Practice A Flashcards

1
Q

to calculate qualitative risk, multiply:

A

Threat x Vulnerability x Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a threat ___ is the party responsible for a threat, and the threat ___ is the potential medium of the attack

A

agent; vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a SEIM system is only used when there are multiple ___

A

servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

processors typically support two states: ___ which has highest privileges, or ___ which is associated with users

A

Supervisor/kernel; problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___, aka encapsulation is used in object oriented programming to separate subjects and objects

A

data hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the ___ wireless standard supports 2.4 or 5 GHz and increases throughput up to 600 Mbps by supporting multiple Input/output frequencies

A

802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a client device responds to a TFTP server using a ___ port, in the number range:

A

registered, or user; 1024 - 49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

temporary communication sessions are often established using ___ ports, in the number range:

A

ephemeral, or private; 49152 - 65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

of the fire sensing technologies, only ___ sensors require line of sight

A

flame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the main concern about Bluetooth on a network is ___

A

weak encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Extensible Access Control Markup Language (XACML), Security Provisioning Markup Language (SPML) and Security Assertion Markup Language (SAML) are all open standards created by ___

A

OASIS (Organization for the Advancement of Structured Information Standards)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the difference between Network Address Translation (NAT) and Port Address Translation (PAT) is:

A

PAT assigns multiple private IP’s to one public IP by assigning Port numbers, while NAT assigns one-to-one private to public IP’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

communicating with either IPv4 or IPV6 can be done by a ___ device, by using ___ to translate the traffic, or between LAN’s using ___

A

dual stack;
Network Address Translation-Protocol Translation (NAT-PT);
4to6 or 6to4 tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

while Kerberos does a good job preventing eavesdropping attacks, it is vulnerable to ___

A

theft of cached credentials which are not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

in network data encapsulation, bits are encapsulated into ___, then into ___, then into ___

A

frames; packets; segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

of the AAA protocols, one weakness of ___ is that it only encrypts passwords, not usernames

A

RADIUS

17
Q

HTTPS encrypts packets at OSI layer ___

A

4 - Transport

18
Q

any device with more than one network connection is considered multi-___

A

homed

19
Q

mitigating electromagnetic leakage is the concern of the ___ program

A

TEMPEST

20
Q

the OWASP top 10 vulnerability that increased since 2013 is ___

A

sensitive data exposure

21
Q

although security administrators generally have less privileges than system administrators, they often ___ of system admins

A

audit the activities

22
Q

the SHA algorithm can produce a hash of at most ___ bits

A

512

23
Q

in a brute force attack the attacker knows the ___

A

ciphertext

24
Q

the ISO 27000 security standards are based on a ___ standard

A

British

25
Q

SYN flood attacks occur on OSI layer ___ because they use ___ protocol

A

Transport; TCP

26
Q

to deny specific domains in an access control list while allowing all others, your rules should end with ___

A

Allow All

27
Q

skimming attacks involve the capture and use of ___

A

credit card information

28
Q

a teardrop attack is a kind of DOS attack using ___

A

large overlapping IP fragments the victim system attempts to reassemble

29
Q

an emanation attack captures data through ___

A

electromagnetic leakage

30
Q

following a malware attack which damaged files, anti-virus software used to purge the malware is a ___ control and restoring from backup is a ___ control

A

Corrective; Recovery

31
Q

Kerberos is considered a ___ system because users only have to sign on once per session

A

Single Sign On (SSO)

32
Q

security ___ of objects enable enforcement of organizational policies, standards, regulations, etc.

A

marking

33
Q

when an identified vulnerability has a label beginning “MS..” then it was identified by the organization ___

A

Microsoft

34
Q

technical Standards in an organization help ensure ___, whereas Baselines have more ___

A

consistency; discretion

35
Q

in a relational database, ___ is another word for a table, ___ for a row and ___ for a column

A

relation; tuple; attribute

36
Q

Tripwire is a ___ based intrusion ___ system

A

host; detection

37
Q

SLIP is sometimes used instead of PPP because ___

A

it has lower overhead

38
Q

a lockdown enclosure is designed to prevent ___

A

theft of computer equipment