IS3110 CHAP 9 Flashcards

1
Q

The standard defined by NIST for symmetric encryption. It is fast, efficient, and commonly used to encrypt data on drives, including universal serial bus (USB) flash drives.

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Files that are used for security. Uses include identification and encryption. They can be issued to users or systems and are then presented to other entities. It includes a public key that is shared with other. The public key is matched with a private key that is always kept private.

A

Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An entity that issues and manages certificates. ___ can be public or private. Public CAs are accessible on the Internet. Private CAs are internal to an organization. CA are used by users and systems for security purposes, such as identification and encryption.

A

Certification authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A class of control identified by its function. It attempts to reverse the effect of an exploited vulnerability. For example, antivirus software can work as a ___ if it detects an infected file.

A

Corrective control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A class of control identified by its function. It will detect when a vulnerability is being exploited. IDS is an example of a ___.

A

Detective control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A method used for identification. This ___ uses certificates issued by a CA. A hash of a message is created. The hash is encrypted with the sender’s private key. If the receiver can decrypt the encrypted hash with the sender’s public key, it has been verified that it was encrypted and sent with the sender’s private key. Only the sender has the private key.

A

Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Used to prevent someone from denying they took an action. Audit logs record details of who, what, where, and when on events. If an audit log records an action by a suer after the user logs on, the user cannot believably deny the action. Digital signatures are also used for ___.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A class of control identified by its function. It will attempt to prevent the risk from occurring. For example, an unneeded protocol is removed from a server to harden it. Any attacks on this protocol are now prevented on this server.

A

Preventative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A document users must read before accessing a system. It identifies what they can and cannot do on the system. It is also called an acceptable use policy (AUP) in most private organizations.

A

Rules of Behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A tool used to capture traffic on a network in order to analyze it. Wireshark is a packet analyzer that can be used as a ___. If data is sent in clear text, the captured traffic can easily be read.

A

Sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. A ___ will reduce or eliminate a threat or vulnerability.
A

Control or countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Controls can be identified based on their function. The functions are preventative, detective, and corrective.
    TRUE OR FALSE
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What are the primary objectives of a control?
  2. Prevent, control, attack
  3. Prevent, respond, log
  4. Prevent, recover, detect
  5. Detect, recover, attack
A

Prevent, recover, detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What type of control is an intrusion detection system (IDS)?
  2. Preventative
  3. Detective
  4. Corrective
  5. Recovery
A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. NIST SP 800-53 identifies controls in three primary classes. What are they?
  2. Preventative, Detective, Corrective
  3. Administrative, Technical, Operational
  4. Technical, Administrative, Environmental
  5. Technical, Operational, Management
A

Technical, Operational, Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A(n) ___ control is used to ensure that users have the rights and permissions they need to perform their jobs, and no more.
A

Access

17
Q
  1. Logon identifiers help ensure that users cannot deny taking a specific action such as deleting a file. What is this called?
  2. Digital signature
  3. Encryption
  4. Non-repudiation
  5. PKI
A

Non-repudiation

18
Q
  1. What should you use to ensure that users understand what they can and cannot do on systems within the network?
  2. Acceptable use banner
  3. Data range checks
  4. Rules of behavior
  5. Audit cards
A

Rules of behavior

19
Q
  1. What can be used to ensure confidentiality of sensitive data?
  2. Encryption
  3. Hashing
  4. Digital signature
  5. Non-repudiation
A

Encryption

20
Q
  1. What should be logged in an audit log?
  2. All system events
  3. All security related events
  4. The details of what happened for an event
  5. Who, what, when, and where details of an event
A

Who, what, when, and where details of an event

21
Q
  1. Your organization wants to issue certificates for internal systems such as in internal Web server. You’ll need to install a ___ to issue and manage certificates.
A

Certification authority (CA)

22
Q
  1. Which of the following is an administrative control?
  2. Session timeout
  3. Reasonableness check
  4. Water detection
  5. DRP
A

DRP

23
Q
  1. Which of the following is a technical control?
  2. PKI
  3. Awareness and training
  4. Guards
  5. Electrical grounding
A

PKI

24
Q
  1. Which of the following is a physical control?
  2. Logon identifiers
  3. CCTV
  4. Encryption
  5. BCP
A

CCTV

25
Q
  1. A PTZ camera is used within a CCTV system. It can pan, tilt, and zoom.
    TRUE OR FALSE
A

TRUE