Practice Test 2 Flashcards

1
Q

another name for an asynchronous attack

A

TOC/TOU time-of-check/time-of-use attack; attack happens when an attacker interrupts a task and changes something to affect the result. Tasks occur in the correct order, but data transmitted by the tasks is changed in some manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

/etc/hosts.equiv file on a UNIX system poses a security risk because …

A

it allows all users to connect remotely without authenticating. It is used if the authentication on the remote systems is equivalent to the local system. Remove this file if you don’t plan to use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

certification path validation

A

checks the authenticity of the certificates in the certification path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

three functions of cross certification

A

primarily for building a trust relationship between different certification hierarchies when users belonging to different hierarchies are required to communicate and might require authentication for legitimate connections. process implies the establishment of a trust relationship between two certificate authorities (CAs) through the signing of another CA’s public key in a certificate referred to as a cross certificate. used to establish trust between different PKIs and build an overall PKI hierarchy. Allows users to validate each other’s certificate when they are certified under different certification hierarchies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

develop the continuity planning policy statement

A

the first step that needs to be completed during the initiation phase of a business continuity plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

focused on minimizing property damage and preventing loss of life

A

disaster recovery plan is concerned with personnel safety and resuming operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

policies that provide protection against remote maintenance PBX attacks

A

turn off the remote maintenance features when not needed, use strong authentication on the remote maintenance ports, keep PBX terminals in a locked, restricted area, replace or disable embedded logins and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

tool assists in app dev design layout as part of application development life cycle

A

CASE Computer-aided software engineering is the use of software tools to assist in the development and maintenance of application software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Delphi

A

technique of expert judgment that ensures each member in a group decision-making process provides an honest opinion on the subject matter in question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When is Delphi used and how?

A

Experts document their views in writing, papers are collected, and final decisions based on majority. Used in risk assessment process and to estimate the cost of a software development project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spiral

A

software development model based on the waterfall model; analyze risks, build prototypes, and simulate the application tasks in phases of the development cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do operational controls do?

A

Controls check the software to test if there are security compromises or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are components of operational software controls?

A

backup controls, software testing, and anti-virus management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of operational controls?

A

Trusted recovery procedures, audit trails, configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mitigation for time of use/time of check attack

A

ensure that critical sets of information are executed in order and in entirety or rolled back or prevented from making any changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mitigation for maintenance hooks

A

encrypt all sensitive information in the system, implement auditing to supplement IDS, and use a host based IDS to record any attempt to access the system using these hooks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

covert storage channel

A

one process writes data to hard drive and another process reads it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

covert storage attack

A

higher level subject writes data and a lower level subject reads it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

covert timing channel

A

process transmits data to another process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

overt channel

A

developed for communication; processes should use overt and not covert channels; overt channels do not have divided categories like timing and storage channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Function of the Session layer in the OSI model

A

data synchronization; establishes and maintains dialogue or sessions between two computers on the network; communicates problems like file transfer errors

22
Q

Function of the Network layer in the OSI model

A

logical network addressing and routing; in the TCP/IP stack, IP provides network addressing and routing

23
Q

Function of the Data Link layer in the OSI model

A

physical network addressing; network interface cards (NICs) are configured with media access control (MAC) addresses. A NIC’s MAC address is used by a network communications protocol on Ethernet or Token Ring architectures to identify the NIC on the network

24
Q

Process of auditing and tracking changes to the trusted computing base

A

configuration management identifies controls and changes to the hardware, software, firmware changes throughout the lifecycle of an infrastructural asset

25
Q

Four majors aspects of configuration management

A

configuration identification, configuration control, configuration status accounting, configuration auditing

26
Q

media controls

A

labeling, handling, storage, and disposal of storage media

27
Q

system controls

A

restrict the execution of instructions that can only be executed when the operating system is only running in supervisor or privileged mode

28
Q

input and output controls

A

programming the application to accept only restricted and specific values as input to prevent errors and misuse by manipulation

29
Q

Preventing conflict of interests and collusion

A

separation of duties

30
Q

evaluating information to identify vulnerabilities, threats, risks, issues

A

due diligence

31
Q

when an organization has taken the necessary steps to protect its organization, resources, and people

A

due care

32
Q

Which class of IP network addresses has a value between 128 and 191 for the first octet?

A

Class B

33
Q

Class B address class range

A

128 - 191

34
Q

Class A address class range

A

0 - 126

35
Q

Class C address class range

A

192-223

36
Q

Class D address class range

A

224 - 239

37
Q

Class E address class range

A

240 - 255

38
Q

What is the 127 network address used for

A

loopback

39
Q

Class A binary

A

the leftmost bit is zero

40
Q

Class B binary

A

all addresses in binary start with 10

41
Q

Class C binary

A

all addresses in binary start with 110

42
Q

Class D binary

A

all addresses in binary start with 1110

43
Q

Class E binary

A

all addresses in binary start with 11110

44
Q

When are exigent circumstances used?

A

When evidence may be destroyed; police can seize the evidence before its destruction without a warrant and the judge will decide later if the seizure was proper and if the evidence can be admitted in court

45
Q

Suppression substance for fire involving wood, paper, laminates

A

water and soda acid; Class A fire - soda acid removes the fuel while water reduces the temperature

46
Q

Suppression substance for Class B and C fires

A

Class B or C fires; B has liquids: petroleum products and coolants; C has electrical equipment and wiring; Suppress with halon and carbon dioxide - used in unattended facilities because it is harmful to humans - CO2 is corrosive and not to be used in computer facility fire suppression systems

47
Q

less intrusive biometrics access control

A

voice print; fingerprint can be used by law enforcement; iris and retinal scans seem more invasive

48
Q

easiest password type to remember

A

passphrase; static is more difficult because the passphrase can be a full sentence

49
Q

dynamic password

A

software generated password

50
Q

synchronous dynamic password

A

must be used within a fixed timeframe

51
Q

asychronous dynamic password

A

does not need to fit in a fixed timeframe