Security Flashcards

1
Q

Which term is used in reference to the process of identifying an individual?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which term is used in reference to the process in which a user is identified via a username and password?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which term is used in reference to the process of giving individual access to a system or resource?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which term is used in reference to the process of keeping track of a users activity?

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which term is used in reference to the process that prevents someone from denying that she accessed a resource?

A

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a secret numeric password used for authentication?

A

Pin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why type of electronic document contains a public key?

A

Digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which item is roughly the size of a credit card and allows access to a network and its resources?

A

Smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of authentication method identifies and recognizes people based on physical traits such as fingerprints ?

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which authentication type is the default for active directory ?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which directory service is used with windows domains?

A

Active directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of server runs active directory ?

A

Domain controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When you access permissions to a folder, you should first grant permissions to _____ rather than users.

A

Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When you create a local user on a computer running in Windows 7, where is the user account stored?

A

SAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of group can be granted rights and permissions?

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following authorizes a user to perform certain actions in Windows, such as logging on or performing a backup?

A

Right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When you grant access to print to a printer, which of the following are you granting?

A

Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In which of the following locations are users and permissions stored for an NFTS folder?

A

Registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which type of permissions are assigned directly to a file or folder?

A

Explicit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is the process of converting data into a format that cannot be read by another user?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which authentication method sends the username and password in plain text?

A

PAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In Windows, which of the following is used to enable auditing?

A

NTCS permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

By default, the _____ group has full access to all resources within a domain.

A

Domain admins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

_______ allows you to log on once and access multiple related by different systems without having to log on again

A

Single sign on (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following is the most common form of authentication?

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is true of using passwords ?

A

You should create a strong password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following best describes a password that is at least seven characters long and uses three of the following categories (uppercase, lowercase, numbers, and special characters)?

A

Complex password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is used to define the length of a password in Windows ?

A

Group policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following is not a complex password?

A

John!taylor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which settings are used to keep track of incorrect login attempts and lock the account if too many attempts are detected within a certain set time?

A

Account lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which setting is used to prevent users from reusing the same the same password over and over?

A

Password history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which setting forces users to change their passwords?

A

Maximum password age

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which type of attack tries to guess passwords by trying common words?

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which type of attack tried to guess passwords by every combination of characters?

A

Brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which malicious software captures every keystone and sends it to a hacker?

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which type of software can you use to view usernames and passwords broadcasted over the network?

A

Sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following is the generally accepted minimum password length?

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following are the only passwords that should not expire?

A

Service accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following should users do not do when dealing with passwords?

A

Write down your password in a piece of paper and keep it near your computer

Do not use names of children and pets

Do not give your password to your co-workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Describe what might happen if you require passwords to be too long

A

User will try to circumvent the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What limits how fast a password for an encrypted file is cracked?

A

The speed of your computer, particularly your processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What steps can you do to prevent someone from hacking your password?

A

Use strong passwords and change them frequently.

43
Q

What is used to prevent someone from guessing a password multiple times?

A

Account lockout settings

44
Q

Which type of device device isolated by filtering the packets that can enter it?

A

Firewall

45
Q

Which seven layer model is often used to describe networking technologies and services?

A

OSI

46
Q

On which OSI layer do routers function?

A

3

Network layer

47
Q

On which OSI layer do TCP and UDP function?

A

4

transport layer

48
Q

Which OSI layer is used by switches and bridges?

A

2

Data link layer

49
Q

Which port is used by smtp?

A

25

50
Q

Which port is used by LDAP?

A

389

51
Q

Which type of firewall filters packets based on IP address and ports?

A

Packet-filtering

52
Q

Which type of firewall is also known as a proxy server?

A

Application-level

53
Q

Which type of firewall looks at the previous conversations to determine if a packet should enter a network?

A

Stateful

54
Q

Which type of DoS attack uses large ICMP packets to cause an overflow of the memory buffers allocated for packets ?

A

Ping of death

55
Q

Which technology can be used to isolate a network of servers so that they cannot interact with other servers?

A

VLAN

56
Q

Which type of device looks at a packet and forwards it based on its destination IP address?

A

Router

57
Q

Which type of routing protocol sends the entire routing table to its neighbors?

A

Distance vector

58
Q

Which type of system detects unauthorized intruders and then takes action to stop them from proceeding ?

A

IPS

59
Q

Which type of server can be used to trap a hacker?

A

Honeypot

60
Q

Which special area serves as a buffer area between the internet and the internal network and can be used to hold web servers that are accessed from the internet?

A

DMZ

61
Q

How many firewalls should be used to create a sandwich DMZ?

A

2

62
Q

You administer several internet web servers that need to communicate with a SQL server. Where should the SQL server be placed?

A

Internal network

63
Q

Which of the following servers should not be placed on the DMZ?

A

Email mailbox servers

64
Q

Which technology allows a user at home to connect to the corporate network?

A

VPN

65
Q

Which IPSec protocol provides integrity protection for packet headers, data, and user authentication but does not encrypt the data load?

A

AH

Authentication header

66
Q

Which type of malware can copy itself and infect a computer without the users consent or knowledge?

A

Virus

67
Q

Which type of self-replicating program copies itself to other computers on a network without any user intervention and consumes bandwidth and computer resources?

A

Worm

68
Q

Which type of malware looks like a useful or desired executable programs but is in reality program that is supposed to cause harm to your computer or steal information from your computer?

A

Trojan horse

69
Q

Which type of malware collects your personal information or details about your browsing habits without your knowledge?

A

Spyware

70
Q

Which type of malware provides administrator level control over a computer system?

A

Root kit

71
Q

Which software component defends against spyware ?

A

Windows defender

72
Q

Which term is used in reference to a message warning you to delete an essential windows file?

A

Virus hoax

73
Q

Which server can be used to install windows updates for your organization?

A

WSUS

Windows server update service

74
Q

Which term is used in reference to multiple windows updated that have been packaged together as one installation and are well tested ?

A

Service packs

75
Q

Which windows feature notifies you when something tries make changes to your computer without your knowledge?

A

User account control

UAC

76
Q

Which host firewall is included with Windows 10?

A

Windows firewall

77
Q

Which term is used in reference to unsolicited junk email?

A

Spam

78
Q

Which email validation system is designed to stop spam that uses source address spoofing?

A

Sender policy framework

79
Q

Which of the following are spammers and hackers looking for when they want to send email through your network?

A

Open smtp servers

80
Q

Which tab internet explorer settings is used to delete history and cookies?

A

General

81
Q

Which internet explorer zone is the least secure ?

A

Local intranet zone

82
Q

Which technique is used to send you to a fake, but realistic-looking, website to verify your account information?

A

Phishing

83
Q

____ is software that is designed to infiltrate or affect a computer system without the owners informed consent.

A

Malware

84
Q

A _________ is program that provides a user with remote, unauthorized control or a system or unities an unauthorized task.

A

Backdoor

85
Q

Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A

Confidentiality

86
Q

Which technology is not used to implement confidentiality?

A

Auditing

87
Q

Which of the following ensures data is not changed when it not supposed to be?

A

Integrity

88
Q

Which of the following is not a response when dealing with a risk?

A

Patching

89
Q

Which the following terms is used in reference to the security discipline that requires that a user is given no more privilege than what is deemed necessary to perform his job?

A

Principle of least privilege

90
Q

Which of the following terms is used in reference to a scope that hacker can use to break into a system ?

A

Attack surface

91
Q

Which of the following method whereby a hacker relies on the trusting nature of the person being attacked?

A

Social engineering

92
Q

Which of the following is considered the most effective way to protect against social engineering?

A

Employee awareness

93
Q

Which of the following is necessary to highly secure a system ?

A

More money

94
Q

Which of the following is the first line of defense when setting up a network ?

A

Physically secure the network

95
Q

Which concept determines what resources users can access after they log on?

A

Access control

96
Q

Which of the following is used to provide protection when one line of defense is breached?

A

Defense in depth

97
Q

Which of the following is used to identify a person before giving access ?

A

Authentication

98
Q

Which of the following is used to verify that an administrator is not accessing data that he should not be accessing?

A

Auditing

99
Q

Which type of device can be easily lost or stolen or can be used for espionage ?

A

Removable devices

100
Q

Which of the following is a physical or logical device used to capture keystrokes ?

A

Keylogger

101
Q

In dealing with risks, which response is accomplished when you or your organization purchased insurance to protect your bottom line when such a disaster or threat is realized?

A

Risk transfer

102
Q

A _____ is generally defined as the probability that an even will occur that can cause harm to a computer system, service or network.

A

Risk

103
Q

Throughout the past couple of years small _________ have been one of the largest challenges facing security professionals.

A

Mobile devices

104
Q

What do the initials CIA stand for in relation to security?

A

Confidentiality, integrity and availability