Security Controls for Communication and Collaboration Flashcards
Sending SPAM via IM is known as \_\_\_\_\_\_\_\_\_\_\_\_\_\_. A. Spimming B. Phishing C. Pharming D. Escalating
A. Spimming is sending spam over IM.
You have just completed a port scan of a computer and have identified that TCP port 31337 is open. What application is possibly running on the remote system? A. pcAnywhere B. Timbuktu C. Back Orifice D. NetBus
C. Back Orifice uses port 31337.
Which of the following is similar to RDP but is designed specifically for Apple products? A. Citrix B. pcAnywhere C. Back Orifice D. Presence
D. Presence is similar to RDP but is designed to be used with Apple products.
You are examining mail services and have discovered that TCP port 110 is open. What service is most likely active? A. POP B. SNMP C. SMTP D. IMAP
A. POP makes use of TCP port 110 by default.
VoIP phones are more susceptible to \_\_\_\_\_\_\_\_\_\_\_\_\_\_ than traditional phone systems. A. Power outages B. Cost increases C. Legal intercept D. Slamming and cramming
A. VoIP phones offer many advantages. One disadvantage is that a power outage can bring the VoIP system down.
\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is defined as the variations in transmission delay that can cause packet loss and degraded VoIP call quality. A. Jitter B. Latency C. Wobble D. Noise
A. The variations in transmission delay that can cause packet loss and degraded VoIP call quality are known as jitter.
Which of the following is an early example of a tunneling protocol that does not provide authentication or confidentiality? A. L2F B. IPsec C. PPTP D. L2TP
A. Layer 2 Forwarding (L2F) is an early example of a tunneling protocol that does not provide authentication or confidentiality.
\_\_\_\_\_\_\_\_\_\_\_\_\_\_ provides a MIME-based envelope structure used to bind SAML assertions to the payload. A. ebXML B. SOAP C. MIME D. HTTP
A. Electronic Business using Extensible Markup Language (ebXML) provides a MIME-based envelope structure used to bind SAML assertions to the payload.
\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is a protocol specification for exchanging structured information in the implementation of web services in computer networks. A. ebXML B. SOAP C. MIME D. HTTP
B. Simple Object Access Protocol (SOAP) is a protocol specification for exchanging structured information in the implementation of web services in computer networks.
The purpose of ______________ was to create a standardized access control mechanism with XML. A. XACML
B. SOAP
C. MIME
D. SAML
A. The purpose of Extensible Access Control Markup Language (XACML) was to create a standardized access control mechanism with XML.
\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is an XML-based open standard designed for authentication and authorization between security domains. A. XACML B. SOAP C. MIME D. SAML
D. Security Assertion Markup Language (SAML) is an XML-based open standard designed for authentication and authorization between security domains.
Which of the following is not one of the three main classes of QoS integrated (IntServ) services? A. Best B. Averaged C. Controlled D. Guaranteed
B. IntServ provides three main classes of service that an application can request: guaranteed services, controlled load, and best effort.
Which remote access protocol has the advantage of better management of mobile users? A. Sesame B. RADIUS C. Kerberos D. Diameter
D. Diameter has the advantage of better management of mobile users compared to the others.
Sending SPAM via VoIP is known as ______________. A. SPIT
B. Phishing
C. Split
D. Escalating
A. Spam over Internet Telephony (SPIT) is the name given to spam over VoIP.
You are examining mail services and have discovered that TCP port 25 is open. What service is most likely active? A. POP B. SNMP C. SMTP D. IMAP
C. Simple Mail Transfer Protocol (SMTP) makes use of TCP port 25 by default.
Jerry has discovered small, unknown charges on his phone bill. What has most likely occurred? A. Slamming B. Phreaking C. Cramming D. Pharming
C. Cramming is the process of placing small, unknown charges on a user’s phone bill.
Phreaking is most closely associated with which of the following? A. Instant messaging B. Data networks C. Telephony D. Videoconferencing
C. Phreaking predates computers and is associated with phone hacking.
Which of the following mail services is optimized for mobile users? A. POP B. SNMP C. SMTP D. IMAP
D. Internet Message Access Protocol (IMAP) is optimized for mobile users.
Geolocation data would most likely be found in which of the following? A. Word documents B. Photographs C. PDFs D. Spreadsheets
B. Geolocation data is typically saved by most modern smartphones whenever a picture is taken.
Which of the following would be an appropriate asset disposal technique for a hard drive? A. Delete all files. B. Erase the drive. C. Perform a seven-pass drive wipe. D. Format the drive.
C. Information stored on decommissioned equipment must be sanitized. A seven-pass drive wipe is one appropriate technique.
At what stage in a software or project’s development life cycle do you evaluate whether certain criteria have been met before the next phase will be started? A. Development/Acquisition B. Initiation C. Maintenance D. Testing and evaluation
D. The purpose of the testing and evaluation stage of the project’s development life cycle is to evaluate whether the current stage’s criteria have been met.
What tool might be handy to identify a hidden infrared camera? A. Lock picks B. Fuzzer C. Smartphone D. SCAP scanner
C. Most smartphone cameras are able to “see” and present the illuminating light from IR cameras.
What is the practice called when someone connects their laptop device through their cellular phone’s data plan to browse the Internet? A. Tethering B. Buckling C. Bridging D. Spectrum hopping
A. Tethering means to share connectivity from one device connected to the Internet provider to multiple other devices. This results in greater data consumption and as a result does not sit well with cellular data providers.