Security Controls for Communication and Collaboration Flashcards

1
Q
Sending SPAM via IM is known as \_\_\_\_\_\_\_\_\_\_\_\_\_\_. 
A. Spimming 
B. Phishing 
C. Pharming 
D. Escalating
A

A. Spimming is sending spam over IM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
You have just completed a port scan of a computer and have identified that TCP port 31337 is open. What application is possibly running on the remote system? 
A. pcAnywhere 
B. Timbuktu 
C. Back Orifice 
D. NetBus
A

C. Back Orifice uses port 31337.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following is similar to RDP but is designed specifically for Apple products? 
A. Citrix 
B. pcAnywhere 
C. Back Orifice 
D. Presence
A

D. Presence is similar to RDP but is designed to be used with Apple products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
You are examining mail services and have discovered that TCP port 110 is open. What service is most likely active? 
A. POP 
B. SNMP 
C. SMTP 
D. IMAP
A

A. POP makes use of TCP port 110 by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
VoIP phones are more susceptible to \_\_\_\_\_\_\_\_\_\_\_\_\_\_ than traditional phone systems. 
A. Power outages 
B. Cost increases 
C. Legal intercept 
D. Slamming and cramming
A

A. VoIP phones offer many advantages. One disadvantage is that a power outage can bring the VoIP system down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is defined as the variations in transmission delay that can cause packet loss and degraded VoIP call quality. 
A. Jitter 
B. Latency 
C. Wobble 
D. Noise
A

A. The variations in transmission delay that can cause packet loss and degraded VoIP call quality are known as jitter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following is an early example of a tunneling protocol that does not provide authentication or confidentiality? 
A. L2F 
B. IPsec 
C. PPTP 
D. L2TP
A

A. Layer 2 Forwarding (L2F) is an early example of a tunneling protocol that does not provide authentication or confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_\_ provides a MIME-based envelope structure used to bind SAML assertions to the payload. 
A. ebXML 
B. SOAP 
C. MIME 
D. HTTP
A

A. Electronic Business using Extensible Markup Language (ebXML) provides a MIME-based envelope structure used to bind SAML assertions to the payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is a protocol specification for exchanging structured information in the implementation of web services in computer networks. 
A. ebXML 
B. SOAP 
C. MIME 
D. HTTP
A

B. Simple Object Access Protocol (SOAP) is a protocol specification for exchanging structured information in the implementation of web services in computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The purpose of ______________ was to create a standardized access control mechanism with XML. A. XACML
B. SOAP
C. MIME
D. SAML

A

A. The purpose of Extensible Access Control Markup Language (XACML) was to create a standardized access control mechanism with XML.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is an XML-based open standard designed for authentication and authorization between security domains. 
A. XACML 
B. SOAP 
C. MIME 
D. SAML
A

D. Security Assertion Markup Language (SAML) is an XML-based open standard designed for authentication and authorization between security domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following is not one of the three main classes of QoS integrated (IntServ) services? 
A. Best 
B. Averaged 
C. Controlled 
D. Guaranteed
A

B. IntServ provides three main classes of service that an application can request: guaranteed services, controlled load, and best effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which remote access protocol has the advantage of better management of mobile users? 
A. Sesame 
B. RADIUS 
C. Kerberos 
D. Diameter
A

D. Diameter has the advantage of better management of mobile users compared to the others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sending SPAM via VoIP is known as ______________. A. SPIT
B. Phishing
C. Split
D. Escalating

A

A. Spam over Internet Telephony (SPIT) is the name given to spam over VoIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
You are examining mail services and have discovered that TCP port 25 is open. What service is most likely active? 
A. POP 
B. SNMP 
C. SMTP 
D. IMAP
A

C. Simple Mail Transfer Protocol (SMTP) makes use of TCP port 25 by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Jerry has discovered small, unknown charges on his phone bill. What has most likely occurred? 
A. Slamming 
B. Phreaking 
C. Cramming 
D. Pharming
A

C. Cramming is the process of placing small, unknown charges on a user’s phone bill.

17
Q
Phreaking is most closely associated with which of the following? 
A. Instant messaging 
B. Data networks 
C. Telephony 
D. Videoconferencing
A

C. Phreaking predates computers and is associated with phone hacking.

18
Q
Which of the following mail services is optimized for mobile users? 
A. POP 
B. SNMP 
C. SMTP 
D. IMAP
A

D. Internet Message Access Protocol (IMAP) is optimized for mobile users.

19
Q
Geolocation data would most likely be found in which of the following? 
A. Word documents 
B. Photographs 
C. PDFs 
D. Spreadsheets
A

B. Geolocation data is typically saved by most modern smartphones whenever a picture is taken.

20
Q
Which of the following would be an appropriate asset disposal technique for a hard drive? 
A. Delete all files. 
B. Erase the drive. 
C. Perform a seven-pass drive wipe. 
D. Format the drive.
A

C. Information stored on decommissioned equipment must be sanitized. A seven-pass drive wipe is one appropriate technique.

21
Q
At what stage in a software or project’s development life cycle do you evaluate whether certain criteria have been met before the next phase will be started? 
A. Development/Acquisition 
B. Initiation 
C. Maintenance 
D. Testing and evaluation
A

D. The purpose of the testing and evaluation stage of the project’s development life cycle is to evaluate whether the current stage’s criteria have been met.

22
Q
What tool might be handy to identify a hidden infrared camera? 
A. Lock picks 
B. Fuzzer 
C. Smartphone 
D. SCAP scanner
A

C. Most smartphone cameras are able to “see” and present the illuminating light from IR cameras.

23
Q
What is the practice called when someone connects their laptop device through their cellular phone’s data plan to browse the Internet? 
A. Tethering 
B. Buckling 
C. Bridging 
D. Spectrum hopping
A

A. Tethering means to share connectivity from one device connected to the Internet provider to multiple other devices. This results in greater data consumption and as a result does not sit well with cellular data providers.