Practice C-D Flashcards
the National Fire Protection Association (NFPA) recommends that computer facilities be able to withstand ___ minutes of exposure to fire
60
the difference between a dry pipe and deluge sprinkler system is that in a deluge system the pipes are ___
always open
a change management process is most likely to interface with a configuration management process during the ___ phase
documentation
___ is a buffer overflow protection that forces an application to fail immediately if a pointer is freed incorrectly
Heap Metadata Protection
rights grant users the ability to perform specific actions (login, print, backup, etc.), while permissions grant ___
levels of access to specific objects (read, write to, execute)
one improvement from WEP to WPA is the addition of ___ to protect against man in the middle attacks
Message Integrity Check (MIC)
a security policy should be no more than ___ pages long
2-3
the ___ was created by the National Institute of Standards and Technology for the testing and certification of forensics equipment
Computer Forensics Tool Testing (CFTT)
smart card attacks fall into 4 categories:
- Fault analysis (usually by denying full power);
- Power differential (directly connecting to pins and analyzing fluctuations);
- Timing attacks (analyzing time for cryptographic functions);
- Emanation attacks
wireless clients on a LAN typically operate in ___ mode, which allows them to communicate with other clients through a Access Point
Infrastructure (or Master)
wireless printers are sometimes configured in ___ mode to allow direct communication without an access point
Ad Hoc (or Peer to Peer)
wireless devices that are designed to communicate only with an Access Point are configured in ___ mode
Client (or Managed)
___ programming languages restrict the ways data can be used to protect against attacks using memory pointers and arrays
type safe
the linux file ___ contains secure user information and is only accessible by root
/etc/shadow
stateful firewalls operate between OSI levels ___ and ___. They only allow traffic into a network if ___
Network; Transport; it is in response to a corresponding request sent out from that network
while most cross site scripting attacks are typically mitigated through input validation and sanitization, cross-site request forgery (XSRF) attacks can be better mitigated through 3 controls:
CAPTHCHA;
two-factor authorization;
adding a nonce to website requests
___ (CSMA/CA or CMSA/CD) sends a jam signal to indicate that two devices are attempting to send simultaneously
CMSA/CD
___ (CSMA/CA or CMSA/CD) requires that the receiving device send acknowledgments
CSMA/CA
___ can be used to encrypt cardholder data from the moment a card is swiped until it reaches the payment processor
P2PE (Point to Point Encryption)
in ___ processes are assigned to time slots to access system resources in order to isolate and protect them
time multiplexing
for memory protection, ___ copies an entire process to a secondary memory location (i.e. disk)
swapping
in a ___ attack an IP packet is sent with the same source and destination address and port
LAN Denial (LAND)
in web authentication using social media accounts for SSO, ___ is typically used for authentication and ___ for authorization
OpenID Connect; OAuth 2.0
Microsoft requires the following 3 buffer overflow prevention measures for software vendors: ___ and recommends but does not require ___
Data Execution Prevention (DEP);
Heap Metadata Protection;
Address Space Layout Randomization (ASLR);
Pointer Encoding
___ is a client based technology that primarily uses a digital certificate as a security control
Active X
in pipelining, and second instruction is fetched while the first instruction is ___
decoded
___ is an aggregated threat-modeling methodology developed by Microsoft
STRIDE
___ is a risk-based threat-modeling methodology with seven stages
PASTA
___ is a classification used to rank threats numerically
DREAD
___ is a layer 2 LAN technology using primary and secondary nodes. Instead of using CSMA/CD, primary nodes poll secondary nodes to allow them to transmit data with permission
Synchronous Data Link Control (SDLC)
SDLC was succeeded by HDLC, which supports ___ and ___
flow control; error correction
___ is a type of RAM that uses flip flops, and ___ uses capacitors, requires constant refreshing and is slower and cheaper
SRAM; DRAM
RSA has built-in protection against ___ attacks
replay
the IPv6 loopback address is ___
::1
because of Meet in the Middle attacks, the effective security of 3DES is ___ bits
112
the EU-US Safe Harbor framework was replaced by the ___
EU-US Privacy Shield Framework
___ is a memory protection technique that maps hardware memory addresses to applications, allowing different applications to access library objects at the same memory location rather than loading their own copy
virtual memory
Carrier-sense multiple access with collision detection (CSMA/CD) was only used in networks with ___
half-duplex Ethernet connections
CHAP uses a ___-way handshake and also ___ to protect authentication
3; periodically reauthenticates
the vulnerability of Telnet is that is sends ___ in clear text
all data
the Ethernet Cyclic Frame Check (CFC) field contains a ___
4 byte cyclic redundancy check value
___ is an attack that tricks a browser by inputting hexadecimal data which references resources normally protected by directory traversal checks
double encoding
Single Loss Expectancy = ___ x ___
Asset Value (AV); Exposure Factor (EF)
the difference between Point to Point Encryption (P2PE) and End to End Encryption (E2EE) for credit card data is that with E2EE ___
the cardholder data is stored unencrypted before being sent to the payment processor, so merchants can do key management
in an evacuation, the ___ is responsible for making sure everyone exits the building safely, and the ___ is responsible for making sure everyone arrives at the designated meeting point
safety warden; meeting point leader
IP address ranges that can be used for LAN’s and the internet are defined in the document RFC ___
1918