Idk Flashcards
A legal contract between the holder of confidential information and another person to whom that information is disclosed, prohibiting that other person from disclosing the confidential information to any other party is known as:
NDA
A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as:
AUP
Which of the acronyms listed below refers to a maximum tolerable period of time required for restoring business functions after a failure or disaster?
RTO
Recovery Time Objective
In business continuity planning, the maximum tolerable point in time to which systems and data must be recovered after an outage is called:
RPO
Recovery Point Objective
Which of the following terms is used to describe an average time required to repair a failed component or device?
MTTR
Mean Time To Recovery
Which term describes the predicted loss of value to an asset based on a single security incident?
SLE
Single Loss Expectancy
Which of the acronyms listed below refers to a risk assessment formula defining probable financial loss due to a risk over a one-year period?
ALE
Annual Loss Expectancy
An estimate based on the historical data of how often a threat would be successful in exploiting a vulnerability is known as:
ARO
Annualized Rate of Occurrence
In quantitative risk assessment, this term is used for estimating the likelihood of occurrence of a future threat.
ARO
Annualized Rate of Occurrence
In forensic analysis, taking hashes ensures that the collected digital evidence retains:
Integrity
Disabling certain system functions or shutting down the system when risks are identified is an example of:
Risk Avoidance
Contracting out a specialized technical component when the company’s employees lack the necessary skills is an example of:
Risk Transference
Which of the following terms relates closely to the concept of residual risk?
Risk Acceptance
Assessment of risk probability and its impact based on subjective judgment falls into the category of:
Qualitative Risk Assessment
Quantitative Risk Assessment
A calculation of the Single Loss Expectancy (SLE) is an example of:
Which of the following would be of help in preserving the integrity of a digital evidence? (Select 2 answers)
- Disk Imaging
* Hashing
Indicating whether a file has been modified since the last backup.
Archive Bit
Which of the answers listed below refer to examples of deterrent security controls? (Select 3 answers)
- Warning Signs
- Lighting
- Login Banner
What are the examples of preventive security controls? (Select 3 answers)
- OS Hardening
- Separation of Duties
- Security Guards
Which of the following answers refer to examples of detective security controls (Select 3 answers)
- System Logs
- Security Audits
- CCTV
Which of the answers listed below refer to examples of corrective security controls? (Select 3 answers)
- IPS
- Alternate Site
- Backup Data Recovery
Which of the following answers refers to a compensating security control?
Backup Generator
Which of the terms listed below DO NOT fall into the category of technical security controls? (Select 3 answers)
- Barricades/Bollards
- Cable Locks
- Secure Cabinets/Enclosures
What are the examples of administrative security controls? (Select 3 answers)
- Risk Assessments
- Escalation Procedures
- Contingency Planning
Which of the following terms DO NOT fall into the category of physical security controls? (Select 3 answers)
- User password
- Encryption
- AV Software
Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?
Degaussing
Which of the acronyms listed below refers to any type of information pertaining to an individual that can be used to uniquely identify that person?
PII
The US Health Insurance Portability and Accountability Act (HIPAA) provides privacy protection for: (Select best answer)
PHI
A type of encryption scheme where the same key is used to encrypt and decrypt data is referred to as: (Select 3 answers)
- Symmetric Encryption
- Session-Key Encryption
- Secret-Key Encryption
Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use?
ECB
Which of the block cipher modes listed below provides both data integrity and confidentiality?
GCM
In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key. (True or False)
True
Pseudo-random data added to a password before hashing is called:
Salt
Which of the following answers refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks?
Salt
Pseudo-random data used in combination with a secret key in WEP and SSL encryption schemes is known as:
IV
Examples of means that provide randomization during the encryption process include: (Select 3 answers)
- Cryptographic nonce
- Salting
- IV
What are the characteristic features of Elliptic Curve Cryptography (ECC)? (Select 3 answers)
- Asymmetric encryption
- Low processing power
- Suitable for small wireless devices
What are the examples of weak/deprecated cryptographic solutions? (Select 3 answers)
- WEP
- SSL
- DES
Digital signatures provide: (Select 3 answers)
- Integrity
- Authentication
- Non-repudiation
Which of the terms listed below is used to describe a situation where a small change introduced to the input data before encryption causes large changes in its encrypted version?
Diffusion
Which of the following terms is used in conjunction with the assumption that the output of a cryptographic function should be considerably different from the corresponding plaintext input?
Confusion
Unlike stream ciphers which process data by encrypting individual bits, block ciphers divide data into separate fragments and encrypt each fragment separately. (True or False)
True
In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as a key size or key length. The key size determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security. (True or False)
True
What are the characteristic features of a session key? (Select 2 answers)
- Used during a single session
* Symmetric key
The term “Ephemeral key” refers to an asymmetric encryption key designed to be used only for a single session or transaction. (True or False)
True
In cryptography, the term “Secret algorithm” refers to an algorithm designed in a way that prevents the examination of its inner workings. (True or False)
True
Which of the three states of digital data requires data to be processed in an unencrypted form?
Data-in-use
In cryptography, the term “Key stretching” refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks. (True or False)
True
Which of the answers listed below refers to a solution designed to strengthen the security of session keys?
Perfect forward secrecy (PFS)
Which of the following terms illustrate(s) the security through obscurity concept? (Select all that apply)
- Code obfuscation
- Steganography
- SSID broadcast suppression
- Substitution cipher
Which of the answers listed below refer to the Advanced Encryption Standard (AES)? (Select 3 answers)
- Symmetric-key algorithm
- 128-, 192-, and 256-bit keys
- Block cipher algorithm
Which of the algorithms listed below does not belong to the category of symmetric ciphers?
RSA (Public-key encryption)
A cryptographic standard for digital signatures is known as:
Digital Signature Algorithm (DSA) (Public-key cryptography)
Which of the following answers refers to a commonly used asymmetric algorithm for secure exchange of symmetric keys?
Diffie-Hellman
Which of the following are hashing algorithms? (Select all that apply)
- MD5
- RIPEMD
- HMAC
- SHA
What are the examples of key stretching algorithms? (Select 2 answers)
- Bcrypt
* PBKDF2
Which of the answers listed below refer to obfuscation methods? (Select 3 answers)
- Steganography
- XOR cipher
- ROT13
A security protocol designed to strengthen WEP implementations is known as:
TKIP
What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers)
- Suitable for large corporate networks
* Requires RADIUS authentication server
Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?
Public Key Infrastructure (PKI)
A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:
Certificate Authority (CA)
Which of the following solutions allow to check whether a digital certificate has been revoked? (Select 2 answers)
- CRL
* OSCP
What is the fastest way for validating a digital certificate?
OSCP
Which of the answers listed below refers to a method for requesting a digital certificate?
Certificate Signing Request (CSR)
Which of the following allows for checking digital certificate revocation status without contacting Certificate Authority (CA)?
OCSP Stapling (Determines if an SSL certificate is valid)
A security mechanism that allows HTTPS websites to resist impersonation by attackers using fraudulent certificates is called:
HTTP Public Key Pinning (HPKP)
Which of the answers listed below refer to examples of PKI trust models?
- Single CA model
- Hierarchical model (root CA + intermediate CAs)
- Mesh model (cross-certifying CAs)
- Web of trust model (all CAs act as root CAs)
- Client-server mutual authentication model
- *** All of the above
A trusted third-party storage solution providing backup source for cryptographic keys is referred to as:
Key Escrow
Copies of lost private encryption keys can be retrieved from a key escrow by recovery agents. Recovery agent is an individual with access to key database and permission level allowing him/her to extract keys from escrow.
(True or False)
True
The term “Certificate chaining” refers to a process of verifying the authenticity of a newly received digital certificate. Such process involves checking all of the certificates in the chain of certificates from a trusted root CA, through any intermediate CAs, down to the certificate issued to the end user. A new certificate can only be trusted if each certificate in that certificate’s chain is properly issued and valid.
(True or False)
True
Which digital certificate type allows multiple subdomains to be protected by a single certificate?
Wildcard certificate
A digital certificate which allows multiple domains to be protected by a single certificate is known as:
Subject Alternative Name (SAN) certificate
Which of the following certificate formats is used to store a binary representation of a digital certificate?
Distinguished Encoding Rules (DER)
Which of the answers listed below refers to the most common format in which Certificate Authorities (CA) issue certificates?
Privacy Enhanced Mail (PEM)
Which digital certificate formats are commonly used to store private keys? (Select 2 answers)
- PFX
* P12
Which of the answers listed below refers to a technology designed to simplify network infrastructure management?
Software-Defined Networking (SDN)
Which of the following answers refers to a data storage device equipped with a hardware-level encryption functionality?
Self-Encrypting Drive (SED)
A hardware device or a plugin-in card used for secure management, processing and storage of cryptographic keys is known as:
Hardware Security Module (HSM)
The term “Remote attestation” refers to a TPM’s capability to check a computer system’s integrity against a remote trusted third-party service.
(True or False)
True
The concept of a secure supply chain is based on the assumption that all hardware/software should originate from reliable sources.
(True or False)
True
EMI shielding protects the transferred data signals from: (Select all that apply)
- Outside interference
* Eavesdropping
The term “Trusted OS” refers to an operating system:
Equipped with enhanced security features
A system providing the capability for remote control, real-time monitoring, and gathering information related to industrial equipment is generally referred to as:
Industrial Control System (ICS)
Which of the following answers lists an example of an industrial control system solution?
SCADA
Which of the following would be the most effective in securing an ICS infrastructure?
Network isolation
A document stored in the memory of this device can pose a risk of an unauthorized data access.
MFD
Which of the answers listed below refer to technical security controls that can be applied to an UAV? (Select 2 answers)
- Wireless signal encryption
* Password protection
An SDLC model featuring a linear design process consisting of distinct sequential stages is known as:
Waterfall
One of the main premises behind the waterfall software development model is the adaptation to changes during the software development process rather than strict adherence to a well-documented sequence of steps.
(True or False)
False
Which of the following terms refers to a DevOps software deployment approach in which applications and services are redeployed rather than modified whenever a need for introducing a change occurs?
Immutable systems
A DevOps practice that replaces manual configuration of hardware with automatic deployment through code is called:
Infrastructure as Code (IaC)
Which programming aspects listed below are critical in secure application development process? (Select 2 answers)
- Input validation
* Error and Exception handling
Which of the following answers refers to a countermeasure against code injection?
Input validation
The process of removing redundant entries from a database is known as:
Normalization
What are the countermeasures against SQL injection attacks? (Select 2 answers)
- Stored procedures
* Input validation
What is the purpose of code signing? (Select 2 answers)
- Confirms the application’s source of origin
* Validates the application’s integrity
Code obfuscation techniques rely on encryption to protect the source code against unauthorized access.
(True or False)
False