Post-Assessment 2 Flashcards

1
Q

Which of the following choices best identifies the process of scrambling information to prevent it from being read by unauthorized parties?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers and email servers but cannot enter the secure network

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is NOT true about Kerberos tickets?

A

They are generic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kerberos was developed by ______

A

MIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three A’s of security?

A

Authentication, Accounting, Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of network topology is Bluetooth considered?

A

PAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of control provides an alternative to normal controls?

A

Compensating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the choices best describes the process of hiding data within images?

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which FTP mode connects the data channel on port 1025 to 5000?

A

FTP Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To utilize a third-party spam filter for email which record is changed?

A

MX record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following static system uses an OBD-II connector for troubleshooting?

A

In vehicle computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which social engineering technique uses emails or false web posting to trick the user into giving up private information?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following analysis techniques is a new approach to antivirus detection?

A

Dynamic heuristic detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three layers of protection?

A

Personnel Security, Organizational Security, and Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When an attacker attempts to gain access to a user’s computer by stealing the encrypted file containing the password hash that would be _______

A

Offline Cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly