IS3220 CHAPTER 15 Flashcards

1
Q

Refers ot a series of tools and techniques used to prevent forensic examination from identifying an attack or attacker and is called ___?

A

ANTI-FORENSICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A distributed data protection technology that leverages deep analysis, context evaluation, and rules configured from a central console to ensure confidential information remains secure while in use, in transit, and at rest. This is called ___?

A

DATA LEAKAGE PREVENTION (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identifying, extracting, and evaluating evidence obtained from digital media such as computer hard drives, CDs, DVDs, and other digital storage devices is called ___?

A

DIGITAL FORENSIC TECHNIQUES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A set of concepts and practices that provide detailed descriptions and comprehensive checklists, tasks and procedures for common IT practices. This is based on the ISO 27002 Standard and is called ____?

A

INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY (ITIL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Specialized host used to place an attacker into a system where the intruder cannot do any harm is called ___?

A

PADDED CELL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Pick the two common IDS/IPS deployment models:
  2. Bypass
  3. Unfiltered
  4. Tunneled
  5. Intranet
  6. Screened
A

Unfiltered

Screened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which of the following are types of specialized firewalls?
  2. Data protection
  3. Host
  4. Application
  5. Hybrid
  6. Network
A

Data protection
Application
Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Two technologies used to identify attack techniques and patterns include ___ and ___.
A

honeypots and honeynets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Techniques used to counter digital investigations are known as ___.
A

anti-forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Pick the two changing areas to watch when developing your information security road map.
  2. Security industry focus
  3. Vendors
  4. Computer processing power
  5. Cloud computing
  6. Network design
A

Security industry focus

Cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. The technique of hiding a secret message in plain sight is known as ___.
A

steganogrophy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which of the following is a potential disadvantage of IPv6 from a security perspective?
  2. Additional address space
  3. Less flexible than IPv4
  4. Industry support
  5. Maturity of the standard
  6. Ubiquitous encryption
A

Ubiquitous encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Identifying a user based on anatomical characteristics is known as ___.
A

biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which of the following are biometric characteristics
  2. Default password
  3. Fingerprint
  4. Iris pattern
  5. Voice print
  6. Token
A

Fingerprint
Iris pattern
Voice print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which of the following are considered complementary technologies to an IDS/IPS implementation?
  2. Honeypot
  3. Encryption
  4. VPN
  5. Padded cell
  6. Virtual firewall
A

Honeypot

Padded cell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A device that monitors network traffic and alerts during an attack is an ___.
A

IDS or IPS

17
Q
  1. A device that monitors network traffic and alerts and takes action without manual intervention during an attack is an ___.
A

IPS

18
Q
  1. Which of the following contribute to the erosion of the network perimeter?
  2. Specialized firewalls
  3. VPN
  4. IPS/IDS
  5. Cloud computing
  6. Business partner connections
A

VPN

Cloud computing

Business partner connections

19
Q
  1. The act of ensuring your company obeys intern policies and any applicable laws is known as ___.
A

compliance

20
Q
  1. The processes and procedures used to ensure employees are following corporate security policies are known collectively as ___.
A

governance

21
Q
  1. Identify one risk associated with the use of a public wireless connection.
  2. Encryption
  3. Virus
  4. Data interception
  5. Data corruption
  6. Social engineering
A

Data interception

22
Q
  1. What is one advantage to commercial security solutions that might make a company select them over open-source equivalents?
  2. Flexibility
  3. Support
  4. Cost
  5. Availability
  6. Value
A

Support

23
Q
  1. Which of the following might be included in a risk register?
  2. Risk description
  3. Impact
  4. Cost
  5. Business owner
  6. Continuity planning
A

Risk description

Impact

Business owner

24
Q
  1. Which of the following are considered core security principles when discussing the uses of security technologies?
  2. Confidentiality
  3. Governance
  4. Integrity
  5. Risk
  6. Compliance
A

Confidentiality

Integrity

25
Q
  1. When an IDS detects an attack it can direct the attacker to a host where the attacker cannot do any damage. This host is known as a ___.
A

padded cell