Mod B Flashcards

1
Q

this type of log monitors computer system events such as when a computer stops or starts and OS events, such as when a service starts or stops

A

system logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

successful and failed login attempts are most likely to be contained within what type of logs

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Diffie Hellman and ElGamal key exchange uses what mathematical function

A

discrete logarithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RSA uses what mathematical function

A

prime number factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ad hoc mode, also called peer to peer mode, is useful for sharing ___ from one computer to anotherr

A

files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Only ___ sites support DR testing in accordance with a company’s DRP

A

hot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a ___ attack, an attacker sends UDP pakcets with a spoofed source address to a directed broadcast address. Every device that receives one of thse UDP boradcasts will send a response to the spoofed source address

A

fraggle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ attacks use malformed IP packets in which the source and destination address and port are the same. When the victim with the destination receives the packet, it can become confused and crash

A

LAND (local area network denial)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In a ___ attack, an attacker uses serveral large overlapping ip fragments. The victim system will attempt to reassemble these packets, sometimes causing the system to crash

A

teardrop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What transport protocol was discovered to be vulnerable to POODLE?

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CVSS scoring is influenced by what 3 metric groups?

A

Base: severity, set by vendor

Temporal: urgency, set by vendor

Environment: how it effects end user of a specific organization, set by end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

password ___ restrictions will ensure that a specified number of time has passed before a user is allowed to manually change a newly changed password

A

age

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What routing protocol does not support MD5 authentication for secure route updates?

A

RIPv1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ is an access control principle that ensures information does not flow between groups and users

A

Compartmentalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A secure development metric that ranks security issues in order to quantify risk

A

risk density

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When is the archive bit cleared in a backup scheme?

A

every time a backup is performed

17
Q

What backup resets the archive bit

A

full and incremental

18
Q

What does the archive bit determine?

A

Which file needs to be backed up

19
Q

The process of authenticating to a biometric system

A

throughput

20
Q

Business practices that a resonable individual would consider appropriate

A

prudent man rule

21
Q

Unused space in a cluster is

A

slack space

22
Q

smallest unit of accessible space is a

23
Q

___ evidence is evidence that includes copies or oral descriptions of original documents

24
Q

___ evidence can support a fact that was established by other evidence but cannot by itself establish that fact

A

corroborative

25
__ evidence includes descriptions and accounts of facts of an event by eyewitnesses to the event in question
direct
26
___ evidence is evidence that can indirectly establish a fact but cannot be used to directly establish that fact
circumstantial
27
What are the two keys TPMs use and what do they do
endorsement key: created when tpm is manufactured, permanent storage key: created when a user takes ownership of the TPM
28
Name 4 security modes for systems and what they must have
Dedicated: security clearance, access approval, a valid need to know for all info processed System high: security clearance, access approval for all info processed Compartmented: security clearance for all info processed Multilevel mode: security clearance, access approval, and a valid need to know that permits only info they will access
29
What OASIS standard is most commonly used by SDN
XACML (extensible access control markup language)
30
SPML (security provisioning markup language) is based on what language
DSML (directory services markup language)
31
Transient authentication is authentication by something you ____
have
32
OOP concept that enables data to be processed differently based on the data type when objects are instantiated from other objects.
Polymorphism
33
OOP concept that enables 2 objects that are based on the same class to process data independently
polyinstantiation
34
maximum time a business can survive without a service
RTO
35
how long a system should run before failing
mean time between failure (MTBF)
36
how long it will take to recover a failed system
mean time to repair (MTTR)