PART OF REAL MESSAGE

A

CONCEALMENT

95
Q

BOOK, PAGE, PARAGRAPH, ETC?..

A

RUNNING

96
Q

CERTIFICATION RULES & ENFORCEMENT RULES (MODEL)

A

CLARK-WILSON

97
Q

FORENSIC DISK BACK-UP

A

BIT LEVEL, BIT-BY-BIT

98
Q

ADDED TO PASSWORDS TO INCREASE RANDOMNESS

A

SALTS

99
Q

RPC OSI LAYER

A

5 (SESSION)

100
Q

LOWER CASE

A

IMPLEMENTATION

101
Q

MIDDLE CASE

A

ANALYSIS & DESIGN

102
Q

UPPER CASE

A

EXECUTIVES/PLANNING

103
Q

ICASE

A

COMBINED (L,M,U) ALSO CALLED INTEGRATED CASE

104
Q

ARTIFICIAL INTELLIGENCE/LEARN FROM EXPERIENCE

A

NEURAL NETWORK

105
Q

AUDIT TRAILS

A

DETECTIVE/TECHNICAL

106
Q

HIPPA

A

SECURITY & PRIVACY

107
Q

SOFTWARE TESTING (INTERNAL)

A

WHITE BOX

108
Q

SOFTWARE TESTING (EXTERNAL)

A

BLACK BOX

109
Q

FORMAL ACCEPTANCE

A

ACCREDITATION

110
Q

PROPRIETARY & IMPORTANT TO SURVIVAL

A

TRADE-SECRET

111
Q

INVALID TRANSACTIONS SHOULD BE

A

WRITTEN TO REPORT AND REVIEWED

112
Q

ATTRIBUTES IN A TABLE DEPEND ONLY ON PRIMARY KEY

A

DATA NORMALIZATION

113
Q

MAY RENDER TOKEN UNUSABLE

A

BATTERY LIFESPAN

114
Q

ACV

A

ACTUAL COST VALUE, VALUE OF ITEM ON THE DATE OF LOSS + 10 %

115
Q

SET

A

VISA, MASTERCARD, INTERNET, CREDIT CARD PROTOCOL, USED DIGITAL SIGNATURES

116
Q

WAP GAP

A

WTLS IS DECRYPTED AT THE CARRIERS WAP GATEWAY TO RE-ENCRYPT WITH SSL FOR WIRED NETWORKS

117
Q

PASSWORD CRACKERS USE

A

COMPARATIVE ANALYSIS

118
Q

CHAIN OF CUSTODY SHOWS

A

WHO: OBTAINED AND SECURED EVIDENCE

119
Q

DIGITAL SIGNATURE STANDARD(DSS) PROVIDES

A

INTEGRITY, DIGITAL SIGNATURE & AUTHENTICATION, NOT ENCRYPTION

120
Q

HIGH AVAILABILITY-SERVER

A

LOAD BALANCING, DISK REPLICATION

121
Q

ALL RECOVERY PLANS

A

BECOME OBSOLETE QUICKLY

122
Q

MAIN REASON FOR CCTV

A

INCREASE GUARD VISIBILITY

123
Q

PROTECT AGAINST BRUTE-FORCE ATTACK

A

ACCOUNT LOCK-OUT AFTER 3 UNSUCCESSFUL ATTEMPTS

124
Q

FORMAL DESCRIPTION OF SECURITY POLICY

A

ACCESS CONTROL MODULE

125
Q

ONE-WAY HASH

A

DIFFERENT DIGEST FOR DIFFERENT DATA, VARIABLE INPUT-FIXED OUTPUT GIVEN DIGEST, COMPUTATIONALLY INFEASIBLE TO FIND CORRESPONDING MESSAGE

126
Q

X.509

A

DIGITAL CERTIFICATES

127
Q

HOST-BASED IDS-DISADVANTAGE

A

COSTLY TO MANAGE

128
Q

SECURITY REQUIREMENT UNIQUE TO COMPARTMENTED WORKSTATION

A

INFORMATION LABELS

129
Q

ACT OF VALIDATING USER

A

AUTHENTICATION

130
Q

SALARY LEVELS-CLASSIFICATION IN PRIVATE SECTOR

A

PRIVATE

131
Q

PROTECTION PROFILE

A

COMMON CRITERIA (CC)

132
Q

ORANGE BOOK

A

SECURITY TESTING, DESIGN SPECIFICATION & TESTING, TRUSTED DISTRIBUTION, NOT SYSTEM INTEGRITY

133
Q

MOST SECURE FORM OF 3DES

A

DES-EDE3

134
Q

MAC ADDRESS SIZE

A

48-BIT, ALSO CALLED HARDWARE ADDRESS

135
Q

IPV4 ADDRESS SIZE IN BITS

A

32-BIT

136
Q

MTO

A

MAXIMUM TOLERABLE DOWNTIME, MAX DELAY BUSINESS CAN TOLERATE & STILL BE VIABLE

137
Q

ATM

A

FIXED CELL SIZE

138
Q

CONFLICT OF INTEREST, SUBJECT, COMPANY DATASETS = WHAT MODEL

A

CHINESE WALL

139
Q

FACIAL IDENTIFICATION

A

EIGEN FEATURES OF EIGEN FACES

140
Q

MAC CATEGORY OF A RESOURCE CAN BE ONLY BE CHANGED BY

A

ADMINISTRATORS

141
Q

STATE MACHINE MODEL IS BEST FOR

A

CONFIDENTIALITY

142
Q

BELL-LAPADULA (BLP) SECURITY MODE WITH HIGHEST RISK

A

MULTI-LEVEL

143
Q

DATA DICTIONARY

A

CONTROL & MANAGE DATA FROM A CENTRAL LOCATION

144
Q

TECHNIQUE FOR ARTIFICIAL INTELLIGENCE

A

CYCLIC-BASED REASONING STATEMENT

145
Q

NOT EFFECTIVE DETERRENT AGAINST DATABASE INFERENCE ATTACKS

A

SMALL QUERY SETS

146
Q

BUSINESS CONTINUITY PLAN DEVELOPMENT DEPENDS ON

A

BIA

147
Q

CONTROL TECHNIQUE REQUIRES SEPARATE ENTITIES OPERATING IN CONCERT

A

DUAL CONTROL