Official Study Guide 2 Flashcards
NIST SP800-53 discusses security controls as a security ___
baseline
Communication systems that rely on start and stop flags or bits to manage data transmission are known as ___
Asynchronous
___ motion detectors transmit ultrasonic or microwave signals into the monitor area, watching for changes in the returned signals bouncing off objects
Wave pattern
___ provides AAA functionality, but is a Cisco proprietary protocol
TACACS+
the TCP three-way handshake is ___
SYN, SYN/ACK, ACK
The ___ program helps to protect the supply chain for components and devices by ensuring that the companies that produce and supply them are secure
US Trusted Foundry
in an IaaS environment, the vendor is only responsible for the hardware and the ___
hypervisor
when testing a website, another word for synthetic monitoring (using realistic data) is ___
proactive monitoring
___ (or impersonation) attacks use stolen or falsified credentials to bypass authentication mechanisms. ___ attacks rely on falsifying an identity like an IP address or hostname without credentials. ___ attacks are a more specific type of impersonation attack that relies on captured network traffic to reestablish authorized
connections
Masquerading; Spoofing; Replay
The ___ evidence rule states that when an agreement between two parties is put into written form, it is assumed to be the entire agreement unless amended in writing
parol
The ___ evidence rule says that a copy of a document is not admissible if the original document is available
best
___ reviews the use and application of controls in an audited organization. It forms part of the underlying framework for SOC 1, 2, and 3 reports
SSAE-18
The Digital Millennium Copyright Act (DMCA) provides safe harbor protection for the operators of ___
Internet service providers
___ is a variation in the latency for different packets
Jitter
___ are a special form of input validation that ensure that the value remains within an expected range
Limit checks
___ via a web portal can require user authentication and can gather data like operating systems, versions, software information, and many other factors that can uniquely identify systems
Device fingerprinting
Packets with ___ IP addresses as sources or destinations should never be routed onto the Internet
private
The most frequent target of account management reviews are ___ accounts, as they create the greatest risk
highly privileged
The courts have applied the ___ rule to include the concept that attorneys may not introduce logs into evidence unless they are authenticated by the system administrator
hearsay
Attackers may use ___ as a tool to exploit a TOC/TOU race condition
algorithmic complexity
The formula for determining the number of encryption keys required by a symmetric
algorithm is ___
((n*(n − 1))/2)
many modern thieves immediately take steps to ensure that mobile devices ___ before they capture data or wipe the device for resale.
will not be trackable or allowed to connect to a network
___ server monitoring relies on synthetic or previously recorded traffic
Active