Quiz 2 Flashcards
Which of the following is not a denial-of-service attack?
Exploiting a flaw in a program to consume 100 percent of the CPU
Sending malformed packets to a system, causing it to freeze
Performing a brute-force attack against a known user account
Sending thousands of emails to a single address
Performing a brute-force attack against a known user account
Why is spam so difficult to stop?
filters are ineffective at blocking inbound messages.
The source address is usually spoofed.
It is an attack requiring little expertise.
Spam can cause denial-of-service attacks.
The source address is usually spoofed.
Which of the following is not a benefit of NAT?
Hiding the internal IP addressing scheme
Sharing a few public Internet addresses with a large number of
internal clients
Using the private IP addresses from RFC 1918 on an internal
network
filtering network traffic to prevent brute-force attacks
filtering network traffic to prevent brute-force attacks
Which of the following can prevent e-mail spoofing? Pretty good privacy Point-to-point protocol Microcom networking protocol Password authentication protocol
Pretty good privacy
Countermeasures against sniffers do not include which of the
following?
Using recent version of secure shell protocol.
Applying end-to-end encryption.
Using packet filters.
Implementing robust authentication techniques.
Using packet filters.
A virtual private network (VPN) cannot provide or improve which of the following security services? Availability Confidentiality Integrity Replay protection
Availability
In a distributed computing environment, system security takes on
an important role. Two types of network attacks exist: passive and
active. Which of the following is an example of a passive attack?
Attempting to log in to someone else’s account
Installing a wiretap on a network cable to generate false
messages
Denying services to legitimate users
Sniffng a system password when the user types it
Sniffng a system password when the user types it
Which of the following cannot protect non-IP protocols? IPsec PPTP L2TP L2F
IPsec
A major risk involving the use of packet-switching networking is that:
It is possible that some packets can arrive at their destinations
out of sequence.
It is not possible to vary the routing of packets depending on
network conditions.
Terminals attached to a public data network may not have
enough intelligence.
Terminals attached to a public data network may not have
enough storage capacity.
It is possible that some packets can arrive at their destinations
out of sequence.
Frame relay and X.25 networks are part of which of the following? Circuit-switched services Cell-switched services Packet-switched services Dedicated digital services
Packet-switched services
What is it called when email itself is used as an attack mechanism? Masquerading Spoofing Mail-bombing Smurf attack
Mail-bombing
What are the two common data classification schemes? Military and private sector Personal and government Private sector and unrestricted sector Classified and unclassified
Military and private sector
When seeking to hire new employees, what is the first step? Create a job description. Set position classification. Screen candidates. Request resumes
Create a job description.
Which of the following is a primary purpose of an exit interview?
To return the exiting employee’s personal belongings
To review the nondisclosure agreement
To evaluate the exiting employee’s performance
To cancel the exiting employee’s network access accounts
To review the nondisclosure agreement
Which of the following statements is not true?
IT security can provide protection only against logical or technical
attacks.
The process by which the goals of risk management are achieved is
known as risk analysis.
Risks to an IT infrastructure are all computer based.
An asset is anything used in a business process or task.
Risks to an IT infrastructure are all computer based.
When a safeguard or a countermeasure is not present or is not sufficient, what remains? Vulnerability Exposure Risk Penetration
Vulnerability
How is single loss expectancy (SLE) calculated?
Threat + vulnerability
Asset value ($) * exposure factor
Annualized rate of occurrence * vulnerability
Annualized rate of occurrence * asset value * exposure factor
Asset value ($) * exposure factor
How is the value of a safeguard to a company calculated?
- ALE before safeguard – ALE after implementing the safeguard –annual cost of safeguard
- ALE before safeguard * ARO of safeguard
- ALE after implementing safeguard – annual cost of safeguard – controls gap
- Total risk – controls gap
ALE before safeguard – ALE after implementing the safeguard – annual cost of safeguard
Which of the following methods for handling risk involves a third party? Accepting Risk Eliminating risk Reducing risk Transferring risk
Transferring risk
Which of the following assists in complying with others? Policy Procedure Standard Guideline
Procedure
Which of the following is not the major reason for conducting risk
assessment?
It is a good security practice.
It is required by law or regulation.
It is integrated into the system development life-cycle process.
It supports the business objectives.
It is required by law or regulation.
Which of the following is not a goal of the risk management
evaluation and assessment process in ensuring that the system
continues to operate in a safe and secure manner?
Implement a strong configuration management program.
Monitor the system security on a continuous basis.
Eliminate all potential threats, vulnerabilities, and risks to the
system.
Track findings from the security control assessment process.
Eliminate all potential threats, vulnerabilities, and risks to the
system.
Which of the following is not a goal of IT security? Confidentiality Availability Integrity Aggregation
Aggregation
Risk management is a major priority of the SPK Company. The
following data has been collected for one asset in the company: Natural
threats are realized once every five years. The total asset value is
$1,000,000. Every time a threat causes damage, it cost the company an
average of $100,000. The company has the choice of getting insurance
for $10,000 per year or moving to a new location that will be a onetime
cost of $35,000. The SPK priorities in the risk management strategy
are accuracy and long-term repeatability of process.
What can be done with the residual risk?
It can be either reduced or calculated.
It can be either identified or evaluated.
It can be either assigned or accepted.
It can be either exposed or assessed
It can be either assigned or accepted.
Risk management is a major priority of the SPK Company. The
following data has been collected for one asset in the company: Natural
threats are realized once every five years. The total asset value is
$1,000,000. Every time a threat causes damage, it cost the company an
average of $100,000. The company has the choice of getting insurance
for $10,000 per year or moving to a new location that will be a onetime
cost of $35,000. The SPK priorities in the risk management strategy
are accuracy and long-term repeatability of process.
Which of the following is not part of risk analysis?
Assets
Threats
Vulnerabilities
Countermeasures
Countermeasures
Risk management is a major priority of the SPK Company. The
following data has been collected for one asset in the company: Natural
threats are realized once every five years. The total asset value is
$1,000,000. Every time a threat causes damage, it cost the company an
average of $100,000. The company has the choice of getting insurance
for $10,000 per year or moving to a new location that will be a onetime
cost of $35,000. The SPK priorities in the risk management strategy
are accuracy and long-term repeatability of process.
The costs and benefits of security techniques should be measured in
monetary terms where possible. Which of the following is the most
effective means to measure the cost of addressing relatively frequent
threats?
Single-occurrence losses
Annual loss expectancy
Fatal losses
Catastrophic losses
Annual loss expectancy
In systems utilizing a ring protection scheme, at what level does the security kernel reside? Level 0 Level 1 Level 2 Level 3
Level 0
Which one of the following is not part of the change management process? Request control Release control Configuration audit Change control
Configuration audit
What transaction management principle ensures that two transactions
do not interfere with each other as they operate on the same data?
Atomicity
Consistency
Isolation
Durability
Isolation
Which of the following areas of software conguration management (SCM) is executed last? Identication Change control Status accounting Audit
Audit
Which of the following is an example of input validation error? Access validation error Congfiguration error Buffer overflow error Race condition error
Buffer overflow error
What term is used to describe code objects that act on behalf of a user and operate in an unattended manner? Agent Worm Applet Browser
Agent
Which of the following protocols use many network ports? SNMP and SMTP TCP and UDP ICMP and IGMP ARP and RARP
TCP and UDP
Which one of the following firewalls is simple, inexpensive, and quick to implement? Static packet lter rewall Dynamic packet lter rewall Application gateway rewall Stateful inspection gateway rewall
Static packet filter firewall
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ firewalls are known as third-generation firewalls. Application-level gateway Stateful inspection Circuit-level gateway Static packet-filtering
Stateful inspection
By examining the source and destination addresses, the application
usage, the source of origin, and the relationship between current
packets with the previous packets of the same
session,_______________ firewalls are able to grant a broader range
of access for authorized users and activities and actively watch for and
block unauthorized users and activities.
Static packet-filtering
Application-level gateway
Stateful inspection
Circuit-level gateway
Stateful inspection
Which of the following protocols are used by email clients to retrieve
email messages from an email server? Check all that apply.
POP3
SMTP
IMAP
POP3
IMAP
Which of the following mechanisms can reduce the risk of collusion? Check all that apply. Pick 2. Background checks Separation of duties Job rotation Nondisclosure agreements
Separation of duties
Job rotation
Which one of the following methods puts a system into a high level of security upon detection of a failure? Limit Checks Fail Secure Fail Open
Fail Secure
Risk management activities are performed for periodic system reauthorization in which of the following system development life cycle (SDLC) phases? Initiation Development/Acquisition Implementation Operation/maintenance
Operation/maintenance