Ij Flashcards
In the waterfall model which of the following evaluates a given product against the specifications written for the product
Verification
Verification evaluates the products performance to the acclaimed functionalities and production levels. It also compares the specifications of the product to the actual resulting product
When containing an Incident what is the first step that should always be taken
Secure the area and protect potential evidence
Based on the following asset information what is the organization single loss expectancy per hour?
Maintaining and updating their database cost $124,000 per year customer base revenue is $500,000 per year. For every hour of data compromise Or unavailability they could lose one percent of their customers
5,000
Chosen ciphertext attacks are mainly use against what kind of ciphers?
Pubic key
The risk of the following attack could be mitigated by software develop training
Buffer overflow
Which of the following relies on UDP
DHCP
Who is the primary user of an IDE
Software developer
A company has decided they need to separate the development team from the support team. According to general security principles what job function should be done by the development team
Software design
What protocol provides the user authentication authorization for remote client access?
802.1x
EAP-TLS
ChAP
RADIUS
RADIUS
Which distributed computing architecture is used extensively by web applications? Timesharing Three tier Peer to peer Client server
Three tier
An individual with secret level security clearance cannot read a document designed as top-secret. Which security model is is an example of?
Discretionary access control, Beba, Bell-lapadula or clark Wilson 
Bell la Padula
What type of memories typically use as cash memory?
Cashing random access memory, read only memory, dynamic random access memory, static random access memory
Static random access memory
During an evacuation who is responsible for checking that each individual that area has begun evacuation?
Door monitor, business unit manager, safety warden or meeting point leader
Safety warden
Which of the following is not a responsibility of an information owner?
Approving any disclosure activities, ensuring that the necessary security controls are in place, defining security requirements per classification of back up requirements or ensuring that proper access rights are being used in configuring them properly
Ensuring that proper access rights are being used in configuring them properly
Which of the following biometric access control measures the blood vessels in an eye?
I rescan, fingerprint, facial recognition or retina pattern
Retina pattern
Which of the following devices are read in written into a sequential order?
USB stick, solid-state drive, floppy drive or magnetic tape
Magnetic tape
Which of the following circumstances is computer application security most effective and economical?
When the system is optimized before the additional security, when the system as customers to meet specific security threat, when the system is Design from the beginning to provide the necessary security or when the system is purchase off-the-shelf
When the system is designed from beginning to provide the necessary security
When planning to perform a vulnerability assessment, a large international companies CIO decided to scan their entire IP address space. How can this affect the value of the scan?
The scan will review more problems that can be resolved in a reasonable time, the scan will have a high chance of failing before it completes, the network network will be unavailable while the scan is running or the scan will admit computers are not running at the time
The skin will reveal more problems than can be resolved in a reasonable time
What type of host discovery is used to find a live network systems that aren’t running responsive listing services?
Port scanning, Port monitoring, active or passive
Passive
Which of the following attributes could be used to qualify access control measures?
Administrative defensive detective, administrative preventive detective, associative preventive deterrent, associative preventive detective
Administrative preventive and detective
What is a driving factor in clearly stated data destruction policies?
Easy availability of archival info,
Pre-trial discovery during litigation,
historical records to advise policy makers,
or statistical analysis of past performance
Pretrial discovery during litigation
With regard to access control terminology when are built in subjects for an operating system defined?
When an administrator has a business need,
at that time the operating system is designed,
at the time the operating system is compiled
or when a new policy dictates the need for one
At the time the operating system is designed
Which of the following is example of a directive control?
Background check, encryption, Smart card or locks?
Background check
What is the number of UDP port that could be open on a system?
131,070, 131,072, 65,535 or 65,536
65,536
What step of incident response comes immediately after response?
Containment, mitigation remediation or reporting
Mitigation
What security issue is related to Legacy SCADA protocols like modbus, DNP3, pro fibrous and RP – 570?
They’re clear text
A computer is assigned a time to transmit by controller to void collisions. Which of the following uses a technique?
CSMA\CD, pulling, CSMA backslash CA or ATM? 
Polling
Pulling is commonly used in mainframe environments
What type of token generates new unique codes at fix time intervals?
Asynchronous dynamic, static, challenge response or synchronous dynamic
Synchronous dynamic
A mouse trap manufacturing company factory was flooded during a tsunami. Another division within the company manufacture rat traps in another plant that was not flooded. It could be used to make mouse traps after a day of retooling. What kind of site is this?
Cold, warm, hot or reciprocal
Warm
The computer ethics Institute has published a code of ethics which six to govern behavior of computer users. Which statement accurately reflects one of the 10 Commandments??
Dial shall not use the computer as a witness tool, that should not interfere with other people’s computer work, they’ll shall not use a computer for recreation, or thou shall not waste government computer resources
Thou shall not interfere with other people’s computer work
Against which risk is a perimeter firewall effective?
External exploit of a file server with an unpatri access vulnerability,
An employee opening attachment in a fishing email
Attackers pivoting to a database from a user machine with compromised credentials
Infective files downloaded via SSL from a compromise external Web server
External export of a file server with the unpaired remote access vulnerability
What resources consumed by a botnet during a DDOS
RAM
BANDWIDTH
CAM table space
Source ports
Bandwidth
Which of the following is a primary protective mechanism for active X?
Sandbox, antivirus, integrity checking or digital signature? 
Digital signature
What does CER, FAR AND FRR relate to IN A GRAPH?
Business impact analysis, biometric authentication, IDS/IPS tuning Or vulnerability assessment
Biometric authentication
Which of the following tools we use to record and send a users password over the network?
Keylogger, father, Kerberos or a root kit
Keylogger
What should take place to restore server and it’s data files after a system failure?
Take a forensic hard drive image, reformat the server and reinstall the OS, implement system recovery procedures or clone the server from a similar system
Implement system recovery procedures
Which of the following is only likely to be identified through an assessment of core security processes
IP addresses of house probably in the network perimeter, the root cause of security failures, identification of zero de compromises or the number of listening services on a network
The root cause of security failures
What activity can often uncover evidence of a data breach?
Vulnerability assessment, user acceptance testing, centralize log review, business impact analysis
Centralized log review
While reviewing a file server security log a system administrator notices there are no events log for any type of file access. What type of issue is this?
Authentication, authorization, accountability or availability
Accountability
Removing unnecessary applications and services is part of what process?
Creating security metrics, The provisioning systems, continuous monitoring, or applying security baselines
Applying security baselines
Key component to any baseline security configuration is establishing the minimum necessary services applications needed to perform the required functions this can also be referred to as principle of lease privilege
Which part of a pen test are WHOIS and DNS often use
Exploitation, reconnaissance, vulnerability assessment or scanning
Reconnaissance
Which of the following is so she was buffer overflows?
Cat, and map, a a a a or gets ()
gets()
What is the meterpreter in the Metasploit framework?
payload, a threat, and exploit or vulnerability
A payload
What is a mandatory component of a single sign-on system?
A non-discretionary access control, Federated Identity management, multifactoral syndication or centroids credential source
Centralize credential source
What is the difference between an incremental backup and a differential back up?
And incremental back up is on site and a differential is remote,
a differential backup is on site incrementals remote,
an incremental back up creates files for each day and a differential back up file grows each day
or differential backup creates files for each day in incremental back up file girls each day
An incremental backup creates files for each day and a differential back up file grows each day
Which of the following should be used to extinguish a fire and operating electrical transformer station?
Soda acid, dry powder, CO2 or water
CO2
A $200,000 service firm has a single loss expectancy of 40,000. What is a server firms exposure factor?
20%, 40%, 200% of 500%
20%
Which code review method is a characteristic of extreme programming?
Pair programming, fuzz testing, tool assisted or static analysis
Pair programming
What is the defining characteristic of an 802. 11 ad hoc wireless network?
Clients connect to an access point, Allows access points to communicate with clients, operates without essential access point are used for sniffing wireless networks
Operates without a central access point
An ad hoc wireless network is a peer to peer network specifically designed to operate without is central access point
What does an attacker do with the return pointer when it’s over written?
Set it to a program on the drive the Attacker wants to run
Sets it to another currently running applications and the machine
Set it to an incoming data stream from the network
Sets it to the location in the stack are the commands are
Sets it to location in the stack where the commands are
And administrator working on a web server open some malicious link while downloading patches. What kind of attack is this?
Trojan horse, server-side, come in injection or client-side
Client-side
Which of the following is used to identify how an ATM sell can reaches destination?
Point of point protocol, virtual path identifier, permanent virtual circuit or switch to virtual circuit
Virtual path identifier
Which software development Methodology is not primary code centric?
SDLC
DEVOPS
LIBSAFE
CMMI
Devops
What organization manages request for comments (RFCs)
National Institute of standards and technology, Internet engineering task force(IETF) , International organization for standardization ISO or Center for Internet security CIS
Internet engineering task force I ETF
Which of the following types of business country plan testing is known as validity testing?
Full interpretation, simulation testing, structure walk-through testing or checklist

Structure walk through testing
Which of the following topologies is most widely used today because of scalability and fault tolerance
Star biology, bus topology, ring topology or loop topology
Star
What’s the following categories fits these terms: Client/server, three – tier and peer-to-peer
Software architecture, Computer architecture, software development Methodology, interprocess communication
Software architecture
What element is part of the base metrics in the common vulnerabilities scoring system?
Temporal,
access vector
environmental or
emanations 
Access vector
The defense on a computer fraud case United States wishes to offer a third-party personal email records into evidence that could help prove her client had no malicious intent. What is the prosecuting same most likely to do?
Object based on the hearsay rule 
I’ve just based the emails containing PII in the main headers
Object base in the exclusionary rule
Object based on data retention policies

Object base and the hearsay rule
Which software development methodology uses and enter iterative approach to develop it working model with typically includes frequent interaction between the customer and developer
Spiral, address, scram or prototyping
Prototyping
What type of evidence obtained from an outside source and is admissible in court?
Hearsay, circumstantial, inculpatory kr corroborating 
Hearsay
I do bass administrators alerted to a spike in activity that has caused a space shortages over the last week. Where should the administrator look to turn whether the increase in activities due to valid or abnormal request?
The database is Aralog, the operating system‘s application law, the database is transaction log or the app ring system security log
The database transaction log
How can organization share a single document repository were each company retains control over its own authentication credentials
Access control matrix, two factor authentication, coveralls key distribution center or Federated identity management
Federated Identity management
Fuzzing a running applications part of what process?
Code review, stress testing, dynamic application security testing or static analysis
Dynamic application Security testing
There are many types of testing methods involve a exercising and maintaining a business continuity plan. Which of the following types of testing is known as consistency testing
The literally testing, structured walk-through testing, simulated testing, or checklist testing
Checklist testing
What functionality do open ID and Saml provide?
Openid uses centralized Storage for credentials, while SAML uses distributed storage 
true or false?
False
Open ID performs authentication while SMAL and codes authentication related information
What causes the chrome browser to have many process instances when there are multiple tabs
Standard libraries
Buffer overflow
Sandboxing
Memory leaks
Sandboxing
Which of following is not one of the private IP address ranges designated by the internet assigned numbers authority
- 12.0.0:16-128.92.0.0/16
- 0.0.0/8
- 168.0.0/16
- 16.0.0/16-172.31.0.0/16
128.12.0.0/16-128.920.0/16
What is the act of hiding data within another medium?
Permutation
Substitution
Steganography
Transposition
Straganography
If a company does not inform employees that they may be monitored and does not have a policy stating how monitoring should take place, what should a company do?
Don’t monitor individual employees in any fashion
What is the goal of synthetic transactions
Ensure an application is performing as intended
What is one way of avoiding excessive damage to equipment while maximizing personal safety and using recommendations of fire protection and insurance industries for data centers
Dry pipe
Which of the following characteristics of secondary memory?
Has slower data retrieval speeds
Which of the following Algorithms is used to secure the exchange of key when implementing public Key cryptography
DES
AES
IDEA
DIFFIE-hellman
Diffie hellman
What computer resources make up the TCB?
The kernel and processes designed to meet a formal security policy
What is the first step to be accomplished in a preliminary legal investigation
Gather evidence, determine if Crime has occurred, interview witnesses or inspect damage
Determine if a crime had occurred
Even Joy streaming videos from the wild while on her work computer. Sometimes access to videos are cut off for hours or even the rest of the workday period it seems random to eve the day of the week the websites hosting the videos, and how long she can access sight do not follow a pattern. Which control is blocking the website?
Context base access control, web application firewall, whole space in certain section or time base access control
Context based access control
Which of the following does every user in organization not need to be aware of regarding their organizations information security policy?

The actions required to recover systems in case of a disaster
What writing protocol is used to communicate between autonomous systems and large networks such as the Internet?
ARP RIP DNA ESP BGP
BGP
Which of the following terms describes determining an individual is who they claim to be?
Authorization, identification, authentication
Authentication
Which of the following land transmission protocols is use on ethernet networks??
CSMA/CD
TOLEN PASSING
CSMA/ca
Polling 
Csma/cd
The pen testing team is getting access to orientation by sending a PDF file from a spoon human resources email address. Which the following controls would help medicate this attack?
security audits, code review, user training or transport layer security? 
User training
What is the security weakness of the password authentication protocol? PAP
Sends passwords in plaintext
When a cookie is marked secure which of the following controls are in place?
It may be sent over SSL/TLS, it cannot be accessed by JavaScript, is encrypted with the private key or it is encrypted with a symmetrical key? 
It may be sent over SSL/TLS
The most complete picture of the security of network results from which of the following?
I Pinterest, vulnerability assessment, firewall rule based audit or security assessment
Security assessment
Once you understand a risk, you can decide not to become evolved in this risk situation. What should the choices below describes this decision
Risk avoidance, risk acceptance, risk reduction or risk transfer
Risk avoidance
What mechanism can be used to ensure that it failed database transaction or system for the return the subject to a meaningful point in some process
Checkpoint
The following statement can be best described as what type of security documentation? I’ll end-user systems on the network must be protected at the host level again smell weird unauthorized access
Procedure, policy, standard, baseline, guideline
Policy
Which of the following best describes operation security
Taking steps to make sure environment and information access within it stay at a certain level of protection
What is the unit of transmission in an ethernet network called
Frame
Which of the following forms of communication should be used and reporting an incident to management
Out of band
What component of a VoIP system exchanges traffic between a packet switch in circuit-switched network
Media gateway
What solution aims to solve latency issues caused by differences between client in public servers
Content distribution networks
Provides faster delivery of content to the user distributed world wide
It is a group of servers that are placed all over the globe and increase the delivery of web content
What type of control can automatically initiate corrective control
Detective
Dedicated
Dedicate a motive operation means at the system contains objects of one classification label
Which search engine poses a problem for SCADA system is connected to the Internet
Shodon
What is the Best definition for equal error rate EER
The rate at which the FAR equals a FRR
In tunnels mode IPSEC The outer packet is address to which of the following
The receiving Gateway
Which of the following sulfur controls is an output control
Reconciliation
What type of control as a security policy
Directive
What Mac motive operation place a reference monitor to mediate between subjects and objects
Multi level
Which of the following destroys patterns that connect plane textures associate ciphertext
Diffusion
Compressing IPv6
Leading zeros are all suppressed
Which of the following access control measures is directive
Background check
What type of memory must be refreshed by reading and rereading each but every Few milliseconds
DRAM
Which Class of fire suppress by dry powder
Electrical
Which of the following pen testing activities with the effective invalidating Tempus effectiveness
Radiation monitoring
Which distributed computing Thank you architectures fully decentralized
Peer to peer
The account management process should ensure adherence to a security principal
Least priv
Which of the following Theresas the Internet activities board consider violation of the ethics in the Internet
Compromising the privacy of users
Antivirus Blocked an executable and sent a notice to security event information management system. What type of control does antivirus represent
Preventative
During a preliminary investigation of potential security incident which step should occur in what order
Review the complaint, inspect the damage, exam in logs and work with management and if necessary is this management in notifying law enforcement
With respect to do classification rolls in which of the following is a responsibility the system owner
To assist in identification of the common security controls
Metasploit
Validate if the vulnerability is exploitable
Where would attackers focus our efforts to disable Kerberos
Key distribution center
Which of the following concepts requires having a central authority maintain a copy of everybody’s private keys are there any users encrypted data can be decrypted by the central authority
Escrowed encryption
What should be considered in the purchase of a preventative control
Total cost of ownership
A no NIDS is alerted by a database connection
False negative
False negative occurs when the IDS is not set off an alert and the traffic is malicious
What is an application Output control
Reconciliation
What technology allows a single switch to host multiple networks 
Vlan 
What memory addressing technique always refers to a temporary storage location of the rather than the main memory
Registered direct addressing