Practice B Flashcards

1
Q

the now defunct Department of Defense standard that described computer system security was ___, aka Orange Book, which was later supplemented with a standard for Network security called ___, aka Red Book. This became the basis for the European standard called ___ now used internationally

A

TCSEC; Trusted Network Interpretation; ITSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the ___ is an international standard used to test the security of IT products. It assigns an ___ to each product tested

A

International Common Criteria; Evaluation Assurance Level (EAL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TLS was introduced after SSL was found to be vulnerable to the ___ exploit

A

POODLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a ___ attack can be used to hide a spoofing attack

A

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the ___ is a common standard for describing vulnerabilities, and the ___ provides a naming system for those vulnerabilities

A

Security Content Automation Protocol (SCAP);

Common Vulnerabilities and Exposures (CVE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

switches forward ___ of data and use ___ to make forwarding decisions, they also divide a network into separate ___ domains

A

Frames (and multicast frames); MAC addresses of the destination device; collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the Business Continuity Plan Policy statement should be written by ___

A

C-level executives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

only RIPv2 supports ___ authentication

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___, aka Orange Book was used to ___, whereas the ___ is concerned with IT product security standards

A

TCSEC; evaluate security systems; International Common Criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ITSEC begins by describing what is included in the ___, which includes all components of a system responsible for security

A

Trusted Computing Base (TCB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Remote Procedure Calls (RPC) are handled by OSI layer ___

A

Session (remotely initiates a session)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

transient authentication refers to ___

A

something you have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a ___ fire suppression system is actually safer than a FM-200 system in a data center

A

FE-13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ can not only detect a TCP flood, but reset the connection

A

Network Based Intrusion Detection System (NIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ in Object Oriented Programming allows data to be processed differently depending on the data type

A

polymorphism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

running different VLAN’s on the same switch introduces the risk of ___

A

VLAN hopping

17
Q

___ delegates 3rd party authenticated access to resources but doesn’t share password information

A

OAuth

18
Q

although nonces are used in many protocols to introduce randomness and complexity, one application that doesn’t use them is ___

A

salting

19
Q

a rainbow table attack is considered a type of ___ attack

A

brute force

20
Q

a circuit-level firewall operates on OSI layer

A

5 - Session

21
Q

only a ___ site can serve as part of a DR plan

A

hot

22
Q

in a ___, a process with a lower security level can participate in an unauthorized exchange of sensitive information with a higher security level

A

covert storage channel

23
Q

frequency analysis might be a good option for ___ cryptoanalysis

A

cipher text only

24
Q

IPSec uses ___ to verify integrity of data packets

A

Authentication Headers (AH)

25
Q

___ documents define the technical aspects of a security program, including any hardware and software that is required

A

standards