Host Security Flashcards
By default, what is at the end of every ACL? A. A stateful inspection checkpoint B. An implicit allow statement C. A command that checks for ICMP D. An implicit deny all statement
D. By default, there is an implicit deny all clause at the end of every ACL.
Extended ACLs cannot check for which of the following? A. Protocol B. Port number C. Response value D. Precedence value
C. Extended ACLs can check for protocols, port numbers, Differentiated Services Code Point (DSCP) values, precedence values, and the state of the synchronize sequence number (SYN) bit.
Extended ACLs can process all of the following, except \_\_\_\_\_\_\_\_\_\_\_\_\_\_. A. SSL B. ICMP C. TCP D. UDP
A. Extended ACLs can process IP, ICMP, TCP, and UDP.
A NIDS can do which of the following with encrypted email network traffic? A. Nothing B. Scan for viruses C. Alert if malicious D. Full content inspection
A. An NIDS cannot scan the contents of encrypted email.
One item of importance to the CASP+ is trusted operating systems. Several standards have been developed to measure trust in an operating system. One such standard is TCSEC. TCSEC mandatory protection can be defined as \_\_\_\_\_\_\_\_\_\_\_\_\_\_. A. Category A B. Category B C. Category C D. Category D
B. Category B is mandatory protection.
ITSEC has how many assurance levels? A. 5 B. 7 C. 9 D. 11
B. ITSEC has seven assurance levels.
EAL 3 is equal to which of the following?
A. Semi-formally designed and tested
B. Methodically checked and tested
C. Functionally tested
D. Methodically designed, tested, and reviewed
B. EAL 3 is equal to methodically checked and tested.
The Bell-LaPadula model is based on which of the following? A. Availability B. Integrity C. Confidentiality D. Security
C. The Bell–LaPadula model is confidentiality-based.
The Biba model is based on which of the following? A. Availability
B. Integrity
C. Confidentiality
D. Security
B. The Biba model is integrity-based.
Which was the first security model designed for commercial usage? A. Bell-LaPadula B. Brewer and Nash C. Clark-Wilson D. Biba
C. The Clark–Wilson model was the first designed for commercial usage.
Which model was designed to prevent conflicts of interest? A. Bell-LaPadula B. Brewer and Nash C. Clark-Wilson D. Biba
B. The Brewer and Nash model was designed to prevent conflicts of interest.
Which approach to network security might disable autorun and remove CD drives? A. Vector-oriented security B. Information-centric C. Protective areas D. Protective enclaves
A. Vector-oriented security focuses on common vectors used to launch an attack. These can include disabling Autorun on USB drives, disabling USB ports, and removing CD/DVD burners.
The concept that users should have only the access needed is known as which of the following? A. Need to know
B. Defense in depth
C. The principle of least privilege
D. Deny all
C. The principle of least privilege is based on the concept that users should have only the access needed and nothing more.
A mobile user calls you from the road and informs you that his laptop is acting strangely. He reports that there were no problems until he downloaded a weather program, and he is now getting pop-ups and other redirects from a site that he had never visited before. Which of the following terms describes a program that enters a system disguised in another program? A. Trojan horse virus B. Polymorphic virus C. Worm D. Spyware
D. Spyware may perform keylogging, redirect the user to unrequested websites, flood the user with pop-ups, or monitor their activity.
Your system has been acting strangely since you downloaded a program that you thought was from a colleague. Upon examining the program and comparing it to the source on the vendor’s website, you discover that they are not the same size and have different MD5sum values. Which type of malware probably infected your system? A. Virus B. Trojan C. Worm D. Spyware
B. Trojans are programs that present themselves as something useful yet contain a malicious payload.