Study This Flashcards

1
Q

If risks were categorized as either critical or normal, what risk assessment method is being used?

A

Qualitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What risk assessment method produces number results

A

Quantitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What document is intended to help deal with potential issues and conflict among partners

A

BPA

Business partner agreement addresses things like ownership, profits, losses and partner contributions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a more threat centered security program look like?

A

Focusing on understanding adversaries motivations and capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is characterized as an attempt to gain access to a systems resource

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What document defines the technical security requirements associated with two orgs and who are connecting their information systems /network?

A

Interconnection security agreement, ISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When do we normally build a risk matrix

A

Qualitative risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A developer composes a document that details all the entry points through which an attacker could attempt to introduce code into the app environment, what does this document represent

A

Attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Single loss expectancy equals (=) assets values times (x) exposure factor

A

The percentage of an asset that is lost due to a threat event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the minimum and customary practice of responsible protection of information assets is defined by which of the following terms?

A

Due care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Of two people are working together and we are concerned about collusion, what is performed?

A

Rotation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a central characteristic of accountability

A

A systems ability to determine the actions and behavior a single individual within a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the opposite of the CIA triad

A

Disclosure, alteration and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Report assessing design, suitability and effectiveness for a service organization security controls over a period of time

A

SOC 2 type 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What term is primarily concerned with enumerating an understanding the various ways an adversary might negatively impact the security of an application slated for development

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Policies standers guidelines in security awareness training fall under which of the following control categories

A

Directive controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What principal Requires multiple individuals authorization in order to carry out a particularly critical function

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security incident can be thought of in which of the following terms?

A

Confidentiality, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following terms describes the right to protect the expression of ideas

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When calculating the cost of risk I need to look for two factors which of the following choices one of these factors

A

Single loss expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your organization just discovered an incident in which PII looks to have been accessed But not ex filtrated. What should you do

A

Disclosure within 72 hours of the incident discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What document would be used to ensure that the IT department meeting is contractual obligations with the audit team

A

Ola

Operating level agreement which is an internal agreement that supports the SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

And quantitative risk management single loss expectancy is used to quantify what

A

The amount of financial impact that would result if a breach occurred that impacted an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Prior to excepting a risk what has most likely occurred

A

Risk mitigation
There will always be a residual risk even if mitigating counter measures are leveraged. Either this occurs explicitly and formally or risk is accepted implicitly by choosing not to employ additional avoidance, transfer, or mitigation measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which ISO information security standard focuses on auditing

A

27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which type of technology would be best suited to help monitor and possibly even bolster the security of a SaaS Solutions being used by on premise employees

A

CASB
Cloud access security brokers are on premise or cloud base security policy enforcement points, place between cloud service consumers and cloud service providers to combine an interject enterprise security policies as cloud base resources are accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Identifying and labeling all personally identifiable information would be example of what

A

Data classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What process customizes a standard for an organization, beginning with scoping, then adding compensating controls with parameters ( security configuration settings) 

A

Tailoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What process determines the applicable portions of a standard that must be followed by organization

A

Scoping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is considered nonvolatile memory

A

ROM
Read only memory is nonfilel storage where locations can be directly access in basic implementation. Data cannot be altered dynamically. Nonfiled storage retains this information even when the computer loses power, and can be used to boot the system.

Both dynamic ram static ram are volatile memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Senior manager has grown particularly concerned about the potential for breach of PII data. Which of the following controls is most directly applicable to their concern

A

DLP
Data loss prevention tools and software filter data streams on networks, control and monitor and point activities, and monitor data in the cloud. DLP tools protect data and use data in motion and data at rest. Data loss prevention programs also feature reporting, which aids both and identifying anomalies and problems for forensic response and in meeting audit in routine compliance requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is true about dynamic ram

A

DRAM Data is rewritten multiple times each second

Hint, dynamic RAM 
It is always being rewritten hence dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are small extremely fast storage locations directly accessible to the CPU?

A

Registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which organization managers request for comments RFCs

A

IETF

Request for comments RFC‘s are managed by the Internet engineering task force (IETF) 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which role sets that information security priorities and supports the mission of the organization

A

Business owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following choices is also referred to as flash memory

A

Electronically erasable programmable read only memory(EEPROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which method of media sanitation is performed the other local device interface, but could still potentially loud data recovery through other advanced recovery methods

A

Clear

Clearing is done locally via the device interface (the operating system) .
Data are not recoverable the other device in her face but I may be recoverable the advanced recovery methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which ISO information security standard focuses on best practices

A

27002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Electronic versions courseware from your favorite security training organization plays technology that limit your ability to add your own notes to the files. The files also incorporate a unique identifier that can assist in determining the source of copyrighted information having been pirated. What type of technology are they using

A

DRM

Digital rights management is a sweet of technology designed to protect copyrighted digital media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

All types of programmable read only memory are actually special cases of a more general sort of technology

A

Programmable logic device (PLD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What I associate was formally known as ISO 17799

A

ISO 27002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the best way to remove data from right once read many (worm) media

A

Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

When comparing DRAM AND SRAM. Which of the following statements is true

A

Dram is slower than sram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What term describes writing data to an EEPPROM

A

flashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the best method to secure lead astray data on a DVD – r

A

Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What role crazy manager sensitive data

A

Data controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What role is in charge of computer hardware and software design, plans, and updates

A

System owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is a set of memory addresses managed by the OS that do not correspond directly to physical memory

A

Virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What refers to the computer’s capability to execute instructions in parallel due to the usage multiple CPUs

A

Multi processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Low level commands that a CPU knows how to execute and performs many operations per instructions

A

CISC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The RSA algorithm uses what kind of intractable problem as the basis of its crypto system

A

Factoring certain large integers into their two prime factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of the following coordinates systems activities during execution of code

A

CPU control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What model deals with potential conflict of interested

A

Brewer nash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is a real time alternative to using CRL

A

OCSP

Online certificate status protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What term indicates the degrees of randomness

A

Entropy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Security model includes the no read up (simple security property) and no write down

A

Bell LaPadula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What security integrity model focuses on internal consistency, external consistency, will form transactions, separation of duties

A

Clark Wilson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which of the following ensures that previously captured communications are not decrypted if a session key is comprised

A

Perfect forward secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

which of the following performs the calculations or operations based on programs calls

A

CPU arithmetic logic unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Terms the deceives the CPUs ability to process more than one program at a time

A

Multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What’s a cutie model includes no re-down and no right up

Simples integrity

A

Biba

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is a common operating system protection that prevents one software application from affecting another software application if it crashes

A

Process isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is the term for copying memory data to a bd from hard disk

A

Page fault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is the terms when the OS Copies virtual memory from hard disk to main memory

A

Paging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What protocol do routers use to determine the path that should be taken by a packet

A

IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

When you see 1E4DB3 they’re dealing with which numbering system

A

Hex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What network storage technology does not allow block level access, abut allows reading/arriving entering files via a network

A

NAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What wireless protocol supports 54 mbps st 5 ghz

A

803.11 a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What allows you to uniquely identify a complete connection among all other connections on the internet

A

A socket pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which layer of the OSI model connects to the ohsucial part of the network with the Abstract pair

A

Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which layer of the OSI mod converts. It’s i to electric signals or light impulses for transmissions

A

Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which VOIP protocol is an application layer protocol used for communication signaling

A

SIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What technology separates a routers control plane from the data plane

A

Software defined networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Data encapsulation and the protocol stack work on which of the following ways

A

Each protocol or service at each layer in the OSI models adds its own information to the data as it is passed down the protocol stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Which of the following network devices blocks (ip) limited broadcast traffic by default

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What encryption method should be used to secure a wireless connection

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which wireless technology leverages battery powered radios and it’s commonly used for building automation and control

A

Zigbee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What IPsec method offers integrity and authentication but not confidentiality

A

Ah

Authentication header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Which wireless technology could be employees when there are concerns about significant electromagnetic interference

A

Li-fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What authentication mechanism exposes the password in plain text

A

PAP

Password authentication protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which layer of the OSI model converts bitch into electrical signals or light impulses for transmission

A

Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Which of the following layers of the OSI model handles establishment maintenance of connections between systems

A

Session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Which protocol to Rellis used to Termine the path that should be taken by a packet

A

IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Which network component should be used with there’s a concern about internal network sniffing

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

It is desire to have one layer to lan available on multiple switches in different countries so that each system can communicate directly using frames LA or two. What technology…

A

Vlan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What technology separates routers control plane from the data forwarding plane 

A

Software defined networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Which of the following is hopeful that work patchable soon to that shows each of the notes on a path between the local machine and a destination

A

Traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Which of the following is popular LAN based technology

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Which plaintext VOIP IP protocol is frequently used to transfer audio or video data

A

RTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What network storage technology does not allow black level access, but allows reading and writing entire files via network

A

NAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What is the measure of the when the system will be available to begin processing recovery work before being put back into a normalized production mode

A

Recovery time objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

RTO

A

Also means when the hardware, software and infrastructure are capable to start doing any necessary recovery work required before operations are resumed properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What is it called when the amount of data loss that is acceptable for a business function called?

A

RPO

recovery point objective

The dictates the amount of data that can be lost for a critical function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What is useful at protecting custom applications from common vulnerabilities (SQL injection, cross site scripting etc )

A

WAF

Web application firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What are the deployments available for WAF

A

Reverse proxy
Server install
Cloud hosted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What are WAF used for

A

Protection of an org public facing web apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Can WAF be used to increase the security of off the shelf web app?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What is an IPS used for

A

Blocks traffic

Rather than alerting, the IPS will block suspicious traffic

Can have false pos which can be a self imposed DoS condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Does a false positive on an IDS cause an availability issue?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What is the main emphasis of malware sandboxing?

A

Trying to render or execute files before passing the on, or personals providing a report after analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What prevents unknown/unlisted binaries from executing

A

application whitelisting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Antivirus software attempts to block what

A

Various forms of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What are some examples of malware

A

Virus
Worms
Trojan
Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What involves simply making use of data about adversaries to improve security operations

A

IOC

Indicators of compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Is an IDS a passive system?

A

Yes

It sends alerts when malicious act is an occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

NIDS has three fundamental designs

A

Signature based
Protocol Analysis
Anomaly based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

IDS Can operate in which two modes

A

Passive and active
Passive sends alerts but does not stop the attack
Active stops the attack usually be sending resets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Where does an IDS sit

A

On a network and sniffs traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

RFCs

A

Request for comments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

When are anomaly detection models used for

A

Small, well designed networks and in specific high risk cases

It alerts on anomalous behavior and is prone to false positives when behavior changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What monitoring focuses on data leaving the org, system or interface

A

Engross monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Monitoring oncoming traffic to an org or target system

A

Ingress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What does SIEm stand for

A

Security information and event management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What’s does a SEIM do

A

To deal with the volume and ease analysis of all the security related information and audit logs, a SEIM will go through all the logs and detect adversary tactics and problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

What builds a behavior oriented profile of activity for both users and systems

A

UEBA

user and entity behavior analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

What are some key monitoring tools?

A

IDS and SEIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

What type of logs can a SEIM Monitor

A

System/event logs
Web server logs
Firewall and proxy logs
And etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

What can be employed to ensure integrity of data remains

A

Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

By default do syslogs provide integrity features that can confirm authenticity of the logs

A

No it does not

A third party utility like syslogw-NG does

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Layer of OSI closest to the users and programs
Layer 7
Identification of communication partners
Determines security aspects of communication

A

Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Layer 6
Provides representation of information to be processed by the application
Provides translations services such as EBCDIC and ASCII
Performs data encoding, compression and decompression

A

Presentation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q
Layer 5
Organizes communication 
Management of data exchange 
Maintains the session 
Allows half duplex and full duplex
A

Session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q
Layer 4
Optimizes network service usage 
Uniquely identifies end points 
Maintain communication integrity 
Error detection
A

Transportation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q
Layer 3
Provides network addressing 
Performs touring and flow control 
Establishes network connection 
Provides network path 
IPv4
A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Layer 2
Formats messages to allow for transfer of physical media
Provides addressing for physical hardware
Ethernet or MAC addresses

A

Data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Layer 1
Provides mechanical and electric activation, maintenance and deactivation oh physical connections for transmissions
Defines the ohh oak means of communication
Determines requirements for signal transmission. Over physical medium

A

Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

What may be used to provide layer 2 authentication

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

What layer of the OSI model connects the physical part of the network with the abstract

A

Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

What DNS security protocol typically leverages browsers as the DNS client and provides increased confidentiality of DNS requests?

A

DoH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

What layer of the OSI model interacts with informs and prepares it to be transmitted across the network

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Dedicated security mode, this is not one

A

Systems handle multiple classification. Levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

What is two phase commit

A

Distributed database architecture that ensures that no transactions are finalized until all connected systems have successfully synchronize

133
Q

Non violate storage that prevents existing data from being overwritten

A

Worm

134
Q

What function Verifies the security of system, resources and test the effectiveness of the controls implemented and helps determine where more controls might be needed

A

Auditing

135
Q

Which technique do layer to switch his employee to speed up forwarding data across ports

A

Cut through

136
Q

On what environment are updates to the OSPF protocol handled by the co trip plane rather than a routers data plane

A

Software defined networking

137
Q

Created a rule in the IDS to prevent attack. Anatomist wants to verify it tower and machine is protected. What tool would they use?

A

Metasploit

138
Q

191.10.1.1-191.10.11.255

A

Class b

139
Q

Class b ip range

A

128.0.0.0 though 191.255.255.255

140
Q

Who should write up the lessons learned?

A

The on-site handler

141
Q

When smart cards replace passwords as authentication, to access a system what is now a problem?

A

Lost tokens

142
Q

The minimum and customary practice of responsible protection of information assets is defined by what

A

Due care

143
Q

What pen test activities would be effective in validating TEMPTEST effectiveness

A

Radiation monitoring

144
Q

The CMMI targets what specific aspect of software development

A

Processes

145
Q

What can be used by developers to proved additional protection Against buffer overflow’s

A

Canaries

146
Q

What causes chrome to have many processes instances when there are multiple tabs open

A

Sandboxing

Google uses sandboxing in it a chrome browser. Each tab is separate process, each sandboxes from each other

147
Q

What is the strategy behind the BIA

A

Maximum allowable downtime

148
Q

A NDA is used to enforce which part of a security program

A

Data classification

149
Q

What is the downside of selecting twisted pair cabling with more twists per segment

A

Higher costs

150
Q

What type of security testing would be most likely to be performed on a monthly basis by a security team

A

Vulnerability scanning

151
Q

Application fuzzing is a form of what

A

Pen testing

152
Q

How does Linux NX protect against buffer overflows attacks?

A

It marks pages of the stack as non executable

153
Q

In a pen test, what is used to exploit services

A

Core impact

154
Q

What is the advantage of a 200 gigabyte rainbow table over a 100 huge byte rainbow table covering the same key space

A

Faster password cracking

155
Q

A web application is provided a redirect URL information it that the subject has been successfully authenticated. What is being used?

A

Openid

Openid provides claims about a user identity and authentication

156
Q

What is the principal of SSO

A

Authentication

157
Q

What does the VNC payload in an attack with Metasploit give the attacker

A

Remote GUI

158
Q

When involved in the US legal proceedings under what condition is ESI considers non discoverable

A

If deleted as part of previously established business process

159
Q

Which of the following is an approved replacement for Halon?

A

Fm 200

160
Q

What is a hash

A

A one way mathematical function

161
Q

How many bits are in an IPv6

A

128

162
Q

Early sign of a DoS

A

A packet with source IP/port matching the destination IP/port

163
Q

What is context based access control

A

When access to something in the network is unavailable or available depending on the time of day or week

164
Q

What is likely to be treated as PII by both company policy and law

A

A document that contains names and addresses of customers

165
Q

What is the first step to be accomplished in a preliminary legal investigation

A

Determine if a crime has occurred

166
Q

How is the annualize loss expectancy calculated

A

Single loss expectancy times annualize rate of occurrence

167
Q

A helpdesk ticket regarding slow server response is escalated for investigation. The assigned administrator determines at the activities due to the running of a legitimate business application and closes a ticket. What phase of incident response does this occur during?

A

Detection

Terrifying weather event report activity is infected in certain happens during the detection face

168
Q

The following statement can best be described as what type of secure documentation?

All and user systems on the network must be protected at the host level against malware and unauthorized access attempts

A

Policy

169
Q

How many bits is IPV4

A

32

170
Q

Which protocol Heather would be shown in screen shot when it has resignation port 443

A

TCP

171
Q

What are key TCP header fields

A

Source in destination ports flags and sequence number

172
Q

What is a relaying party

A

The party that uses the login credentials when using open ID

173
Q

What is the main difference between a third-party audit and an internal audit

A

Objectivity

174
Q

Which of the following access control techniques require the use her to follow a transformation procedure to access protected data

A

The Clark Wilson model introduces the concept of transformation procedure that defines how changes can be made to objects in the system

175
Q

Which of the following can be used for distributed denial of service attack

A

Sending TCP packets with the SYN flags set

176
Q

Which of the following describes the purpose of LDAP

A

A centralized repository for user in system resources on a network

177
Q

Operational security change control is a process that manages changes to which of the following

A

Hardware, software Netwerk

178
Q

What technology would help a business that streams movies to customers worldwide ensure consistent performance

A

Content distribution network

179
Q

Antivirus Blocked an executable and sent a notice to a security vendor information management system. What kind of control does antivirus represent

A

Preventative

180
Q

What standard was introduced by the IEEE to address the issue of authentication

A

802.1x

181
Q

At which critical step in the system development process should a risk assessment be performed

A

Project initiation

182
Q

What is a mandatory component of a single sign-on system

A

Centralize credential storage

183
Q

All the following statement can best be described as what type of security documentation

While the company strongly recommends again sending sensitive or confidential data via email the data owner may authorize this method of communication of the center uses company provided email Christian to transmit data

A

Guideline

184
Q

Who ultimately has ownership of the business continuity plan in an enterprise

A

Chief executive officer

It belongs to the business

185
Q

Media sanitation instruction prevent

A

Object reuse

186
Q

How are processing task carried out in asymmetrical multiprocessing system

A

System processes will run on one CPU and the other CPUs will run the applications

187
Q

During which phase of the fetch decode execute cycle does the CPU determine what actions the instructions to take

A

Decode

188
Q

Which software development Methodist driven by the possible failure of the software project to achieve stated goals

A

Spiral

It is driven by risk

189
Q

With respect to the data classification wall which of the following is a responsibility of the system on her

A

Assist in the identification implementation assessment Of the common security controls

190
Q

Which of the following is not an advantage of a centralized access control administration

A

Flexibility

191
Q

And organization maintains a plan for emergency response, employee communications, back up operations, and post disaster recovery that will ensure that availability of critical resources and procedures to return to full production an existing office facilities. What type of plan is being described

A

Business continuity plan

192
Q

What is likely to be done at five through an assessment of core security processes

A

The root cause of security failures

193
Q

A programmer received an application error message that a requested Record was being accessed by another process. The programmer is the only person with access to the test database. After Rebooting her computer, she was able to access the record. What caused the error message

A

Deadlock condition has been put in place

194
Q

What is the meterpreter on the Metasploit framework 

A

A payload

195
Q

Which component of an account a management process is most likely to limit an attack

A

Scheduling retiring of inactive accounts

196
Q

What uses a NOP sled

A

Bidder overflow

197
Q

Which of the following is used for day to day protection of business critical resources and controlling access to computer facilities

A

Operational controls

198
Q

When making online purchases what can a user easily check to see if the Information they are going to submit will not be observed by eavesdroppers

A

Using websites with HTTPS

199
Q

A system is built so there is redundancy, but there are no dedicated hard drives for data, back up or parity. What system Is this

A

RAID 5

200
Q

What does NSlookup command do

A

See the host name and The IP address and DNS

201
Q

Which software development methodology is not primary code centric

A

DEVOPS

202
Q

Which of the following development phases would be closer to the end of the process

A

Installment and implementation

203
Q

Which component of IPsec uses a verification function similar to signing an email with a digital signature

A

Authentication header

204
Q

What is a benefit of using Kerberos for authentication

A

Password remain encrypted during transfer

205
Q

Which of the following is most likely to result in shell access to a users workstation

A

Social engineering

Not port scanning or not war dialing

206
Q

What type of security testing is being performed when a programmer compiles an application with all warnings enabled

A

Static Analysis

207
Q

A single disk in a RAID array fails and data is lost. What kind of RAID was this

A

0

208
Q

During an incident in what phase should the decision be made to pull an affected system off the network?

A

Response

209
Q

What is the total number of UDP PORTS that could be open on a system

A

65,536

210
Q

What must be included for a success exploitation

A

Payload

211
Q

What security model requires every user of the system and every object in the system to be assigned a security label and allow access based solely on these labels

A

Lattice

212
Q

Which security document would contain technical details about how a specific application must be configured

A

Baseline

213
Q

Determining an individual is who they claim to be

A

Authentication

214
Q

Which topology used two rings for fault tolerance

A

FDDI

215
Q

What part of the file contains Info about the user and App that created the file

A

Metadata

216
Q

Security model focuses on confidentiality of info

A

Bell lapadula

217
Q

Security cameras are what type of control

A

Compensating

218
Q

What term is used for programs stored on read only memory devices

A

Firmware

219
Q

Why is computer generated documentation usually considered non reliable evidence

A

Too difficult to detect prior mods

220
Q

What indicates a server side attack

A

The attack is launched against a network service that is listening on the victim host 

221
Q

What does the Advanced Encryption Standard AES, use s boxes for during the encryption process

A

Substitution

222
Q

What part of security assessment does pair programming belong to?

A

Technical security testing

223
Q

Regarding OS protection mechanisms which is false about the ring

A

Wearing allows users processes to interact with a kernel as peer processes

224
Q

Which statement correctly describes a relevant consideration when defending against client-side versus server-side attacks

A

Client side are usually harder to defend against

225
Q

MTD = what

A

RTO+wrt

226
Q

How to protect trade secrets

A

Auditing file access and controlling copying of intellectual property

227
Q

What is covered by an SLA

A

Vendors agreed response time to a system outage

228
Q

Writing a company’s security policy is what type of control

A

Administrative

229
Q

Access control model is primarily which type of control

A

Preventative

230
Q

What problem was TEMPEST designed to encounter

A

Data leakage through Electromagnetic radiation

231
Q

Which type of access control and pops all users having a clearance

A

MAC

232
Q

What is a business continuity plan

A

And overarching plan includes A collection of other plans

233
Q

What type of packages tracert Receive a reply that used to determine the route

A

Time exceed

234
Q

Which plan provides procedures for minimal loss of life

A

Occupant emergency plan

235
Q

What is the least important item to be capture an audit logs

A

System performance output data

236
Q

And organization hired a third-party to contact monthly vulnerability assessment. In which phase of business continuity plan does this belong

A

Current state assessment

237
Q

Which process will reveal a buffer overflow vulnerability in an application

A

Fuzzing

238
Q

Which extensible authentication protocol method authenticate a client at the server but is not manually authenticate the server to the client

A

EAP-MD5

239
Q

What is the goal of technical security testing

A

To remediate vulnerabilities

240
Q

What part of the waterfall model ensures that a product meets the specifications

A

Verification

241
Q

What are used to care for CrossSite scripting attack to be successful

A

The victims computer must execute a Malicious script

242
Q

Increasing availability of a service components of the cheap by implementing which of the following

A

Fault tolerance

243
Q

DNS is what

A

Protocol for translating IP address is to names and Back again 

244
Q

What is a typical length of an extended unique identifier

A

64

245
Q

What is a fundamental principle of the waterfall model

A

Each development phase must be completed before the next begins

246
Q

Due to differing privacy laws between countries a company uses a separate never to handle and stores data in each country it operates in. What is this an example of an terms of risk handling methods

A

Mitigation

247
Q

Security analyst sends a scan packet to a live host wire open ports on the same network segment but the packets receives no response. Which protocol is the analyst using

A

UDP

248
Q

Which of the following is not a high-level single sign-on access method

A

Public kiosks

249
Q

In the process of employee termination which access management Activity most effectively controls access

A

Account revocation

250
Q

And what pieces does a router for network traffic

A

IP address

251
Q

Which model has an explicit practice of sending unexpected input into applications for the development cycle

A

Microsoft threat modeling

252
Q

Oh what will trigger false positives on network that uses anomaly detection

A

Behavior changes

253
Q

What is recommended cable that will allow for 100 MBPSD data rate

A

Category 5

254
Q

What statement about biometrics is not true

A

Users can be authenticated by what they know

255
Q

What risk Estimation approach uses establish practices and calculations

A

Quantitative risk analysis

256
Q

Which of the following is an example of context dependent access control

A

File system quota

257
Q

How does water suppress fire

A

Reduces temperature

258
Q

What passengers your accountability for your actions taken within a system or domain

A

User Identification and authentication

259
Q

What must be configured for an incident responded to review successful and field login attempts

A

Accounting

Accounting is a system ability to determine the actions of a single individual

260
Q

What data classification role responsible retaining records as per approve policy

A

Data custodian

261
Q

What needs to be done for FW2 to be able to take the pivot from you use a workstation to server SRv2

A

SW2 Must be on later to only and have the server in a different VLAN

262
Q

What type of testing used tools to LA source code vulnerabilities

A

Static Analysis

263
Q

What is a characteristic of a MAC address on a network interface card

A

Remains the same regardless of the location

264
Q

What IPSEC of protocols provides integrity but Not encryption

A

AH

265
Q

And attackers preach to companies perimeter and penetrated her system. She’s attempting to maintain her access using tools that are already installed on the system. She creates a job that opens a port on the system every night at midnight. Which of the following is most likely to detect the creation of attackers back door

A

Baseline monitoring

266
Q

If an attacker wanted to run their own program in the colonel what attack with the use

A

Privileged escalation

267
Q

What collision avoidance of those Internet use

A

CSMA/CD

268
Q

Which type of fallen this off to discover through dynamic analysis

A

Authentication bypass

269
Q

How can triple your help in the Recovery process

A

Determine which files in the system were compromised

270
Q

Which of the following is a set of low level commands a CPU knows how to execute

A

CISC

271
Q

Which of the following address is it gonna be claimed, proper authentication, and authorization with users across different organizations

A

SAML

272
Q

What web vulnerability exploit say system at the database layer allowing attacker to create read modifier delete sensitive data

A

SQL injection

273
Q

What date it would be most useful in a situation where someone’s credentials may have been compromised

A

Successful logins

274
Q

What is not a Common OS mechanism

A

Paging

Current OS protection mechanisms include layering, extraction, process isolation and hardware segmentation

275
Q

A DBMS should possess a number of characteristics to be considered secure. One characteristic that it should always maintain a stable state even after hardware/software failure. What is this

A

Fault tolerant

276
Q

A network bridge learns which systems reside on a network segment by building a table that consist of which of the following

A

MAC addresses

277
Q

What should security procedures be based off of

A

Organizational policies

278
Q

In the context of Clark Wilson model of data integrity, maintaining external consistency and chairs which of the following

A

The system state is consistent with the data outside the system

279
Q

Where are hash passwords stored on A Linux system

A

/etc/shadow

280
Q

Which task within the excess provision Lifecycle should take place one employee Changes apartments

A

Maintenance

281
Q

What would most effectively be used to block a malicious ACK packet sent to pour it doesn’t matter initials SYN packet

A

Stateful firewall

282
Q

What technique used by malicious it’s too overly one frame on top of another, thereby tricking the user to perform an action they did not intend

A

Click jacking

283
Q

What do the UDP and TCP protocol Have in common

A

Operates at the transport layer

284
Q

What encryption algorithm is not using single key Encryption

A

Diffie Hellman

285
Q

What intra Company document helps an organization meets service commitments to customers

A

OLA

286
Q

Frame-relay is simplified version of which of the following

A

X.25

287
Q

What are sprinkler systems and allow large volumes of water to be released in a short period of time

A

Deluge

288
Q

The concept of subject/program binding aside to which of the following security models

A

Clark Wilson

289
Q

What is a common problem about my truck access controls

A

False acceptance rate

290
Q

What is the key difference between an internal audit in an external audit

A

Testing team members

291
Q

What rate level uses byte level parity

A

3

292
Q

 After forensic investigator Caesars a computer drive time investigation what is the next step

A

Make a bit level image copy of the desks

293
Q

After reviewing your file service catalog a system admin notice is there a know if it’s locked for any type of file access. What type of issue is this

A

Accountability

294
Q

What type of control can automatically initiate creative control

A

Detective

295
Q

What is the primary disadvantage of a VPN

A

Unpredictable performance

296
Q

What is not a characteristic of a distributed system

A

Rigid

297
Q

Why would a company provide employees from using client to cite VPNs

A

Three use reduces effectiveness of subnetwork monitoring devices

298
Q

What is the purpose of a network protocol like radius and tacacs

A

Authenticate users on behalf of other services

299
Q

What approach insures new users initially have no access to sensitive application information

A

Secure by default

300
Q

What is the most crucial piece of developing access recovery plan

A

Management support

301
Q

Which maturity level of the CMMI model is this offer process characterizes as ad hoc

A

Initial

302
Q

What software testing method can be used against compile code with no access to source

A

Fuzzing

303
Q

What is caused by applications that request in later and properly release resources

A

Memory leak

304
Q

Company has restricted options in the user interface for us users, preventing them from opening command line interface. What type of control this

A

Preventative

305
Q

Which entity provides formal authorization on a system access decisions

A

Data owner

306
Q

Which metric should be considered in the purchase of preventative control

A

tco

307
Q

The spiral model of project management is primarily driven by what factor

A

Risk

308
Q

What has can an untrusted Java apple perform on a client machine when run from the browser

A

Make network connection to the original host

309
Q

When talking about data classification rolls a custodian is concerned with all the following except what

A

Determine the datas value to the organization in the threshold be on which absolutely does purged

310
Q

Which protocols describe his best effort protocol

A

UDP

311
Q

A system admin find the unknown user account they have been created several months prior to discovery. What process should be improved and evil more timely medication of the future

A

Log monitoring

312
Q

Which component of the operating system includes an interrupt handler that handles all request that are competing for system service

A

The kernel

313
Q

Battling weather patterns requires a computer design to execute a small set of instructions for efficiently. What type of computer is best for this

A

RISC

Reduce instructions set computer

314
Q

What is assumed with a trusted computing base (TCB)

A

System components are securely designed and configured

315
Q

What is a phishing attack and I was it, they carried out

A

Danity theft scheme that takes place to email in a bogus website

316
Q

What software is both gratis and libre 

A

Freeware

317
Q

What is a symmetric key algorithm

A

Blowfish

318
Q

What can be attacked with a rainbow table

A

Hash

319
Q

What access control measures a directive

A

Background check

320
Q

When planning for physical security threats how can I smoke detector help

A

 spell detetric and sense smoke by interference of light or ionization

321
Q

What common network Troubleshooting told makes use of Internet control message protocol packets with particular time to live values

A

Traceroute

322
Q

With regards to access controls what differentiates a passphrase from a password

A

Passphrase is typically longer and more difficult to get guess 

323
Q

What tool would best be used to record and send to use his password of an Internet

A

Keylogger

324
Q

What is considered a potential Vulnerability specifically for hardware based thin clients

A

Lack of timely patching

325
Q

How can organization share a single document repository were each company retains control over his authentication credentials

A

FIM

326
Q

What functionality do open ID and Saml provide

A

Open ID performance authentication, while SAML encodes authentication related information

327
Q

Worms have the ability to Joe directly to which type of the attack process by tutoring payloads to high numbers of IP addresses

A

Exploit vulnerable services

328
Q

Under open ID which of the following are sites that can use identity information from sites that are sources of identity information

A

Relaying parties