from the test Flashcards
<p>\_\_ is an example of asymmetric cryptography</p>
<p>RSA </p>
<p>which e-mail security method is defined in RFC 2632 and RFC 2634? </p>
<p>Secure Multipurpose Internet Mail Extensions (s/mime)</p>
<p>\_\_\_ provides non-repudiation, authentication, and integrity for e-mail messages. </p>
<p>S/MIME 3 </p>
<p>\_\_ \_\_ is a spyware technique that inserts a dynamic link library into a running process's memory. </p>
<p>DLL Injection </p>
<p>\_\_ \_\_ occurs when the length of the input data is longer than the length processor buffers can handle. </p>
<p>Buffer Overflow</p>
<p>The major security vulnerability of using FTP is --- </p>
<p>User ID and password are sent in clear text</p>
<p>This layer of the OSI model segments and reassembles data into a data stream and provides reliable and unreliable end to end data transmission</p>
<p>(Layer 4) Transport</p>
<p>This layer starts, maintains, and stops sessions between applications on different network devices. </p>
<p>(Layer 5) Session Layer</p>
<p>This layer provides the functions to establish and maintain the physical link between network devices</p>
<p>(Layer 1) Physical </p>
<p>\_\_\_ provides centralized remote user authentication, authorization and accounting. </p>
<p>RADIUS</p>
<p>This mode ensures that wireless clients can only communicate with the wireless access point and not with other wireless clients.</p>
<p>Isolation Mode</p>
<p>\_\_\_ is an intrusion detection system (IDS)</p>
<p>Snort</p>
<p>\_\_\_ \_\_\_ is the practice of dispensing IP addresses and host names with the goal of traffic diversion.</p>
<p>DNS poisoning </p>
<p>\_\_\_ \_\_\_ \_\_\_ allows an attacker to reroute data traffic from a network device to a personal computer</p>
<p>Network Address Hijacking </p>
<p>\_\_ is a technique used by intruders to circumvent a lock</p>
<p>Raking</p>
<p>\_\_\_ is a collection of programs that grants a hacker administrative access to a computer or network</p>
<p>Rootkit</p>
<p>\_\_\_ risk analysis does not assign monetary values</p>
<p>Qualitative</p>
<p>\_\_ risk analysis attempts to predict the likelihood a threat would occur and assigns a monetary value in the even a loss occus</p>
<p>Quantitative </p>
<p>\_\_ this risk management is discouraging cerain actions from being taken to protect against risk</p>
<p>Deterrence </p>
<p>\_\_ this risk management is deciding to no longer employ the actions associated with a particular risk.</p>
<p>Avoidance </p>
<p>\_\_ this risk management is taking steps to reduce risk </p>
<p>Mitigation</p>
<p>\_\_\_ \_\_\_ allows you to configure how many new passwords must be created before an old one can be reused. </p>
<p>gdfg</p>
<p>A \_\_ test tests specific systems to ensure their operation at alternate facilities </p>
<p>Parallel Test </p>
<p>The chain of custody guarantees \_\_\_ </p>
<p>the identity and integrity of the evidence from the collection stage to its presentation in the court of law. </p>
<p>The revocation request grace period refers to \_\_ </p>
<p>The maximum time taken by the certification authority server to perform a revocation. </p>
<p>You should us a \_\_ to determine if the performance of the server had degraded.</p>
<p>System Monitor</p>
<p>A \_\_ scanner will provide iformation on the ports and services that are available on your network.</p>
<p>Port</p>
<p>A \_\_ test checks your network for known vulnerabilities and provides methods for protection against the vulnerabilities</p>
<p>Vulnerability </p>
<p>During which phase of SSL communication do a web client and a web server establish a TCP/IP connection?</p>
<p>Handshake</p>
<p>Secure Hashing Algorithm (SHA) produces \_\_ bit checksums</p>
<p>160</p>
<p>\_\_ establishes a web of trust between the users.</p>
<p>Pretty Good Privacy (PGP) </p>
<p>PGP is a public key encryption standard that is used to \_\_</p>
<p>to protect e-mail and files that are transmitted over the network. </p>
<p>PGP encrypts data using \_\_ encryption</p>
<p>symmetric</p>
<p>Secure Code Review examines \_\_\_\_</p>
<p>all written code for any security holes that may exist</p>
<p>This type of tool tests your networks security to see if it can be penetrated.</p>
<p>Penetration tester</p>
<p>An Executive succession plan ensures \_\_ </p>
<p>that a vital corporate position is filled in the even it is vacated during a disaster </p>
<p>RSA is an example of \_\_ cryptography with \_\_\_</p>
<p>asymmetric cryptography with authentication</p>
<p>Asymmetric algorithms include</p>
<p>include Diffie-Hellman, RSA,ElGamal, CAST</p>
<p>Symmetric algorithms include</p>
<p>Data Encryption Standard
Triple DES (3DES)
Advanced Encryption Standard </p>
<p>A _ virus can infect both executable files and boot sectors of hard disk drives.</p>
<p>Multipart </p>
<p>This command line utility is used to trouble shoot a domain name server. </p>
<p>Nslookup</p>
<p>This utility traces the route a packet takes and records the hops along the way. </p>
<p>Tracert/traceroute </p>
<p>\_\_\_ is an application layer protocol whose purpose is to collect statistics from TCP/IP devices.</p>
<p>simple network management protocol. (SNMP) </p>
<p>What ports does snmp use?</p>
<p>Ports 161 and 162</p>
<p>\_\_\_\_\_ allows a user to dial in to the network via a modem or modem pool while providing the user with secure access during the he is connected </p>
<p>Remote access server (RAS) </p>
<p>What infrastructure provides the system for the secure exchange of data over a network through the use of an asymmetric key system? </p>
<p>Public key infrastructure (pki)</p>
<p>Another term for technical controls is \_\_ controls</p>
<p>Logical</p>
<p>A backup control is an example of an \_\_\_ control </p>
<p>Operational Control</p>
<p>Software testing is an example of an \_\_\_ control</p>
<p>Operational Control</p>
<p>To implement hardware-based encryption on a Windows server 2008, you need a \_\_</p>
<p>Trusted Platform Module (TPM) chip. </p>
<p>Symmetric keys do not ensure \_\_ and \_\_\_ for key management because the same key is used for encryption and decryption</p>
<p>Security and Scalability </p>
<p>The best protection against cross-site scripting (XSS) is to \_\_</p>
<p>Disable the running of the scripts</p>
<p>A \_\_ contains a list of serial numbers for digital certificates that have not expired, but that a CA has specified to be invalid.</p>
<p>Certificate Revocation List (CRL) </p>
<p>\_\_ is a hashing algorithm that creates a message digest, which can be used to determine whether a file has been changed since the message digest has been changed</p>
<p>Secure Hashing Algorithm (SHA)-1</p>
<p>This network device acts as an internet gateway, firewall and internet caching server for a private network.</p>
<p>Proxy Server</p>
<p>\_\_ is traffic redirection to a site that looks identical to the intended site</p>
<p>Pharming </p>
<p>\_\_ is an asymmetric public key encryption algorithm based on the Diffie-Hellman key agreement. </p>
<p>ElGamal</p>
<p>\_\_ is a Microsoft Windows feature that supports file encryption on NTFS hard disk volumes.</p>
<p>Encrypting File System (EFS) </p>