Test 2 - Quiz Review Flashcards
A ________ firewall handles all traditional firewall functions (SPI, ACLs, etc.) as well as additional security functions such as antivirus filtering, spam filtering, application proxy filtering, and so forth.
unified threat management
What is the SPI firewall rule for packets that only have their TCP ACK bits set but no other flags set?
pass the packet if it is part of a previously approved connection
Application proxy firewalls can always examine application layer content.
True
________ drop packets.
IPSs
A ________ port number designates a specific application running on a server.
well-known
What is the SPI firewall rule for packets that do not attempt to open connections?
pass the packet if it is part of a previously approved connection
The combination of high safety and low cost makes SPI firewalls extremely popular.
True
What type of filtering do IDSs do?
Deep-packet inspection
________ firewalls always examine application messages in depth.
Application proxy
A ________ is a persistent conversation between different programs on different computers.
connection
You can quickly assess the general security posture of your Windows Vista PC by using the status check in the Windows Security Center.
True
After access is granted to a network, many NACs continue to monitor network PCs.
True
Computer recover software reports its physical location to a recovery company that works with the local police to recover the notebook.
False
UNIX offers more directory and file permissions than Windows.
False
A(n) ________ is a security weakness that makes a program vulnerable to attack.
vulnerability
The Local Users and Groups snap-in is available on the ________ MMC.
Computer Management
A(n) ________ is a program that takes advantage of a(n) ________.
exploit, vulnerability
To how many accounts and groups can different permissions be applied in Windows?
almost an unlimited number
Assigning security measures to individuals within groups is cheaper than assigning security measures to groups.
False
To get to the super user account in UNIX, the administrator can use the RunAs command.
False
In Internet Explorer, the Security tab controls the website’s pop-up blocker.
False
Operating system account passwords provide limited protection.
True (lack of granularity)
Testers have permissions on the ________.
Testing server
________ is a VoIP service that currently offers free calling among its customers over the Internet and reduced-cost calling to and from Public Switched Telephone Network customers.
Skype
Java applets are large Java programs.
False
Cookies can be used to track users at a website.
True
In IM, all messages pass through a ________ server.
Relay
The prevention of sensitive information from being sent out of a company is called ________.
Extrusion prevention
In a(n) ________ attack, information that a user enters is sent back to the user in a webpage.
XSS
Accepting cookies is necessary to use many websites.
True
A system using an array of drives increases reliability.
True
With image backup, even if the entire hard drive is lost, its content can be restored onto the same machine or a different machine.
True
Typically, having enough shadow backup space for a few days is sufficient.
True
Backing up data to a second hard drive on a computer is more expensive than backup onto to magnetic tape.
True
Full backups are ________.
A. performed on all files and directories
B. slow
C. typically done weekly
Mesh backup is where client PCs in an organization back up each other.
True
Policies should not require that backup data be encrypted.
True
Regarding retention policies, firms need to ________.
implement strong and clear backup policies. That’s it.
Optical disks can safely hold data for decades.
False
Properly hardened hosts and securely coded applications can help protect data while it is processed.
True
Which of the following database events should be regularly audited?
A. warnings and exceptions
B. special access and logins
C. changes
Changing the default listening port is an effective way of discouraging attackers from accessing the database.
True
DDL triggers are used to ________.
Neither maliciously attack databases nor produce automatic responses if the data of the database has been altered
DRM restricts what people can do with sensitive material.
True
Databases are ________.
Both integrated collections of data and integrated collections of metadata
Courts will often admit unreliable evidence if judges believe that juries can be trusted to evaluate it properly.
False
If a defendant has already been prosecuted in a criminal trial, he or she cannot later be tried in a civil trial.
False
Mens Rea usually is important in ________ trials.
Criminal
Which of the following is not one of the three levels of U.S. federal courts? A. U.S. State Courts B. U.S. District Courts C. U.S. Circuit Courts of Appeal D. The U.S. Supreme Court
A. U.S. State Courts
________ investigate(s) most violations of local and state computer laws.
Local police
When a system runs out of storage space, ________.
the IDS will start a new log file
With CDP, the backup site already has the proper equipment, and data and recovery is instantaneous.
True
Total software reinstallation effectively addresses data loss.
False
The business continuity team should be headed by ________.
A senior business manager.
________ specify how a company will maintain or restore core business operations after disasters.
Business Continuity Plans
How does the availability heuristic work?
The availability heuristic works by making people more prone to believing an event is more likely to happen if their memories of the class of event are easy to access. Memories of a class of event are easier to access the more vivid they are.
The framing effect means that individual’s choices are affected by whether the a trade-off is presented as a loss or a gain.
True
In prospect theory, how do people react to potential gains and losses?
In prospect theory, people are more likely to choose a certain gain over a theoretical greater one, and more likely to choose a theoretical greater loss over a certain one.