Midterm Exam deck Flashcards

1
Q

In FISMA, ________ is done internally by the organization.

A

both certification and accreditationn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Quantum key distribution ________.

  • creates a major threat to many traditional cryptographic methods
  • Both is a way to deliver enormously long keys to communication partners and creates a major threat to many traditional cryptographic methods
  • *is a way to deliver enormously long keys to communication partners
A

is a way to deliver enormously long keys to communication partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Port scanning software does the following:
*The software is used to catch external threats
The software divulges vulnerable ports
*
The software divulges open ports

A

The software divulges open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following are types of countermeasures?
Preventative
Detective
Corrective
all of these?
A

all of these: Preventative
Detective
Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

________ are programs that attach themselves to legitimate programs.

A

viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ultimate goal of a DoS attack is to ________.

A

cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following measures offers strong security?
*Using spread spectrum transmission in 802.11
Turning off SSID broadcasting
WEP
all of these
none of these

A

none of these

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A planned series of actions in a corporation is a(n) ________.

A

sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
The primary weapon in a DoS attack is the:
*icmp ping
dns poisoning
mac flooding
arp poisoning
A

ICMP Ping packet set at 65000 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A commonly SSL/TLS-aware application is ________.

A

webservice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mandatory vacations should be enforced ________.

A

to reduce the possibility of collusion between employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A botmaster can remotely ________.

A

Both fix a bug in the bots and update bots with new functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following can be used as a keying method?

A

Public key encryption for confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt messages.

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital signatures are used for ________ authentication.

A

message-by-message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

________ security uses the RC4 cipher in encryption for confidentiality and the Temporal Key Integrity Protocol for keying and rekeying.

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A program that gives the attacker remote access control of your computer is specifically called a ________

A

RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following statements accurately describes RC4?
*
RC4 is very slow.
RC4 uses a large amount of RAM.
RC4 can use a broad range of key lengths.
All of these

A

RC4 can use a broad range of key lengths

19
Q

The most popular public key encryption cipher is ________

A

RSA

20
Q

WLAN DoS attacks are designed to affect the ________ of the network.

A

availability

21
Q

Firms still choose to use WPA in order to ________.
*avoid configuration expenses for access points
avoid configuration expenses for wireless clients
-Both avoid configuration expenses for access points and avoid configuration expenses for wireless clients
*Neither avoid configuration expenses for access points nor avoid configuration expenses for wireless clients

A

Correct Both avoid configuration expenses for access points and avoid configuration expenses for wireless clients

22
Q

________ can spread through e-mail attachments.

  • viruses
  • viruses and worms
  • Worms
A

*viruses and worms

23
Q

In SSL/TLS, a specific set of protocols that a particular cryptographic system will use to provide protection is called a ________.

A

cipher suite

24
Q

Which encryption method does MS-CHAP use?

symetric, public / neither, both?

A

neither

25
Q

Which of the following is one of the key lengths offered by AES

  • 112 bits
  • 192 bits
  • both
  • neither
A

neither 112 or 192 bits. (256 is the start of AES)

26
Q

Companies transmit over the wireless LANs because WLANs ________.

A

are secure

27
Q

The stage of the plan-protect response cycle that consumes the most time is

A

protecting

28
Q

________ is the use of mathematical operations to protect messages travelling between parties or stored on a computer

A

cryptography

29
Q

Strong RSA keys are at least ________ bits long.

A

1024 bits long

30
Q

Audits place special attention on ________.

A

compliance avoidance

31
Q

COSO focuses on ________.

A

corporate internal and financial controls

32
Q

The worst problem with classic risk analysis is that ________.

A

we cannot estimate the annualized rate of occurrence

33
Q

MS-CHAP is used for ________ authentication.

A

initial

34
Q
Which of the following is one of the effective key lengths in 3DES?
*112 bits
*56
100
non of these
A

112 bits

35
Q

A digital certificate ________.

A

gives the subject’s public key

36
Q
A digital \_\_\_\_\_\_\_\_, by itself, provides authentication.
*	
signature
certificate
Both signature and certificate
neither
A

neither signature or certification

37
Q

In public key encryption for authentication, the supplicant uses ________ to encrypt.

A

the supplicant’s private key

38
Q
CobiT focuses on \_\_\_\_\_\_\_\_.
**corporate governance
Correct controlling entire IT function
IT security governance
All of these about equally
A

Correct controlling entire IT function

39
Q

Cyberwar consists of computer-based attacks conducted by ________

A

national govs.

40
Q
Public key encryption is \_\_\_\_\_\_\_\_.?
*complex
slow
expensive
Correct All of these
A

all of these

41
Q

Firewalls will drop ________.

A

provable attack packets

42
Q

Most packets are part of the ________ state.

A

Neither connection opening nor connection closing

43
Q

In ________ filtering, the firewall examines packets entering the network from the outside.
*engress
8egressneiher

A

ingress