from the test Flashcards

1
Q

<p>\_\_ is an example of asymmetric cryptography</p>

A

<p>RSA </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

<p>which e-mail security method is defined in RFC 2632 and RFC 2634? </p>

A

<p>Secure Multipurpose Internet Mail Extensions (s/mime)</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

<p>\_\_\_ provides non-repudiation, authentication, and integrity for e-mail messages. </p>

A

<p>S/MIME 3 </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

<p>\_\_ \_\_ is a spyware technique that inserts a dynamic link library into a running process's memory. </p>

A

<p>DLL Injection </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

<p>\_\_ \_\_ occurs when the length of the input data is longer than the length processor buffers can handle. </p>

A

<p>Buffer Overflow</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

<p>The major security vulnerability of using FTP is --- </p>

A

<p>User ID and password are sent in clear text</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

<p>This layer of the OSI model segments and reassembles data into a data stream and provides reliable and unreliable end to end data transmission</p>

A

<p>(Layer 4) Transport</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

<p>This layer starts, maintains, and stops sessions between applications on different network devices. </p>

A

<p>(Layer 5) Session Layer</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

<p>This layer provides the functions to establish and maintain the physical link between network devices</p>

A

<p>(Layer 1) Physical </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

<p>\_\_\_ provides centralized remote user authentication, authorization and accounting. </p>

A

<p>RADIUS</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

<p>This mode ensures that wireless clients can only communicate with the wireless access point and not with other wireless clients.</p>

A

<p>Isolation Mode</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

<p>\_\_\_ is an intrusion detection system (IDS)</p>

A

<p>Snort</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

<p>\_\_\_ \_\_\_ is the practice of dispensing IP addresses and host names with the goal of traffic diversion.</p>

A

<p>DNS poisoning </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

<p>\_\_\_ \_\_\_ \_\_\_ allows an attacker to reroute data traffic from a network device to a personal computer</p>

A

<p>Network Address Hijacking </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

<p>\_\_ is a technique used by intruders to circumvent a lock</p>

A

<p>Raking</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

<p>\_\_\_ is a collection of programs that grants a hacker administrative access to a computer or network</p>

A

<p>Rootkit</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

<p>\_\_\_ risk analysis does not assign monetary values</p>

A

<p>Qualitative</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

<p>\_\_ risk analysis attempts to predict the likelihood a threat would occur and assigns a monetary value in the even a loss occus</p>

A

<p>Quantitative </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

<p>\_\_ this risk management is discouraging cerain actions from being taken to protect against risk</p>

A

<p>Deterrence </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

<p>\_\_ this risk management is deciding to no longer employ the actions associated with a particular risk.</p>

A

<p>Avoidance </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

<p>\_\_ this risk management is taking steps to reduce risk </p>

A

<p>Mitigation</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

<p>\_\_\_ \_\_\_ allows you to configure how many new passwords must be created before an old one can be reused. </p>

A

<p>gdfg</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

<p>A \_\_ test tests specific systems to ensure their operation at alternate facilities </p>

A

<p>Parallel Test </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

<p>The chain of custody guarantees \_\_\_ </p>

A

<p>the identity and integrity of the evidence from the collection stage to its presentation in the court of law. </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

<p>The revocation request grace period refers to \_\_ </p>

A

<p>The maximum time taken by the certification authority server to perform a revocation. </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

<p>You should us a \_\_ to determine if the performance of the server had degraded.</p>

A

<p>System Monitor</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

<p>A \_\_ scanner will provide iformation on the ports and services that are available on your network.</p>

A

<p>Port</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

<p>A \_\_ test checks your network for known vulnerabilities and provides methods for protection against the vulnerabilities</p>

A

<p>Vulnerability </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

<p>During which phase of SSL communication do a web client and a web server establish a TCP/IP connection?</p>

A

<p>Handshake</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

<p>Secure Hashing Algorithm (SHA) produces \_\_ bit checksums</p>

A

<p>160</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

<p>\_\_ establishes a web of trust between the users.</p>

A

<p>Pretty Good Privacy (PGP) </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

<p>PGP is a public key encryption standard that is used to \_\_</p>

A

<p>to protect e-mail and files that are transmitted over the network. </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

<p>PGP encrypts data using \_\_ encryption</p>

A

<p>symmetric</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

<p>Secure Code Review examines \_\_\_\_</p>

A

<p>all written code for any security holes that may exist</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

<p>This type of tool tests your networks security to see if it can be penetrated.</p>

A

<p>Penetration tester</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

<p>An Executive succession plan ensures \_\_ </p>

A

<p>that a vital corporate position is filled in the even it is vacated during a disaster </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

<p>RSA is an example of \_\_ cryptography with \_\_\_</p>

A

<p>asymmetric cryptography with authentication</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

<p>Asymmetric algorithms include</p>

A

<p>include Diffie-Hellman, RSA,ElGamal, CAST</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

<p>Symmetric algorithms include</p>

A

<p>Data Encryption Standard
Triple DES (3DES)
Advanced Encryption Standard </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

<p>A _ virus can infect both executable files and boot sectors of hard disk drives.</p>

A

<p>Multipart </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

<p>This command line utility is used to trouble shoot a domain name server. </p>

A

<p>Nslookup</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

<p>This utility traces the route a packet takes and records the hops along the way. </p>

A

<p>Tracert/traceroute </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

<p>\_\_\_ is an application layer protocol whose purpose is to collect statistics from TCP/IP devices.</p>

A

<p>simple network management protocol. (SNMP) </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

<p>What ports does snmp use?</p>

A

<p>Ports 161 and 162</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

<p>\_\_\_\_\_ allows a user to dial in to the network via a modem or modem pool while providing the user with secure access during the he is connected </p>

A

<p>Remote access server (RAS) </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

<p>What infrastructure provides the system for the secure exchange of data over a network through the use of an asymmetric key system? </p>

A

<p>Public key infrastructure (pki)</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

<p>Another term for technical controls is \_\_ controls</p>

A

<p>Logical</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

<p>A backup control is an example of an \_\_\_ control </p>

A

<p>Operational Control</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

<p>Software testing is an example of an \_\_\_ control</p>

A

<p>Operational Control</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

<p>To implement hardware-based encryption on a Windows server 2008, you need a \_\_</p>

A

<p>Trusted Platform Module (TPM) chip. </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

<p>Symmetric keys do not ensure \_\_ and \_\_\_ for key management because the same key is used for encryption and decryption</p>

A

<p>Security and Scalability </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

<p>The best protection against cross-site scripting (XSS) is to \_\_</p>

A

<p>Disable the running of the scripts</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

<p>A \_\_ contains a list of serial numbers for digital certificates that have not expired, but that a CA has specified to be invalid.</p>

A

<p>Certificate Revocation List (CRL) </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

<p>\_\_ is a hashing algorithm that creates a message digest, which can be used to determine whether a file has been changed since the message digest has been changed</p>

A

<p>Secure Hashing Algorithm (SHA)-1</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

<p>This network device acts as an internet gateway, firewall and internet caching server for a private network.</p>

A

<p>Proxy Server</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

<p>\_\_ is traffic redirection to a site that looks identical to the intended site</p>

A

<p>Pharming </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

<p>\_\_ is an asymmetric public key encryption algorithm based on the Diffie-Hellman key agreement. </p>

A

<p>ElGamal</p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

<p>\_\_ is a Microsoft Windows feature that supports file encryption on NTFS hard disk volumes.</p>

A

<p>Encrypting File System (EFS) </p>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

<p>Sending data across an insecure network, such as the internet, affects \_\_ and \_\_</p>

A

<p>Confidentiality And Integrity </p>

60
Q

<p>\_\_\_ is a block cipher encryption standard that uses a single 56-bit encryption to encrypt 64- bit blocks of data.</p>

A

<p>Data Encryption Standard </p>

61
Q

<p>\_\_ IDS watches for intrusions that match a known identity.</p>

A

<p>Signature IDS </p>

62
Q

<p>A \_\_ IDS detects activities that are unusual. </p>

A

<p>Anomaly- based </p>

63
Q

<p>Make sure to look up PBX attacks</p>

A

<p>PBX</p>

64
Q

<p>\_\_ was created to deal with Voice over IP and wireless services. </p>

A

<p>Diameter</p>

65
Q

<p>\_\_ is used to digitally sign packets that are transmitted on Internet Protocol Security (IPsec connections. </p>

A

<p>Kyed Hashing for Message Authentication Code (KHMAC </p>

66
Q

<p>\_\_ files contain information about viruses, such as examples of virus code and the types that a particular virus infects</p>

A

<p>Signature File</p>

67
Q

<p>What is the purpose of Infrastructure as a Service in cloud computing?</p>

A

<p>It provides computer and server infrastructure, typically through a virtualization environment. </p>

68
Q

<p>What is the main difference between virtualization and cloud computing?</p>

A

<p>The location and ownership of the physical components. </p>

69
Q

<p>Which document lists the steps to take in case of a disaster to your main IT site?</p>

A

<p>Disaster Recovery Plan (DRP) </p>

70
Q

<p>Which private-key encryption algorithm does PGP use to encrypt data?</p>

A

<p>International Data Encryption Algorithm (IDEA) </p>

71
Q

<p>Which document is used when it is necessary to invoke legal action against an employee for inappropriate use of computer resources.</p>

A

<p> Acceptable use policy </p>

72
Q

<p>Which error arises because data is not checked before input to ensure that it has an appropriate length?</p>

A

<p>Buffer overflow errors</p>

73
Q

<p>Which business continuity planning factor includes vulnerability analysis </p>

A

<p>Business Impact Assessment </p>

74
Q

<p>What is the name of the process for removing only the incriminating data from the audit logs?</p>

A

<p>Scrubbing</p>

75
Q

<p>Which port does NNTP </p>

A

<p>119</p>

76
Q

<p>Which audit category monitors changes to user accounts and groups?</p>

A

<p>The Audit Account Management category</p>

77
Q

What are the four types of water sprinklers?

A

Wet pipe, dry pipe, preaction and deluge.

78
Q

<p>\_\_ based monitoring looks for behavior that is not allowed and acts accordingly </p>

A

<p>Behavior </p>

79
Q

<p>A \_\_ filtering firewall only looks at a data packet to obtain the source and destination addresses and the protocol and port used.</p>

A

<p>Packet Filtering Firewall</p>

80
Q

<p>LDAP entries are contained in a \_\_ which is a hierarchical structure that can be searched for directory information.</p>

A

<p>Directory Information Tree</p>

81
Q

<p>\_\_ is a private key encryption standard that was developed by the us government for the Clipper Chip. </p>

A

<p>Skipjack</p>

82
Q

<p>Skipjack uses an _-bit key. </p>

A

<p>80</p>

83
Q

<p>A \_\_\_ firewall is also referred to as an appliance firewall. </p>

A

<p>Hardware</p>

84
Q

<p>\_\_ provides a transparent firewall solution between an internal network and outside networks.</p>

A

<p>NAT</p>

85
Q

<p>Separation of duties is employed when user accounts are \_\_</p>

A

<p>created by one employee and user permissions are configured by another employee.</p>

86
Q

<p>The primary loop protection on an Ethernet network is \_\_</p>

A

<p>Spanning Tree Protocol (STP) </p>

87
Q

<p>What is a disadvantage of a hardware firewall compared to a software firewall?</p>

A

<p>A hardware firewall has a fixed number of available interfaces.</p>

88
Q

<p>What is an embedded firewall?</p>

A

<p>A firewall that is integrated into a router.</p>

89
Q

<p>A software firewall is installed on a \_\_\_</p>

A

<p>server operating system.</p>

90
Q

<p>A _ is an encryption method designed to be used only once.</p>

A

<p>One-time pad (OTP)</p>

91
Q

<p>\_\_\_ is an 802.11b communications mode that enables wireless devices to communicate directly. </p>

A

<p>Ad hoc</p>

92
Q

<p>Classification of information is typically part of an \_\_ </p>

A

<p>information policy</p>

93
Q

<p>Secure Hashing Algorithm (SHA) produces \_\_ bit checksums.</p>

A

<p>160 bit</p>

94
Q

<p>Which size checksum does MD5 produce? </p>

A

<p>128 bit</p>

95
Q

__ ensures that the coputer on the network meet an organizations security policies

A

Network Access Control

96
Q

__ __ is a smart card attack that allows a hacker to uncover the encryption key using reverse engineering.

A

Fault generation

97
Q

you should use __ to encrypt a single document from your web server.

A

S-http

98
Q

Which Kerberos 5 entitiy authenticates users?

A

The Authentication Service

99
Q

___ is the process in which the management accepts system functionality and assurance.

A

Accreditation

100
Q

What is authentication?

A

verifying the identity of users

101
Q

You should use a __ analyzer to determine if passwords are being transmitted in plain text

A

protocol analyzer

102
Q

What does the message authentication code (MAC) ensure?

A

MAC ensures the integrity of messages.

103
Q

___ indentifies sensitive data and ensures that unauthorized entities cannot access it

A

Confidentiality

104
Q

___ ensures that data and resources are available to authorized entities in a timely manner

A

Availability

105
Q

__ is the process of identifying a subject requesting system access.

A

Authentication

106
Q

__ ensures that data and resources are edited only in an approved manner by authorized entities.

A

Integrity

107
Q

Which security service does encryption provide?

A

Confidentiality

108
Q

__ is an error-control technique that ensures that files have not been changed.

A

packet checksum

109
Q

__ refers to the quantitative amount of loss incurred by a single event.

A

Single Loss Expectancy

110
Q

A network protocol analyzer is also known as a

A

Packet Sniffer

111
Q

A __ right occurs when user inherits a permission based on group membership.

A

Implicit

112
Q

An __ right occurs when a user is directly give a permission.

A

Explicit

113
Q

A __ plan is primarily concerned with recovering major systems and applications after a disruption.

A

Contingency

114
Q

In low encryption mode, which level of encryption does WEP provide?

A

64-bit

115
Q

__ allows organizations to deploy web servers, databases, and delelopment tools in a cloud

A

Platform as a service

116
Q

__ allows organizations to run applications in a cloud.

A

Software as a service

117
Q

__ allows organizations to deploy virtual machines, servers, and storage in a cloud.

A

Infrastructure

118
Q

__ is a protocol that secures messages between the Application and Transport layer

A

SSL

119
Q

__ is a protocol used to test and report on path info between network devices

A

ICMP

120
Q

__ is a protocol that allows files to be copied over a secure connection.

A

SCP

121
Q

Look up EAP methods

A

dfg

122
Q

Log analysis is an example of a

A

network analysis

123
Q

A __ copy of a hard disk refers to making a copy at the sector level to cover every part of the area that can store user data.

A

Bit-level

124
Q

__ is synonymous with protocol analyzing.

A

Packet Sniffing

125
Q

Layer 2 Tunneling Protocol operates at the ___ layer of the OSI model?

A

Data Link layer 2

126
Q

A Fail-over system is a computer that does ___?

A

Is connected to a primary computer and takes over if the primary computer fails.

127
Q

__ is an authentication framework used in wireless networks and point-to-point connections.

A

Extensible Authentication Protocol (EAP)

128
Q

Which setting ensures that accounts are not used beyond a certain date and/or time?

A

account expiration

129
Q

Which port does SSH use?

A

22

130
Q

What is derived by multiplying single loss expectancy (SLE) by the annualized rate of occurrence (ARO) of an event?

A

Annualized loss expectancy (ALE)

131
Q

what is the primary concern of RAID?

A

Availability

132
Q

Which type of attack does Challenge Handshake Authentication Protocol protect against?

A

Replay attack

133
Q

Which protocol is the combo of PPTP and Cisco’s Layer 2 forwarding (L2F) technology?

A

Layer 2 Tunneling Protocol (L2TP)

134
Q

What does SLA stand for?

A

Service Level Agreement

135
Q

What does the SLA define?

A

Defines the level of service to be provided

136
Q

What is a BPO?

A

Blanket Purchase Order

137
Q

What does the BPO do?

A

It is an agreement between a government agency and a private company for ongoing purchases of goods or services.

138
Q

What is a MOU?

A

Memorandum of Understanding

139
Q

What does a MOU do?

A

Ii is a brief summary of which party is responsible for what portion of the work.

140
Q

What is an ISA?

A

The Interconnection Security Agreement.

141
Q

What does a ISA do?

A

This is an agreement between two organizations that have connected systems.

142
Q

TCP/IP protocol suite operates at which layer of the OSI model?

A

Layer 4 Transmission

143
Q

LDAP uses which port?

A

389

144
Q

LDAP with SSL uses which port?

A

636

145
Q

Which port does L2TP use?

A

1701

146
Q

The audit __ __ category will audit all instances of users exercising their rights.

A

Audit privilege use

147
Q

The audit __ __ audit category monitors changes to user accounts and groups

A

Account Management