Missed Questions Flashcards

1
Q

Within the context of the CBK, which of the following provides a MINIMUM level of security ACCEPTABLE for an environment ?

A standard
A procedure
A baseline
A guideline

A

The correct answer is: A baseline

Baselines provide the minimum level of security necessary throughout the organization.

Standards specify how hardware and software products should be used throughout the organization.

Procedures are detailed step-by-step instruction on how to achieve certain tasks.

Guidelines are recommendation actions and operational guides to personnel when a specific standard does not apply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network-based vulnerability assessment is a type of test also referred to as:

A routing vulnerability assessment.
A host-based vulnerability assessment.
A passive vulnerability assessment.
An active vulnerability assessment.

A

The correct answer is: An active vulnerability assessment.

A network-based vulnerability assessment tool/system either re-enacts system attacks, noting and recording responses to the attacks, or probes different targets to infer weaknesses from their responses.
Since the assessment is actively attacking or scanning targeted systems, network-based vulnerability assessment systems are also called active vulnerability systems.

There are mostly two main types of test:
PASSIVE: You don’t send any packet or interact with the remote target. You make use of public database and other techniques to gather information about your target.
ACTIVE: You do send packets to your target, you attempt to stimulate response which will help you in gathering information about hosts that are alive, services runnings, port state, and more.

See example below of both types of attacks:

Eavesdropping and sniffing data as it passes over a network are considered passive attacks because the attacker is not affecting the protocol, algorithm, key, message, or any parts of the encryption system. Passive attacks are hard to detect, so in most cases methods are put in place to try to prevent them rather than to detect and stop them.

Altering messages , modifying system files, and masquerading as another individual are acts that are considered active attacks because the attacker is actually doing something instead of sitting back and gathering data. Passive attacks are usually used to gain information prior to carrying out an active attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In order to be able to successfully prosecute an intruder:

A point of contact should be designated to be responsible for communicating with law enforcement and other external agencies.

A proper chain of custody of evidence has to be preserved.

Collection of evidence has to be done following predefined procedures.

Whenever possible, analyze a replica of the compromised resource, not the original, thereby avoiding inadvertently tamping with evidence.

A

The correct answer is: A proper chain of custody of evidence has to be preserved.

If you intend on prosecuting an intruder, evidence has to be collected in a lawful manner and, most importantly, protected through a secure chain-of-custody procedure that tracks who has been involved in handling the evidence and where it has been stored. All other choices are all important points, but not the best answer, since no prosecution is possible without a proper, provable chain of custody of evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which model, based on the premise that the quality of a software product is a direct function of the quality of its associated software development and maintenance processes, introduced five levels with which the maturity of an organization involved in the software process is evaluated?

The Total Quality Model (TQM)
The IDEAL Model
The Software Capability Maturity Model
The Spiral Model

A

The Software Capability Maturity Model (CMM) is based on the premise that the quality of a software product is a direct function of the quality of its associated software development and maintenance processes. It introduces five maturity levels that serve as a foundation for conducting continuous process improvement and as an ordinal scale for measuring the maturity of the organization involved in the software processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is best defined as a circumstance in which a collection of information items is required to be classified at a higher security level than any of the individual items that comprise it?

Aggregation
Inference
Clustering
Collision

A

The Internet Security Glossary (RFC2828) defines aggregation as a circumstance in which a collection of information items is required to be classified at a higher security level than any of the individual items that comprise it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a trusted shell?

It means that it is a communications channel between the user, or program, and the kernel.

It means that someone working in that shell can communicate with someone else in another trusted shell.

It means that it won’t let processes overwrite other processes’ data.

It means that someone who is working in that shell cannot “bust out of it”, and other processes cannot “bust into it”.

A

The correct answer is:
A trusted shell means that someone who is working in that shell cannot “bust out of it”, and other processes cannot “bust into it”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__________ attack is also known as Time of Check(TOC)/Time of Use(TOU)

Eavesdropping
Traffic Analysis
Race Condition
Masquerading

A

A Race Condition attack is also known as Time of Check(TOC)/Time of Use(TOU).

A race condition is when processes carry out their tasks on a shared resource in an incorrect order. A race condition is possible when two or more processes use a shared resource, as in data within a variable. It is important that the processes carry out their functionality in the correct sequence. If process 2 carried out its task on the data before process 1, the result will be much different than if process1 carried out its tasks on the data before process 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary role of cross certification?

Build an overall PKI hierarchy
Creating trust between different PKIs
Set up direct trust to a second root CA
Prevent the nullification of user certificates by CA certificate revocatio

A

The correct answer is: Creating trust between different PKIs

More and more organizations are setting up their own internal PKIs. When these independent PKIs need to interconnect to allow for secure communication to take place (either between departments or different companies), there must be a way for the two root CAs to trust each other.

These two CAs do not have a CA above them they can both trust, so they must carry out cross certification. A cross certification is the process undertaken by CAs to establish a trust relationship in which they rely upon each other’s digital certificates and public keys as if they had issued them themselves.

When this is set up, a CA for one company can validate digital certificates from the other company and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is used to create and modify the structure of your tables and other objects in the database?

SQL Data Relational Language (DRL)
SQL Data Identification Language (DIL)
SQL Data Definition Language (DDL)
SQL Data Manipulation Language (DML)

A

The correct answer is: SQL Data Definition Language (DDL)

The SQL Data Definition Language (DDL) is used to create, modify, and delete views and relations (tables).

SQL actually consists of three sublanguages:

The Data Definition Language (DDL) is used to create databases, tables, views, and indices (keys) specifying the links between tables. Because it is administrative in nature, users of SQL rarely use DDL commands. DDL also has nothing to do with the population of use of the database, which is accomplished by data manipulation language (DML).

The Data Manipulation Language (DML) is used to query and extract data, insert new records, delete old records, and update existing records.

The Data Control Language (DCL). It is used by System and database administrators to control access to data. It provides the security aspects of SQL and is therefore our primary area of concern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This type of backup management provides a continuous on-line backup by using optical or tape “jukeboxes,” similar to WORMs (Write Once, Read Many):

Hierarchical Storage Management (HSM).
Hierarchical Resource Management (HRM).
Hierarchical Access Management (HAM).
Hierarchical Instance Management (HIM).

A

The correct answer is: Hierarchical Storage Management (HSM).

Hierarchical Storage Management (HSM) provides a continuous on-line backup by using optical or tape “jukeboxes,” similar to WORMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a CHARACTERISTIC of a decision support system (DSS) in regards to Threats and Risks Analysis?

1) DSS is aimed at solving highly structured problems.
2) Data collection method that happens in an anonymous fashion.
3) DSS supports only structured decision-making tasks.
4) DSS combines the use of models with non-traditional data access and retrieval functions.

A

The correct answer is: Data collection method that happens in an anonymous fashion.

DSS emphasizes flexibility in the decision-making approach of users. It is aimed at solving less structured problems, combines the use of models and analytic techniques with traditional data access and retrieval functions and supports semi-structured decision-making tasks.

DSS is sometimes referred to as the Delphi Method or Delphi Technique:

The Delphi technique is a group decision method used to ensure that each member gives an honest opinion of what he or she thinks the result of a particular threat will be. This avoids a group of individuals feeling pressured to go along with others’ thought processes and enables them to participate in an independent and anonymous way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements pertaining to ethical hacking is INCORRECT?

1) An organization should use ethical hackers who do not sell auditing, hardware, software, firewall, hosting, and/or networking services.
2) Testing should be done remotely to simulate external threats.
3) Ethical hacking should not involve writing to or modifying the target systems negatively.
4) Ethical hackers never use tools that have the potential of affecting servers or services.

A

The correct answer is: Ethical hackers never use tools that have the potential of affecting servers or services.

This means that many of the tools used for ethical hacking have the potential of exploiting vulnerabilities and causing disruption to IT system. It is up to the individuals performing the tests to be familiar with their use and to make sure that no such disruption can happen or at least should be avoided.

An organization should use ethical hackers who do not sell auditing, hardware, software, firewall, hosting, and/or networking services. An ethical hacking firm’s independence can be questioned if they sell security solutions at the same time as doing testing for the same client. There has to be independance between the judge (the tester) and the accuse (the client).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An Ethernet address is composed of how many bits?

32-bit address
48-bit address
64-bit address
128-bit address

A

The correct answer is: 48-bit address

An Ethernet address is a 48-bit address that is hard-wired into the Network Interface Cards (NIC) of the network node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Critical areas should be lighted:

Eight feet high and two feet out.
Eight feet high and four feet out.
Ten feet high and four feet out.
Ten feet high and six feet out.

A

The correct answer is: Eight feet high and two feet out.

Lighting should be used to discourage intruders and provide safety for personnel, entrances, parking areas and critical sections. Critical areas should be illuminated 8 feet high and 2 feet out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Open Web Application Security Project (OWASP) Top Ten list of risks has been published for the past several years. Which of the following choice represents threats that have been at the top of the list for many years?

Sniffing
Injection
Race Condition
Bufferoverflow

A

The correct answer is: Injection

SQL injection and other database related raw content injections with LDAP, XML through dynamic SQL queries indicate the highest risks to information systems with web and database tiered systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following answers is NOT associated with WPA - Wi-Fi Protected Access security technology for wireless networks?

Dynamic Encryption Keys
128-Bit TKIP
ICV uses CRC-32
Per-frame Sequence counter

A

The correct answer is: ICV uses CRC-32

WEP ICV - Integrity Check Value or hash sum is a small size and is based on CRC-32 an algorithm for detecting noise and common errors in transmission. CRC-32 is a great checksum for detecting errors but a bad choice for a cryptographic hash.

The following answers are incorrect:

  • Dynamic Encryption Keys: Sorry, this is a feature of WPA.
  • 128-Bit TKIP: Sorry, this is a feature of WPA.
  • Per-frame Sequence counter: Sorry, this is a feature of WPA.
17
Q

Which of the following term related to network performance refers to the variation in the time of arrival of packets on the receiver of the information?

Bandwidth
Throughput
Latency
Jitter

A

The correct answer is: Jitter

Simply said, the time difference in packet inter-arrival time to their destination can be called jitter. Jitter is specific issue that normally exists in packet switched networks and this phenomenon is usually not causing any communication problems. TCP/IP is responsible for dealing with the jitter impact on communication.

18
Q

Which of the following is a large hardware/software backup system that uses the RAID technology?

Scale Array
Tape Array
Crimson Array
Table Array

A

A Tape Array is a large hardware/software backup system based on the RAID technology.

There is a misconception that RAID can only be used with Disks.

19
Q

What is called an exception to the search warrant requirement that allows an officer to conduct a search without having the warrant in-hand if probable cause is present and destruction of the evidence is deemed imminent?

Evidence Circumstance Doctrine
Exigent Circumstance Doctrine
Evidence of Admissibility Doctrine
Exigent Probable Doctrine

A

The correct answer is: Exigent Circumstance Doctrine

An Exigent Circumstance is an unusual and time-sensitive circumstance that justifies conduct that might not be permissible or lawful in other circumstances. For example, exigent circumstances may justify actions by law enforcement officers acting without a warrant such as a mortal danger to a young child. Examples of other exigent circumstances include protecting evidence or property from imminent destruction.

The exigent circumstances exception to the warrant requirement generally applies when one of the following circumstances is present:

(1) evidence is in imminent danger of destruction;
(2) a threat puts either the police or the public in danger;
(3) the police are in “hot pursuit” of a suspect; or
(4) the suspect is likely to flee before the officer can secure a search warrant.

20
Q

To be in compliance with the Montreal Protocol, which of the following options can be taken to refill a Halon flooding system in the event that Halon is fully discharged in the computer room?

Order an immediate refill with Halon 1201 from the manufacturer.
Contact a Halon recycling bank to make arrangements for a refill.
Order a Non-Hydrochlorofluorocarbon compound from the manufacturer.
Order an immediate refill with Halon 1301 from the manufacturer.

A

The correc answer is: Order a non-Hydrochlorofluorocarbon compound from the manufacturer

The best choice is to find or replace the systems with a Non-Hydrochlorofluorocarbon compound. A safe replacement such as Innergen, FM-200, or other non ozone depleting agent would be used.
The goal of the Montreal Protocol is the cessation of production of ozone depleting agents.

21
Q

Which of the following is the biggest threat to new devices introduced to a network?

Default Passwords
Secure Configuration
Unpatched Devices
Unsupported Devices

A

The correct answer is: Default Passwords

Devices almost always come with default passwords on devices and are usually configured as insecure as possible so that they work right out of the box. Great for marketing, terrible for security.

Mitigation: Institute a policy of security configuration and periodic review of ALL devices connected to your network.

22
Q

Which method of remote access was largely retired by Microsoft because it relies on LANMAN hashes, reuse of session keys and the use of an unauthenticated control channel?

PPTP
L2TP
PPP
CHAP

A

The correct answer is: PPTP

PPTP is the acronym for the Point to Point Tunneling Protocol. It is a VPN method that uses a TCP Control channel and a GRE tunnel to encapsulate PPP packets. PPTP is considered broken and therefore unsafe.

CHAP - Challenge Handshake Authentication Protocol isn’t a remote access method, rather an authentication protocol.

23
Q

You have been tasked to develop an effective information classification program. Which one of the following steps should be performed first?

  1. Establish procedures for periodically reviewing the classification and ownership
  2. Specify the security controls required for each classification level
  3. Identify the data custodian who will be responsible for maintaining the security level of data
  4. Specify the criteria that will determine how data is classified
A

Necessary steps for a proper classification program:

  1. Define classification levels.
  2. Specify the criteria that will determine how data is classified.
  3. Have the data owner indicate the classification of the data she is responsible for.
  4. Identify the data custodian who will be responsible for maintaining data and its security level.
  5. Indicate the security controls, or protection mechanisms, that are required for each classification level.
  6. Document any exceptions to the previous classification issues.
  7. Indicate the methods that can be used to transfer custody of the information to a different data owner.
  8. Create a procedure to periodically review the classification and ownership. Communicate any changes to the data custodian.
  9. Indicate termination procedures for declassifying the data.
  10. Integrate these issues into the security-awareness program so that all employees understand how to handle data at different classification levels.
24
Q

What is defined as the hardware, firmware and software elements of a trusted computing base that implement the reference monitor concept?

The reference monitor
Protection rings
A security kernel
A protection domain

A

The correct answer is: A security kernel

A security kernel is defined as the hardware, firmware and software elements of a trusted computing base that implement the reference monitor concept. A reference monitor is a system component that enforces access controls on an object. A protection domain consists of the execution and memory space assigned to each process. The use of protection rings is a scheme that supports multiple protection domains.

25
Q

Which of the following statements pertaining to Business Continuity (BC) Program development is correct?

1) The first step when developing a business continuity program is to perform a business impact analysis.
2) A business continuity plan mainly concerns the organization’s information systems.
3) Generally, each IT platform that runs an application will need a recovery strategy.
4) Recovery of telecommunications should be part of the recovery of IT facilities.

A

The correct answer is: Recovery of telecommunications should be part of the recovery of IT facilities.

Sometimes IT facilities can be of very limited use if not supported by a telecommunications infrastructure; therefore recovery of telecommunications should be part of the recovery of IT facilities.

26
Q

Which of the following NAT firewall translation modes is required to make internal hosts available for connection from external hosts?

Dynamic translation
Load balancing translation
Static translation
Network redundancy translation

A

The correct answer is: static translation

With static translation (also called port forwarding), a specific internal network resource (usually a server) has a fixed translation that never changes. Static NAT is required to make internal hosts available for connection from external hosts.

27
Q

Which of the following answers would BEST defend against Layer 2 - ARP Poisoning attacks?

802.1X
VMPS - VLAN Membership Protocol Server
Switch port Security
Network Antivirus

A

The correct answer is: 802.1X

Discussion: ARP is a completely unauthenticated protocol and presents a clear danger to the operation of a trusted network. It is therefore necessary to strengthen security at this level by adding certificate security to guarantee you are connecting to the host you think you are.

ARP/Layer 2 communications are vulnerable to attack and spoofing and using 802.1X to provide certificate security to network communications will greatly enhance security at layer 2

28
Q

How many hosts are possible on a subnet with a mask of 255.255.255.192?

62
63
64
65

A

The correct answer is: 62

To figure your network IDs subtract your mask number from 256. This will give you your net blocks to work with:

  • 256 - 192 = 64 (Minus 2 for network ID and broadcast addresses)
  • This gives us the network blocks to subnet with - 62.
29
Q

Which of the following technologies help mitigate the exhaustion of IPV4 addresses AND allows companies to have one external IP Address while using a RFC 1918 non-routable internal IP Addressing scheme. Such a technique changes the source address so traffic going outbound to the internet can find it’s way back into the the internal network?

Overloaded NAT - Overloaded Network Address Translation
NAT - Network Access Translation
PAT - Port Address Translation
VLAN - Virtual Local Area Network

A

The correct answer is: Overloaded NAT - Overloaded Network Address Translation

30
Q

Who is primarily responsible for storing and safeguarding the data?

Data Owner
Data User
Data Steward
Security Administrator

A

he correct answer is: Data Steward

Data Steward or data custodian is responsible for storing and safeguarding the data, and include IS personnel such as system analyst and computer operators.

Data Owners – These peoples are generally managers and directors responsible for using information for running and controlling the business. Their security responsibilities include authorizing access, ensuring that access rules are updated when personnel changes occur, and regularly review access rule for the data for which they are responsible.

Data Custodian or Data Steward – These people are responsible for storing and safeguarding the data, and include IS personnel such as system analysis and computer operators.

Security Administrator - Security administrator are responsible for providing adequate physical and logical security for IS programs, data and equipment.

Data Users – Data users, including internal and external user community, are the actual user of computerized data. Their level of access into the computer should be authorized by data owners, and restricted and monitor by security administrator.