Practice exam strengthening Flashcards

1
Q

What is the range of well known ports?

A

0-1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was the first international treaty seeking to address computer crimes?

A

Council of Europe (CoE) Convention on Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What outlines the general requirements of an ISMS?

Answers questions like: What is an ISMS? What does it do?

A

ISO/IEC 27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIST SP 800-53 was initially created to tells agencies what needs to be put into place in order to be compliant with what?

A. HIPAA
B. FISMA
C. GLBA
D. PCI DSS

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the best definition of a socket?

A

A port number and an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Computer-generated or electronic information is most often categorized as what type of evidence?

A

Hearsay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How often should fire extinguishers be inspected?

A. Every two years
B. Once a year
C. Quarterly
D. Monthly

A

quarterly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the other name for Thin Net?

A. 10BaseT
B. 100BaseT
C. Fast Ethernet
D. 10Base2

A

10Base2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What SDLC model does this describe?

“Discrete phases of development requiring formal reviews and documentation” ?

A

Waterfall model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which are the most used backup facility type?

A. Warm site
B. Hot Site
C. Redundant Site
D. Cold site

A

Warm site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A form of attack on a computer which takes advantage of the fact that the operating system is in a vulnerable state after an interrupt has occurred.

(Fun Fact: Also not mentioned in the book.)

A

NAK attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This component of PPP establishes, configures, and maintains the connection.

A

Link Control Protocol

LCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This component of PPP provides user authentication capabilities through PAP, CHAP, and EAP

A

Network Control Protocol

NCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is a framing protocol that is used mainly for device-to-device communication, such as two routers communicating over a WAN link. It is an improvement over SDLC

A

HDLC

High Level Data Link Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is the simplest SOO technology, but it is not very secure.

A. Kerberos
B. Thin Clients
C. SESAME
D. scripting

A

D. scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is a symmetric block cipher developed while studying DES, an ICMP tunneling attack, and the name of a god i norse mythology.

A

Loki

17
Q

Which of the following is not considered a
detective control.

A. Incident Response
B. Mandatory Vacations
C. Separation of Duties
D. Job Rotation

A

Separation of Duties

18
Q

Put these change management steps in order.

A Request a change
B, Document a change
C. Implement a change
D. Test a change
E. Approve a change
F. Report to management
A
Request a change
Approve a change
Document a change
Test a change
Implement a change
Report to management
19
Q

American Institute of Certified Public Accountants (AICPA) first had SAS 70, which originally had a focus on financial issues. In 2011 the AICPA released a new framework of auditing standards on ________, which are defined in the __________ .

A

SOC (Service Organization Controls)

SSAE 16 American Statement on Standards for Attestation Engagements

20
Q

What is the single point of failure within an SOO implementation?

A

authentication server

21
Q

OSI Model —-> TCP/IP model

Application, Presention, Session = ____________
Transport = __________
Network = ____________
Data Link, Physical = _____________

A

Application
Host-to-Host
Internet
Network Access

22
Q

In 802.11, OSA has no authentication and all transactions are in cleartext, so wide open to sniffing. When the AP is configured to use ______, the AP sends a random value to the wireless device, which encrypts it and sends it back. AP decrypts it and verifies the value.

A

SKA

Shared Key Authentication

23
Q

This is the most authoritative level of time source.

A. Stratum 0
B. Stratum 1
C. Stratum 2
C. Stratum 3

A

A

24
Q

Which component of the IPSec suite provides confidentiality, data-origin authentication, and data integrity?

A. ISAKMP
B. ESP
C. AH
D. IKE

A

ESP

Encapsulating Security Payload

25
Q

Which component of the IPSec suite provides data integrity, data-origin authentication, and protection from replay attacks?

A. ISAKMP
B. ESP
C. AH
D. IKE

A

AH

Authentication Header

26
Q

Which component of the IPSec suite provides a framework for security association?

A. ISAKMP
B. ESP
C. AH
D. IKE

A

ISAKMP

Internet Security Association and Key Management Protocol

27
Q

Which component of the IPSec suite provides authentication keying material for use with ISAKMP?

A. ISAKMP
B. ESP
C. AH
D. IKE

A

IKE

Internet Key Exchange

28
Q

Which tunneling protocol extends and protects PPP connections, works at the data link layer, transmits over multiple types of networks (not just IP), and combines with IPSec for security?

A. TLS
B. IPSec
C. PPTP
D. L2TP

A

L2TP

29
Q

Which tunneling protocol extends and protects PPP connections, works at the data link layer, transmits over IP networks only?

A. TLS
B. IPSec
C. PPTP
D. L2TP

A

PPTP

30
Q

Which tunneling protocol handles multiple VPN connections at the same time, provides secure authentication and encryption, and works at the network layer?

A. TLS
B. IPSec
C. PPTP
D. L2TP

A

IPSec

31
Q

Which tunneling protocol protects mainly web and e-mail traffic, works at the session layer, and is easy to deploy since it is already embedded into web browsers?

A. TLS
B. IPSec
C. PPTP
D. L2TP

A

TLS

32
Q

____________ software controls what users can access when using a web browser to interact with web-based enterprise assets. This type of access control is put into place to control external entities requesting access to internal resources.

A

WAM

Web-based Access Management

33
Q

If a non-European organization wants to do business with a European entity, it will need to adhere to the __________________ requirements if certain types of data will be passed back and forth during business processes.

A

Safe Harbor

34
Q

This is an international organization that helps different GOVERNMENTS come together and tackle the economic, social , and governance challenges of a globalized economy.

A

OECD

Organization for Economic Co-Operation and Development

35
Q

Which does XACML not use?

A. Action Element - Types of Access
B. Subject Element - Requesting Entity
C. Resource Element - Requested Entity
D. Action Element - Access Control

A

D. Action Element - Access Control

36
Q

________ is a tool used to conceptually understand the structure and behavior of a complex entity through different views. It provides different views of the system, based upon the needs of the stakeholders of that system.

A

An Architecture

37
Q

What is the international standard for business continuity?

It provides guidelines for information and communications technology readiness for business continuity.

A

ISO/IEC 27031:2011

38
Q

The ___________ framework is a model for the development of ENTERPRISE architectures. The _______ model is the moedel and methodology for hte development of information security enterprise architectures.

A

Zachman, SABSA

39
Q

____________ is a methodology that is intended to be used in situations where people manage and direct the risk evaluation for information security within their company.

A

OCTAVE

Operationally Critical Threat, Asset, and Vulnerability Evaluation