Practice C-D Flashcards

1
Q

the National Fire Protection Association (NFPA) recommends that computer facilities be able to withstand ___ minutes of exposure to fire

A

60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the difference between a dry pipe and deluge sprinkler system is that in a deluge system the pipes are ___

A

always open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a change management process is most likely to interface with a configuration management process during the ___ phase

A

documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ is a buffer overflow protection that forces an application to fail immediately if a pointer is freed incorrectly

A

Heap Metadata Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

rights grant users the ability to perform specific actions (login, print, backup, etc.), while permissions grant ___

A

levels of access to specific objects (read, write to, execute)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

one improvement from WEP to WPA is the addition of ___ to protect against man in the middle attacks

A

Message Integrity Check (MIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a security policy should be no more than ___ pages long

A

2-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the ___ was created by the National Institute of Standards and Technology for the testing and certification of forensics equipment

A

Computer Forensics Tool Testing (CFTT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

smart card attacks fall into 4 categories:

A
  • Fault analysis (usually by denying full power);
  • Power differential (directly connecting to pins and analyzing fluctuations);
  • Timing attacks (analyzing time for cryptographic functions);
  • Emanation attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

wireless clients on a LAN typically operate in ___ mode, which allows them to communicate with other clients through a Access Point

A

Infrastructure (or Master)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

wireless printers are sometimes configured in ___ mode to allow direct communication without an access point

A

Ad Hoc (or Peer to Peer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

wireless devices that are designed to communicate only with an Access Point are configured in ___ mode

A

Client (or Managed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ programming languages restrict the ways data can be used to protect against attacks using memory pointers and arrays

A

type safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the linux file ___ contains secure user information and is only accessible by root

A

/etc/shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

stateful firewalls operate between OSI levels ___ and ___. They only allow traffic into a network if ___

A

Network; Transport; it is in response to a corresponding request sent out from that network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

while most cross site scripting attacks are typically mitigated through input validation and sanitization, cross-site request forgery (XSRF) attacks can be better mitigated through 3 controls:

A

CAPTHCHA;
two-factor authorization;
adding a nonce to website requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

___ (CSMA/CA or CMSA/CD) sends a jam signal to indicate that two devices are attempting to send simultaneously

A

CMSA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

___ (CSMA/CA or CMSA/CD) requires that the receiving device send acknowledgments

A

CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ can be used to encrypt cardholder data from the moment a card is swiped until it reaches the payment processor

A

P2PE (Point to Point Encryption)

20
Q

in ___ processes are assigned to time slots to access system resources in order to isolate and protect them

A

time multiplexing

21
Q

for memory protection, ___ copies an entire process to a secondary memory location (i.e. disk)

A

swapping

22
Q

in a ___ attack an IP packet is sent with the same source and destination address and port

A

LAN Denial (LAND)

23
Q

in web authentication using social media accounts for SSO, ___ is typically used for authentication and ___ for authorization

A

OpenID Connect; OAuth 2.0

24
Q

Microsoft requires the following 3 buffer overflow prevention measures for software vendors: ___ and recommends but does not require ___

A

Data Execution Prevention (DEP);
Heap Metadata Protection;
Address Space Layout Randomization (ASLR);
Pointer Encoding

25
Q

___ is a client based technology that primarily uses a digital certificate as a security control

A

Active X

26
Q

in pipelining, and second instruction is fetched while the first instruction is ___

A

decoded

27
Q

___ is an aggregated threat-modeling methodology developed by Microsoft

A

STRIDE

28
Q

___ is a risk-based threat-modeling methodology with seven stages

A

PASTA

29
Q

___ is a classification used to rank threats numerically

A

DREAD

30
Q

___ is a layer 2 LAN technology using primary and secondary nodes. Instead of using CSMA/CD, primary nodes poll secondary nodes to allow them to transmit data with permission

A

Synchronous Data Link Control (SDLC)

31
Q

SDLC was succeeded by HDLC, which supports ___ and ___

A

flow control; error correction

32
Q

___ is a type of RAM that uses flip flops, and ___ uses capacitors, requires constant refreshing and is slower and cheaper

A

SRAM; DRAM

33
Q

RSA has built-in protection against ___ attacks

A

replay

34
Q

the IPv6 loopback address is ___

A

::1

35
Q

because of Meet in the Middle attacks, the effective security of 3DES is ___ bits

A

112

36
Q

the EU-US Safe Harbor framework was replaced by the ___

A

EU-US Privacy Shield Framework

37
Q

___ is a memory protection technique that maps hardware memory addresses to applications, allowing different applications to access library objects at the same memory location rather than loading their own copy

A

virtual memory

38
Q

Carrier-sense multiple access with collision detection (CSMA/CD) was only used in networks with ___

A

half-duplex Ethernet connections

39
Q

CHAP uses a ___-way handshake and also ___ to protect authentication

A

3; periodically reauthenticates

40
Q

the vulnerability of Telnet is that is sends ___ in clear text

A

all data

41
Q

the Ethernet Cyclic Frame Check (CFC) field contains a ___

A

4 byte cyclic redundancy check value

42
Q

___ is an attack that tricks a browser by inputting hexadecimal data which references resources normally protected by directory traversal checks

A

double encoding

43
Q

Single Loss Expectancy = ___ x ___

A

Asset Value (AV); Exposure Factor (EF)

44
Q

the difference between Point to Point Encryption (P2PE) and End to End Encryption (E2EE) for credit card data is that with E2EE ___

A

the cardholder data is stored unencrypted before being sent to the payment processor, so merchants can do key management

45
Q

in an evacuation, the ___ is responsible for making sure everyone exits the building safely, and the ___ is responsible for making sure everyone arrives at the designated meeting point

A

safety warden; meeting point leader

46
Q

IP address ranges that can be used for LAN’s and the internet are defined in the document RFC ___

A

1918