Introduction to Security Terminology Flashcards

1
Q

Your company issues smart phones to employees for business use. Corporate policy dictates that all data stored on smart phones must be encrypted. To which fundamental security concept does this apply?

Confidentiality

Integrity

Availability

A

Confidentiality

Confidentiality ensures that data is accessible only to those parties who should be authorized to access the data. Encrypting data stored on smart phones protects that data if the phone is lost or stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are the network administrator for your company. Your manager has asked you to evaluate cloud backup solutions for remote branch offices. To which fundamental security concept does this apply?

Confidentiality

Integrity

Availability

A

Availability

Backing up data is a safeguard in case data is corrupted or deleted, thus making that data available when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your company requires all desktop computers to run a malware detection program twice daily. You configure your network so that only the specific digital version of the executable program that you specify is allowed to run. To which fundamental security concept does this apply?

Confidentiality

Integrity

Availability

A

Integrity

Integrity ensures that data actually comes from the user or device it appears to have come from and that the data has not been altered. File hashing can be used to validate that a specific version of a file is being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You store personal documents and spreadsheets with a cloud provider. You would like your data to be available only to people who have a special unlock key. What should you apply to your documents and spreadsheets?

File hashing

File backup

File encryption

A

File encryption

File encryption can be implemented using a passphrase or unlock key so that only parties with knowledge of the unlock key can decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You would like to send a confidential message to a family member through e-mail, but you have no way of encrypting the message. What alternative method would enable you to achieve your goal?

PKI

File hashing

Steganography

A

Steganography

Steganography is the act of hiding a message within an innocent-looking medium. A common example would be storing invisible hidden messages within pictures such that the receiving party would have to extract the hidden messages. Unsuspecting parties would see only a picture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A corporate security policy emphasizes data confidentiality, and you must configure computing devices accordingly. What should you do? (Choose two.)

Install smartcard readers so users can identify themselves before sending important e-mail messages.

Enforce SD card encryption on smart phones issued to employees.

Configure a server failover cluster to ensure that sensitive documents are always available.

Set file and folder permissions to control user file access.

A

Enforce SD card encryption on smart phones issued to employees.

Set file and folder permissions to control user file access.

Encrypting data and setting file and folder permissions both keep data confidential. Remember that educating users about security and specific organization policies is crucial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Michel, an IT security expert, grants permissions to folders on a file server to enable Marketing users to modify Marketing documents. Which information security goal has been satisfied?

Confidentiality

Integrity

Availability

A

Confidentiality

Confidentiality is achieved by allowing only Marketing users to modify Marketing documents. User accounts for Marketing staff must be secured properly, including account lockout and password policy settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You need to implement a solution that ensures data stored on a USB removable drive has not been tampered with. What should you implement?

Steganography

File backup

File hashing

A

File hashing

File hashing generates a unique value from a specific version of a file. When a file is modified and the hash value is computed once again, it will be different

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ana must send an important e-mail message to Glen, the director of Human Resources (HR). Corporate policy states that messages to HR must be digitally signed. Which of the following statements is correct?

Ana’s public key is used to create the digital signature.

Ana’s public key is used to verify the digital signature.

Glen’s private key is used to create the digital signature.

A

Ana’s public key is used to verify the digital signature.

Digital signatures are created with the sender’s private key and verified with the sender’s mathematically related public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

John is issuing a digital certificate for Carolyn’s computer. What can the certificate be used for? (Choose two.)

Setting permissions on sensitive files

Encrypting sensitive files

Verifying the computer’s identity to secure servers

Sending encrypted e-mail messages

A

Encrypting sensitive files

Verifying the computer’s identity to secure servers

The public and private key pair within a digital certificate can be used to encrypt and decrypt sensitive files. Digital certificates can also be used to authenticate a computer to a secure server or appliance, such as a VPN server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Every month, Gene downloads and tests the latest software patches before applying them to production smart phones. To which security goal does this example apply?

Confidentiality

Integrity

Availability

A

Availability

Patching devices helps ensure that they are available and secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are evaluating public cloud-based e-mail hosting solutions. All vendors state that multiple servers are always running to ensure mailboxes are available. What is this an example of?

Clustering

Steganography

Digital mailbox signatures

A

Clustering

Clustering makes network services, such as e-mail, always available even if a mail server goes down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your network allows only trusted scripts to run on managed devices. You write a script that must run on all managed devices. What must you do? Place the following correct steps in proper order. (Choose three.)

Obtain a trusted digital certificate and install it on your computer.

Export the private key from your digital certificate to all managed devices.

Create the script.

Digitally sign the script.

On your computer, import digital certificates from all managed devices.

A

Obtain a trusted digital certificate and install it on your computer.

Create the script.

Digitally sign the script.

A trusted code-signing digital certificate must first be installed on your computer before you can sign a script. Target devices must trust the code-signing certificate to allow signed scripts to run. This prevents malicious code from threat actors from running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You would like to track the modification of sensitive trade secret files. What should you implement?

Auditing

Encryption

File hashing

A

Auditing

Auditing the modification of files will identify who made changes from a specific machine at a certain date and time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which party determines how data labels are assigned?

Custodian

Owner

Privacy officer

A

Owner

Data owners decide how data should be labeled, such as top secret or publicly available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following organizes the appropriate identification methods from least secure to most secure?

Smartcard, retinal scan, password

Retinal scan, password, smartcard

Username and password, smartcard, retinal scan

A

Username and password, smartcard, retinal scan

Username/password is single-factor authentication (something you know). Smartcard authentication is multifactor (something you have and something you know), and retinal scans are something you are, which is difficult to forge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You are explaining how the corporate file auditing policy will work to a new IT employee. Place the following items in the correct order: ___, ___, ___, and ___.

A user opens a file, modifies the contents, and then saves the file.

A server validates a correct username and password combination.

A user provides a username and password at a logon screen.

The file activity generated by the user is logged.

A

A user provides a username and password at a logon screen.

A server validates a correct username and password combination.

A user opens a file, modifies the contents, and then saves the file.

The file activity generated by the user is logged.

After a user identifies himself with a username and password, authentication then occurs. Upon successful authentication, a user is then authorized to access the appropriate files. If the user’s current action is being audited for a given file, this information is logged

18
Q

Your manager has asked you to implement a solution that will prevent users from viewing inappropriate web sites. Which solution should you employ?

Router ACLs

Web site permissions

Proxy server

A

Proxy server

Proxy servers retrieve content that users request. Because of this, proxy servers can easily prevent users from accessing inappropriate content

19
Q

Trinity uses her building access card to enter a work facility after hours. She has access to only the second floor. What is this an example of?

Authorization

Authentication

Accountability

A

Authorization

Authorization means having legitimate access to specific resources such as web sites, files on a file server, or, in this case, access to a specific floor in a building

20
Q

Sean is capturing Wi-Fi network traffic using a packet analyzer and is able to read the contents of network transmissions. What can be done to keep network transmissions private?

Install digital certificates on each transmitting device.

Use smartcard authentication.

Encrypt the Wi-Fi traffic.

A

Encrypt the Wi-Fi traffic.

The network transmissions can be kept private by encrypting all Wi-Fi traffic using Wi-Fi encryption protocols such as Wi-Fi Protected Access 2 (WPA2)

21
Q

Which security mechanisms can be used for the purpose of nonrepudiation? (Choose two.)

Encryption

Clustering

Auditing

Digital signatures

A

Auditing

Digital signatures

Auditing can track activities from a specific user or computer. Digital signatures are unique in that they are created using a user’s or computer’s private key, which is accessible only to that user or computer. Both of these mechanisms invalidate any denials related to activities from the user or computer

22
Q

You are the network administrator for a pharmaceutical firm. Last month, the company hired a third party to conduct a security audit. From the audit findings, you learn that customers’ confidential medical data is not properly secured. Which security concept has been ignored in this case?

Due diligence

Due care

Due process

A

Due care

Due care means taking steps to address a security problem, such as ensuring client data is kept confidential

23
Q

Which of the following are the best examples of the Custodian security role? (Choose three.)

Human Resources department employee

Server backup operator

CEO

Law enforcement employee responsible for signing out evidence

Sales executive

A

Human Resources department employee

Server backup operator

Law enforcement employee responsible for signing out evidence

Custodians are responsible for maintaining access to and the integrity of data. Human Resources employees, server backup operators, and law enforcement employees all must ensure that data access and integrity are preserved

24
Q

Franco, an accountant, accesses a shared network folder containing travel expense documents to which he has read and write access. What is this an example of?

Privilege escalation

Due care

Authorization

A

Authorization

Franco is accessing an item that he has legitimate access to; this is authorization

25
Q

A large corporation requires new employees to present a driver’s license and passport to a security officer before receiving a company-issued laptop. Which security principle does this map to?

Authorization

Confidentiality

Identification

A

Identification

Providing a driver’s license and passport means employees are providing identification

26
Q

Choose the best example of authentication from the following:

Each morning a network administrator visits various web sites looking for the newest Windows Server vulnerabilities.

Before two systems communicate with one another across a network, they exchange PKI certificates to ensure they share a common ancestor.

A file server has two power supplies in case one fails.

A

Before two systems communicate with one another across a network, they exchange PKI certificates to ensure they share a common ancestor.

Exchanging PKI certificates before allowing communication is an example of system authentication

27
Q

Raylee is the new network administrator for a legal firm. She studies the existing file server folder structures and permissions and quickly realizes the previous administrator did not properly secure legal documents in these folders. She sets the appropriate file and folder permissions to ensure that only the appropriate users can access the data, based on corporate policy. What security role has Raylee undertaken?

Custodian

Data owner

User

A

Custodian

The Custodian performs data protection and maintenance duties based on established security policies, which Raylee is doing in this case

28
Q

From the following list, which best describes authentication?

Logging in to a TFTP server with a username and password

Using a username, password, and token card to connect to the corporate VPN

Checking corporate web mail on a secured web site at http://owa.acme.com after supplying credentials

A

Using a username, password, and token card to connect to the corporate VPN

Proving who you are with something you know (username/password) and something you have (token card) is authentication

29
Q

While experimenting with various server network configurations, you discover an unknown weakness in the server operating system that could allow a remote attacker to connect to the server with administrative privileges. What have you discovered?

Exploit

Bug

Vulnerability

A

Vulnerability

Vulnerabilities are unintended weaknesses in computing devices

30
Q

Sean is a security consultant and has been hired to perform a network penetration test against his client’s network. Sean’s role is best described as which of the following:

White-hat hacker

Black-hat hacker

Gray-hat hacker

A

White-hat hacker

White-hat hackers expose security flaws without malicious intent for the purposes of better protecting computers and computer networks

31
Q

Which of the following are classified as availability solutions? (Choose two.)

Auditing

RAID

File server backups

Smartcard authentication

A

RAID

File server backups

Redundant Array of Independent Disks (RAID) groups disks together for the purpose of performance and data availability. RAID level 1 (disk mirroring), for example, ensures that all disk writes occur on two disks in case one disk fails. File server backups ensure that corrupted or deleted data is available from the backup media

32
Q

You are reviewing document security on your private cloud document server. You notice employees in the Sales department have been given full permissions to all project documents. Sales personnel should have only read permissions to all project documents. Which security principle has been violated?

Separation of duties

Least privilege

Job rotation

A

Least privilege

The concept of least privilege is designed so that users have only the permissions they need to do their jobs

33
Q

A user, Sylvain, downloads an exploit that takes advantage of a web site vulnerability. Without detailed knowledge of the exploit, Sylvain runs the malicious code against numerous web sites he wishes to gain access to. Which label best identifies Sylvain?

White-hat hacker

Script kiddie

Red-hat hacker

A

Script kiddie

Script kiddies simply download and run exploits created by others without having a full understanding of what the exploit actually does. Technical proficiency in the attack itself is not required; the exploit is simply run by the script kiddie. This can be used by the casual malicious user, by organized crime rings, or even by nation states that buy zero-days (currently unknown exploits) for surveillance purposes. Nation states supporting surveillance or hacking against other nations are especially worrisome due to a potentially endless source of funding

34
Q

Which term refers to individuals who use computer hacking to promote a political or ideological agenda?

Scriptivist

Script kiddie

Hacktivist

A

Hacktivist

Hacktivism compromises IT system security for the purposes of spreading the word about a specific agenda such as human rights or government corruption

35
Q

In planning your network infrastructure, you decide to use a layered firewall approach between the Internet and your internal network. Which firewall strategy should you also employ?

The last ACL rule should allow all.

Use firewall appliances from different vendors.

The first ACL rule should deny all.

A

Use firewall appliances from different vendors.

Vendor diversity increases security; a specific security compromise on one firewall appliance most likely will not work on a different vendor’s firewall appliance. This adds another layer of security, which is referred to as defense-in-depth

36
Q

Which application-testing technique uncovers improper input handling?

Fuzzing

Overloading

Penetration test

A

Fuzzing

Fuzzing provides a large amount of input data, even invalid data, to an application in order to observe its behavior; the idea is to ensure that the application is stable and secure with its input and error handling

37
Q

Which type of tools are used for reconnaissance to collect and analyze public information about an organization?

Big data suite

Packet sniffer

Open source intelligence

A

Open source intelligence

Open source intelligence tools are used to collect and analyze publicly available data about an organization. The goal is to make intelligent decisions based on this analysis

38
Q

Which programming problem stems from multiple threads not executing in a predictable sequential pattern?

Fuzzing

Blue screen of death

Race condition

A

Race condition

In a race condition, when code is executed by multiple threads, the timing of dependent events is not predictable, and as a result a different thread can function in an unintended manner. For example, a piece of code might check the value of a variable and take action later, while that variable’s value can change in the interim

39
Q

Your company plans to use multiple Internet of Things (IoT) devices in the facility to control lighting and temperature. You suggest to management that the use of IoT devices presents many security risks. Which of the following is a known security issue with many IoT devices?

Use of Telnet

Inability to update embedded firmware

Inability to log events

A

Inability to update embedded firmware

Many IoT devices are unable to update embedded firmware, as is also often seen with end-of-life systems that are no longer supported by the vendor. This means as IoT device vulnerabilities are discovered, there is no way to apply a fix directly to the device, since often the firmware does not accept updates; this is simply a choice made by the vendor. IoT devices are targeted to general consumers, and security is often not a priority

40
Q

Jim is an IT technician for a medium-sized medical clinic. The clinic recently purchased four wireless access points to cover medical devices within a floor of the building. Jim installed the access points in the best locations for signal coverage and then changed the WPA2 password. What mistake did Jim make?

Jim should have enabled WEP.

No more than two access points should be used due to interference.

The default administrator configuration was left unchanged.

A

The default administrator configuration was left unchanged.

Many network and IoT devices ship with a default administrative configuration including the username and password; this must be changed immediately since it is known by all

41
Q

Which type of vulnerability results from writing data beyond expected memory boundaries?

Pointer dereference

Integer overflow

Buffer overflow

A

Buffer overflow

Buffer overflows result from writing data beyond expected memory boundaries, which can crash a program or provide escalated privileges

42
Q

A piece of malware replaces a library of code used as needed by a controlling program. What name describes this type of security issue?

DLL injection

Pointer dereference

Integer overflow

A

DLL injection

DLL injections insert code into a dynamic link library, which is called by a program at runtime as needed