IS3220 CHAPTER 15 Flashcards
Refers ot a series of tools and techniques used to prevent forensic examination from identifying an attack or attacker and is called ___?
ANTI-FORENSICS
A distributed data protection technology that leverages deep analysis, context evaluation, and rules configured from a central console to ensure confidential information remains secure while in use, in transit, and at rest. This is called ___?
DATA LEAKAGE PREVENTION (DLP)
Identifying, extracting, and evaluating evidence obtained from digital media such as computer hard drives, CDs, DVDs, and other digital storage devices is called ___?
DIGITAL FORENSIC TECHNIQUES
A set of concepts and practices that provide detailed descriptions and comprehensive checklists, tasks and procedures for common IT practices. This is based on the ISO 27002 Standard and is called ____?
INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY (ITIL)
Specialized host used to place an attacker into a system where the intruder cannot do any harm is called ___?
PADDED CELL
- Pick the two common IDS/IPS deployment models:
- Bypass
- Unfiltered
- Tunneled
- Intranet
- Screened
Unfiltered
Screened
- Which of the following are types of specialized firewalls?
- Data protection
- Host
- Application
- Hybrid
- Network
Data protection
Application
Hybrid
- Two technologies used to identify attack techniques and patterns include ___ and ___.
honeypots and honeynets
- Techniques used to counter digital investigations are known as ___.
anti-forensics
- Pick the two changing areas to watch when developing your information security road map.
- Security industry focus
- Vendors
- Computer processing power
- Cloud computing
- Network design
Security industry focus
Cloud computing
- The technique of hiding a secret message in plain sight is known as ___.
steganogrophy
- Which of the following is a potential disadvantage of IPv6 from a security perspective?
- Additional address space
- Less flexible than IPv4
- Industry support
- Maturity of the standard
- Ubiquitous encryption
Ubiquitous encryption
- Identifying a user based on anatomical characteristics is known as ___.
biometrics
- Which of the following are biometric characteristics
- Default password
- Fingerprint
- Iris pattern
- Voice print
- Token
Fingerprint
Iris pattern
Voice print
- Which of the following are considered complementary technologies to an IDS/IPS implementation?
- Honeypot
- Encryption
- VPN
- Padded cell
- Virtual firewall
Honeypot
Padded cell