Infosec Flashcards

1
Q
What word would best describe how an intrusion system operates
A)Proactive
B) Reactive
C) inductive
D)reductive
A

Reactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What would be considered a best mitigation practise for services that are not being used on devices?

A) Enable
B) limit
C) Disable
D) monitor

A

disable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
What is the benefit of using a viritual private network?
A) Increased lag
B) Increased confidentiality
C) Increased availability
D) Decreased lag
A

Increased confidentiality/ protection against eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which alternative would provide the best countermeasure against an on-line attack (active authentication) against a username and a password?
A) The using of a long password
B) the use of a firewall
C) To use the diffie-hellman password exhange
D) to use a strict limit on login failures

A

To use a strict limit on login failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following sentences describe the term asset best from an information security perspective?

A) Anything that an organization buys
B) Anything that is situated within an organizations premisis
C) Anything that has a value to the organization
D) Anything that an organization sells

A

Anything that has a value to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Where in the information security model would an information security policy be placed ?
A)physcial security
B)administrative security
C)network security
D)computer security
A

Network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the below-mentioned protocols is susceptible to sniffing?

A) TCP
B)HTTP
C)UDP
D)All of them

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
What type of cryptographic algorithms are DES and 3DES?
A)Assymetric
B)Caesar
C)Symmetric
D)Vigenére
A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
According to the CIA triad, which of the below-mentioned security aspects is considered in the triad?
A)Authenticity
B)Availability
C)Accountability
D)Auditability
A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SQL injection is a code injecting method used for attacking the database of a website

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
which of the following is not a wireless attack ?
A)Wireless hijacking
B)Rootkit
C)MAC spoofing
D)Eavesdropping
A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Assume you encounter a search box on a web page that can take an input of 200 characters. You insert 300 characters and the remote system craches. Usually, this type of behaviour is because of limited 
A)cloud
B)storage
C)local memory
D)buffer
A

buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Imagine you are using an internet service provider who you dont trust. What could you use to hide your browsing activity?
A)Anti spyware software
B)An antivirus software
C)A firewall
D)The incognito mode on the browser
E)A virtual private network (VPN)
A

a viritual private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List at least three kinds of damage a company could suffer when the intergrity of a program or company data is compromised.

Blackmailing
Customers due to lack of faith in the company.
Money drops in stocks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the concepts, intrusion detection system IDS and intrusion prevention system IPS also differentiate the concepts

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe three reasons why penetrate and patch is a misguided strategy

A
17
Q

Explain the concept of salt and exemplify how it can be used

A
18
Q

List three reasons why people might be reluctant to use biometrics for authentication. Also give examples of how to counter those objections?

A
19
Q

Define the terms Vulnerability, threat, harm, and security controls. Also relate the terms to each other by giving an applied example.

A
20
Q

Are computer to computer authentication subject to the weakness of replay? Motivate why or why not

A
21
Q

Describe by giving an applied example of how passwords are stored by the operating system of your personal computer

A
22
Q

In the context of software security, such as OS security, eight design principles were formulated more than 40 years ago. Despite the relative age, they remain valid even today. Describe any four of these design principles

A