Test Study 2 Flashcards

1
Q

In networking, what is DTE?

A

Data terminal equipment, typically customer equipment that needs communication services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is 802.15.1

A

The standard for PAN or bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a popular name for a PAN

A

bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is shibboleth?

A

An SSO standard based on SAML. It is open source and capable of working with many identity providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a key stretching algorithm commonly used by Linux?

A

Bcrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a routing protocol that points packets in the lowest cost direction?

A

RIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a group of standards to assist in automated assessments?

A

SCAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What routing protocol is simple and indicates the best initial direction for each packet?

A

Distance vector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is HAVAL?

A

A broken hash algorithm with variable hash lengths from 128 to 256 bits that allows the user to specify the number of rounds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a green bar certificate?

A

An extended validation certificate, requires legal entity proof of the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some characteristics of compartmentalized security mode?

A
All users require NDA
All info requires clearance
Some info requires approval
Some info is need to know
All users can access some information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a business resumption plan?

A

Procedures and checklists to resume normal operations after a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What would a list of resources, actions, and information kept ready for a specific emergency be called?

A

COOP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is required for proof of a domain validation certificate?

A

Ownership of the DNS records, whois, or the domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What hash algorithm allows you to specify length and number of rounds?

A

HAVAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the standard for bluetooth?

A

802.15.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the standard for packet-switching on older telephone services?

A

X.25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is distance vector?

A

A simple protocol that indicates the best initial direction for each packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Frame Relay?

A

A packet switched service that can handle multiple virtual circuits and a variety of network types. It has a committed minimum data rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is EIGRP?

A

A cisco made, distance vector based routing protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does Classifying do?

A

Classifying sets the sensitivity levels for data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In networking, what is DCE?

A

Data communications equipment, typically telephone equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does Categorizing do?

A

Identifies assets with regard to their impact if lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the characteristics of OSPF?

A

link state routing, where each device creates a map of the network and chooses the most efficient routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the term for the threshold established to prevent logging every event?
Clipping level.
26
What is a standard for non-repudiation and digital signing?
DSA
27
What is a SCAP?
security content automation protocol - a group of standards to assist in automated assessment and the management and identification of vulnerabilities.
28
Which RAID levels can survive 2 drives failing?
RAID 6 and RAID 1+0 (10)
29
What is another name for bluetooth?
PAN or personal area network
30
How many bits of length is HAVAL?
128 to 256
31
What is clipping level?
The threshold for established logging and alerting to avoid logging every single event.
32
What does transposition encryption do?
Rearranges the letters without changing them?
33
What are the procedures and checklists to resume normal operations after a disaster called?
Business resumption plan
34
What is Bcrypt?
A key stretching algorithm commonly used by Linux
35
What is DSA?
Digital signing algorithm, provides non-repudiation.
36
In encryption, what is a short lived item only used for a little while and then discarded and regenerated that is also a helpful protection from eavesdropping?
Session key
37
What renders a compromised system completely safe?
Data sanitization
38
What is data diddling?
An act of interfering with data at the entry point, usually by a malicious insider.
39
What are the characteristics of dedicated security mode?
``` All require NDA Clearance required for all information Approval required for all information All information is need to know All users can access all information ```
40
What kind of encryption rearranges letters without changing them?
Transposition
41
What is EAP?
Extensible authentication protocol, a framework for authentication that you can build upon.
42
What is X.25?
Standard for packet switched networks using older telephone services.
43
How many drives can fail in a RAID 6 and it still remain viable?
2
44
What is a development method that relies on creating components or functions in parallel as if they were mini projects?
RAD
45
What malicious act is generally from an insider having to do with data entry?
Data diddling.
46
What is a routing protocol where each device maps the network to choose the most efficient route?
OSPF
47
What are the characteristics of multilevel security mode?
``` NDA for all Some data requires clearance Some data requires approval Some data is need to know All users can access some information ```
48
What is a set of standards that are flexible and adaptable with sets of policies and recommendations?
ISO27000
49
What is an open source SSO based on SAML?
Shibboleth.
50
What is the process to recover and protect the IT infrastructure in the even of a disaster called?
Disaster recovery plan.
51
What is a COOP?
Continuity of operations plan - gathering of resources, actions, information, and procedures that are kept in readiness to address specific emergencies.
52
In most to least strict, list the data security modes.
Dedicated, System High, Compartmented, Multilevel
53
What is an authentication protocol framework?
EAP
54
What development method relies on customer interaction and feedback?
AGILE
55
What type of service can handle a variety of network types and has a minimum, committed data rate?
Frame relay
56
Which type of certification validation requires legal entity proof of the owner?
Extended validation, or green bar.
57
What is RIP?
A distance vector routing protocol that points packets int he lowest cost direction for efficiency.
58
What is a disaster recovery plan?
The process to recover and protect the IT infrastructure in the vent of a disaster.
59
What are the characteristics of system high security mode?
``` All users require NDA All data requires clearance All data requires approval Some information is need to know, All users can access some data ```
60
What is a session key?
A key used for short periods of time, usually a single session, and should no longer be in use when its broken.
61
What are the four data security modes?
Dedicated System high multilevel compartmented