Misc Flashcards

1
Q

Which RFC defines the Internet Protocol?

A

RFC 791

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This document is considered step by step and can be tied closely to hardware.

A

Procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES does how many rounds during the encryption process?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What form of testing is there very little or no knowledge of the target network?

A

Black Box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Presence?

A

Remote access program for Apple computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An Nmap full connect scan uses which switch?

A

nmap -sT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which risk assessment method is similar to the structured review yet individuals present for the meeting must write their responses down and hand them to the team lead for review?

A

Modified Delphi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DES has an effective key length of?

A

56

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which RFC defines the IETF?

A

RFC 1700

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Extended ACLs cannot by default examine which of these?

  • Protocol
  • IPSEC data
  • DSCP
  • Precedent Value
A

IPSEC Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An ICMP type 8 message is best defined as?

A

Echo Request (Ping)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which RFC defines ICMP?

A

RFC 792

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many steps of the TCP startup are completed in a stealth scan?

A

Two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SLE Formula?

A

Single Loss Expectancy

AV (asset value) * EF (exposure factor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Nmap switch is used to identify the version of OS running?

A

nmap -O

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SAFER uses how many blocks of data?

A

64

17
Q

Which encryption algorithm can be used for data at rest and is based on the Rijndael algorithm?

A

AES

18
Q

These are considered tactical documents, as they lay out specific steps or processes required to meet a certain requirement.

A

Standards

19
Q

After completing a port scan you have identified TCP port 80 as open. What should be your next step?

A

Banner Grab

20
Q

What is jitter?

A

The variations in transmission latency that can cause packet loss and degraded VoIP call quality.

21
Q

What is ICMP type 3 code 13?

A

Unreachable Message

22
Q

ALE Formula?

A

Annualized Loss Expectancy
SLE * ARO

Single Loss Expectancy * Annualized Rate of Occurence

23
Q

What is another name for the software vulnerability version model?

A

Plan, Secure, Confirm, Remediate

24
Q

SNORT cannot filter what traffic types?

A

OSPF

25
Q

An IPV4 header has a default length of?

A

20 bytes

26
Q

Clustering is an example of what control?

A

Compensating Control

27
Q

What is the specification for an information security management system (ISMS)?

An ISMS is a framework of policies and procedures that includes all legal, physical, and technical controls involved in an organization’s information risk management process.

Includes best practices for information security management.

A

ISO 27001

28
Q

3DES does how many rounds during the encryption process?

A

48