Misc Flashcards

1
Q

Which RFC defines the Internet Protocol?

A

RFC 791

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This document is considered step by step and can be tied closely to hardware.

A

Procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES does how many rounds during the encryption process?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What form of testing is there very little or no knowledge of the target network?

A

Black Box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Presence?

A

Remote access program for Apple computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An Nmap full connect scan uses which switch?

A

nmap -sT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which risk assessment method is similar to the structured review yet individuals present for the meeting must write their responses down and hand them to the team lead for review?

A

Modified Delphi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DES has an effective key length of?

A

56

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which RFC defines the IETF?

A

RFC 1700

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Extended ACLs cannot by default examine which of these?

  • Protocol
  • IPSEC data
  • DSCP
  • Precedent Value
A

IPSEC Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An ICMP type 8 message is best defined as?

A

Echo Request (Ping)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which RFC defines ICMP?

A

RFC 792

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many steps of the TCP startup are completed in a stealth scan?

A

Two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SLE Formula?

A

Single Loss Expectancy

AV (asset value) * EF (exposure factor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Nmap switch is used to identify the version of OS running?

A

nmap -O

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SAFER uses how many blocks of data?

17
Q

Which encryption algorithm can be used for data at rest and is based on the Rijndael algorithm?

18
Q

These are considered tactical documents, as they lay out specific steps or processes required to meet a certain requirement.

19
Q

After completing a port scan you have identified TCP port 80 as open. What should be your next step?

A

Banner Grab

20
Q

What is jitter?

A

The variations in transmission latency that can cause packet loss and degraded VoIP call quality.

21
Q

What is ICMP type 3 code 13?

A

Unreachable Message

22
Q

ALE Formula?

A

Annualized Loss Expectancy
SLE * ARO

Single Loss Expectancy * Annualized Rate of Occurence

23
Q

What is another name for the software vulnerability version model?

A

Plan, Secure, Confirm, Remediate

24
Q

SNORT cannot filter what traffic types?

25
An IPV4 header has a default length of?
20 bytes
26
Clustering is an example of what control?
Compensating Control
27
What is the specification for an information security management system (ISMS)? An ISMS is a framework of policies and procedures that includes all legal, physical, and technical controls involved in an organization’s information risk management process. Includes best practices for information security management.
ISO 27001
28
3DES does how many rounds during the encryption process?
48