Infosec Flashcards
What word would best describe how an intrusion system operates A)Proactive B) Reactive C) inductive D)reductive
Reactive
What would be considered a best mitigation practise for services that are not being used on devices?
A) Enable
B) limit
C) Disable
D) monitor
disable
What is the benefit of using a viritual private network? A) Increased lag B) Increased confidentiality C) Increased availability D) Decreased lag
Increased confidentiality/ protection against eavesdropping
which alternative would provide the best countermeasure against an on-line attack (active authentication) against a username and a password?
A) The using of a long password
B) the use of a firewall
C) To use the diffie-hellman password exhange
D) to use a strict limit on login failures
To use a strict limit on login failures
Which of the following sentences describe the term asset best from an information security perspective?
A) Anything that an organization buys
B) Anything that is situated within an organizations premisis
C) Anything that has a value to the organization
D) Anything that an organization sells
Anything that has a value to the organization
Where in the information security model would an information security policy be placed ? A)physcial security B)administrative security C)network security D)computer security
Network security
Which of the below-mentioned protocols is susceptible to sniffing?
A) TCP
B)HTTP
C)UDP
D)All of them
HTTP
What type of cryptographic algorithms are DES and 3DES? A)Assymetric B)Caesar C)Symmetric D)Vigenére
Symmetric
According to the CIA triad, which of the below-mentioned security aspects is considered in the triad? A)Authenticity B)Availability C)Accountability D)Auditability
Availability
SQL injection is a code injecting method used for attacking the database of a website
which of the following is not a wireless attack ? A)Wireless hijacking B)Rootkit C)MAC spoofing D)Eavesdropping
Rootkit
Assume you encounter a search box on a web page that can take an input of 200 characters. You insert 300 characters and the remote system craches. Usually, this type of behaviour is because of limited A)cloud B)storage C)local memory D)buffer
buffer
Imagine you are using an internet service provider who you dont trust. What could you use to hide your browsing activity? A)Anti spyware software B)An antivirus software C)A firewall D)The incognito mode on the browser E)A virtual private network (VPN)
a viritual private network
List at least three kinds of damage a company could suffer when the intergrity of a program or company data is compromised.
Blackmailing
Customers due to lack of faith in the company.
Money drops in stocks
Describe the concepts, intrusion detection system IDS and intrusion prevention system IPS also differentiate the concepts