Test 2 - Quiz Review Flashcards

1
Q

A ________ firewall handles all traditional firewall functions (SPI, ACLs, etc.) as well as additional security functions such as antivirus filtering, spam filtering, application proxy filtering, and so forth.

A

unified threat management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the SPI firewall rule for packets that only have their TCP ACK bits set but no other flags set?

A

pass the packet if it is part of a previously approved connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application proxy firewalls can always examine application layer content.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

________ drop packets.

A

IPSs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ________ port number designates a specific application running on a server.

A

well-known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the SPI firewall rule for packets that do not attempt to open connections?

A

pass the packet if it is part of a previously approved connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The combination of high safety and low cost makes SPI firewalls extremely popular.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of filtering do IDSs do?

A

Deep-packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________ firewalls always examine application messages in depth.

A

Application proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ________ is a persistent conversation between different programs on different computers.

A

connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You can quickly assess the general security posture of your Windows Vista PC by using the status check in the Windows Security Center.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

After access is granted to a network, many NACs continue to monitor network PCs.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Computer recover software reports its physical location to a recovery company that works with the local police to recover the notebook.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

UNIX offers more directory and file permissions than Windows.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A(n) ________ is a security weakness that makes a program vulnerable to attack.

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Local Users and Groups snap-in is available on the ________ MMC.

A

Computer Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A(n) ________ is a program that takes advantage of a(n) ________.

A

exploit, vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

To how many accounts and groups can different permissions be applied in Windows?

A

almost an unlimited number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Assigning security measures to individuals within groups is cheaper than assigning security measures to groups.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

To get to the super user account in UNIX, the administrator can use the RunAs command.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In Internet Explorer, the Security tab controls the website’s pop-up blocker.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Operating system account passwords provide limited protection.

A

True (lack of granularity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Testers have permissions on the ________.

A

Testing server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

________ is a VoIP service that currently offers free calling among its customers over the Internet and reduced-cost calling to and from Public Switched Telephone Network customers.

A

Skype

25
Q

Java applets are large Java programs.

A

False

26
Q

Cookies can be used to track users at a website.

A

True

27
Q

In IM, all messages pass through a ________ server.

A

Relay

28
Q

The prevention of sensitive information from being sent out of a company is called ________.

A

Extrusion prevention

29
Q

In a(n) ________ attack, information that a user enters is sent back to the user in a webpage.

A

XSS

30
Q

Accepting cookies is necessary to use many websites.

A

True

31
Q

A system using an array of drives increases reliability.

A

True

32
Q

With image backup, even if the entire hard drive is lost, its content can be restored onto the same machine or a different machine.

A

True

33
Q

Typically, having enough shadow backup space for a few days is sufficient.

A

True

34
Q

Backing up data to a second hard drive on a computer is more expensive than backup onto to magnetic tape.

A

True

35
Q

Full backups are ________.

A

A. performed on all files and directories
B. slow
C. typically done weekly

36
Q

Mesh backup is where client PCs in an organization back up each other.

A

True

37
Q

Policies should not require that backup data be encrypted.

A

True

38
Q

Regarding retention policies, firms need to ________.

A

implement strong and clear backup policies. That’s it.

39
Q

Optical disks can safely hold data for decades.

A

False

40
Q

Properly hardened hosts and securely coded applications can help protect data while it is processed.

A

True

41
Q

Which of the following database events should be regularly audited?

A

A. warnings and exceptions
B. special access and logins
C. changes

42
Q

Changing the default listening port is an effective way of discouraging attackers from accessing the database.

A

True

43
Q

DDL triggers are used to ________.

A

Neither maliciously attack databases nor produce automatic responses if the data of the database has been altered

44
Q

DRM restricts what people can do with sensitive material.

A

True

45
Q

Databases are ________.

A

Both integrated collections of data and integrated collections of metadata

46
Q

Courts will often admit unreliable evidence if judges believe that juries can be trusted to evaluate it properly.

A

False

47
Q

If a defendant has already been prosecuted in a criminal trial, he or she cannot later be tried in a civil trial.

A

False

48
Q

Mens Rea usually is important in ________ trials.

A

Criminal

49
Q
Which of the following is not one of the three levels of U.S. federal courts?
  A. U.S. State Courts 	
  B. U.S. District Courts 	
  C. U.S. Circuit Courts of Appeal 	
  D. The U.S. Supreme Court
A

A. U.S. State Courts

50
Q

________ investigate(s) most violations of local and state computer laws.

A

Local police

51
Q

When a system runs out of storage space, ________.

A

the IDS will start a new log file

52
Q

With CDP, the backup site already has the proper equipment, and data and recovery is instantaneous.

A

True

53
Q

Total software reinstallation effectively addresses data loss.

A

False

54
Q

The business continuity team should be headed by ________.

A

A senior business manager.

55
Q

________ specify how a company will maintain or restore core business operations after disasters.

A

Business Continuity Plans

56
Q

How does the availability heuristic work?

A

The availability heuristic works by making people more prone to believing an event is more likely to happen if their memories of the class of event are easy to access. Memories of a class of event are easier to access the more vivid they are.

57
Q

The framing effect means that individual’s choices are affected by whether the a trade-off is presented as a loss or a gain.

A

True

58
Q

In prospect theory, how do people react to potential gains and losses?

A

In prospect theory, people are more likely to choose a certain gain over a theoretical greater one, and more likely to choose a theoretical greater loss over a certain one.