Practice exam strengthening Flashcards
What is the range of well known ports?
0-1023
What was the first international treaty seeking to address computer crimes?
Council of Europe (CoE) Convention on Cybercrime
What outlines the general requirements of an ISMS?
Answers questions like: What is an ISMS? What does it do?
ISO/IEC 27001
NIST SP 800-53 was initially created to tells agencies what needs to be put into place in order to be compliant with what?
A. HIPAA
B. FISMA
C. GLBA
D. PCI DSS
B
What is the best definition of a socket?
A port number and an IP address
Computer-generated or electronic information is most often categorized as what type of evidence?
Hearsay
How often should fire extinguishers be inspected?
A. Every two years
B. Once a year
C. Quarterly
D. Monthly
quarterly
What is the other name for Thin Net?
A. 10BaseT
B. 100BaseT
C. Fast Ethernet
D. 10Base2
10Base2
What SDLC model does this describe?
“Discrete phases of development requiring formal reviews and documentation” ?
Waterfall model
Which are the most used backup facility type?
A. Warm site
B. Hot Site
C. Redundant Site
D. Cold site
Warm site
A form of attack on a computer which takes advantage of the fact that the operating system is in a vulnerable state after an interrupt has occurred.
(Fun Fact: Also not mentioned in the book.)
NAK attack
This component of PPP establishes, configures, and maintains the connection.
Link Control Protocol
LCP
This component of PPP provides user authentication capabilities through PAP, CHAP, and EAP
Network Control Protocol
NCP
This is a framing protocol that is used mainly for device-to-device communication, such as two routers communicating over a WAN link. It is an improvement over SDLC
HDLC
High Level Data Link Control
This is the simplest SOO technology, but it is not very secure.
A. Kerberos
B. Thin Clients
C. SESAME
D. scripting
D. scripting