Study 6 Flashcards

1
Q

SP800-61

A

Incident Handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NTP Network Time Protocol

A

Port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Inculpatory

A

to prove they did it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exculpatory

A

to prove they did NOT DO it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Best Evidence

A

Original files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Direct Evidence

A

from a witness sense ( needs backup)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Real Evidence

A

something you can touch= , Fingerprint, gun

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Demonstrative Evidence

A

reenactment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Corroborative Evidence

A

any supported Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Conclusive Evidence

A

stands on it own, (Video)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Circumstantial Evidence

A

like a blood trial of blood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Documentary Evidence

A

(hearsay Rule) paper documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Documentary Evidence

A

(hearsay Rule) paper documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the five key principle that forms the core of the COBIT5 framework?

A

1) Meeting Stakeholders needs,
2) Covering the enterprise end to end,
3) Apply a single integrated framework,
4) Enabling a holistic approach,
5) Separating governance from management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the five key principle that forms the core of the COBIT5 framework?

A

1) Meeting Stakeholders needs,
2) Covering the enterprise end to end,
3) Apply a single integrated framework,
4) Enabling a holistic approach,
5) Separating governance from management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

many security products begin the process of generating a pseudorandom key by having the user tap random keys on a keyboard or randomly moving the mouse. Such activity is known as ?

A

entropy.

17
Q

pseudorandom

A

randomness

18
Q

is the marriage of object-oriented and relational technologies combining the attributes of both?

A

object-relational database

19
Q

is common in all major software vendors and is important to maintaining a trusted computing platform.

A

Code Signing

20
Q

Looks for sequences of bit called signature that are typical malware programs.

A

Scanners

21
Q

Defend against malware by appending sections of themselves to files – sometime in the same way Malware append themselves. it continuously check a file for changes and report changes as possible malware behavior.

A

Immunizers

22
Q

Focus on detecting potential abnormal behavior such as writing to the boot sector or the master boot record, or making changes to executable files. It can potentially detect malware at an early stage. Most hardware based anti-malware mechanism are based on this concept.

A

Behavior Blocker

23
Q

interpret DoS and read-only memory (ROM) BIOS calls, looking for malware like actions.

A

Active monitor

24
Q

are simulated environments to which IDSs seamlessly transfer detected attackers and are designed to convince an attacker that the attack is going according to the plan.

A

Padded cells

25
Q

In this Block Cipher method of encryption, a single bit change in the plain text results in multiple changes permutated throughout the rest of the encryption cycles so in the end, the ciphertext has completely changed.

A

Diffusion