Test Study 7 Flashcards

1
Q

What provides fundamental knowledge and definitions?

A

Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What provides tactical knowledge necessary for a job or task?

A

Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What imparts sensitivity or importance to a topic?

A

Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What incorporates people into the culture of the organization?

A

Indoctrination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What form of learning should be used if the person has no experience with the tools or job?

A

Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What form of learning should be used if the person has experience in similar positions or with similar tools?

A

Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What form of learning should be used if the person isn’t working well within the organization?

A

Indoctrination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is COBIT?

A

A risk management framework initially conceived to assist with financial and IT auditing, from ISACA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which risk management framework was initially conceived to assist with financial and IT auditing?

A

COBIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DEP?

A

Data Execution Prevention

Monitors programs to ensure they are using system memory safely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ASLR?

A

Address space layout randomization
Randomly arranges the address space of key data areas to make it more difficult to exploit memory corruption vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some protections against memory exploits?

A

DEP and ASLR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A rogue network has been created, but has no access point. What mode is it in?

A

Ad Hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A rogue network has been created and it has an access point. What mode is it in?

A

Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the CATs and their speeds?

A
Cat 3 - voice grade, 10 Mb/s
Cat 4 - 16 Mb/s, token ring
Cat 5e - 1Gb / 1000BASE-T, 100m
Cat 6 - 10 GB / 10 GBASE-T, 55m
Cat 7 - 10 GB / 10 GBASE-T, 100M or 100 GBASE-T 50m
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which CAT cable minimum should function at 10 Gb/s at 60m?

A

CAT 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which CAT cable was primarily used in token ring?

A

CAT 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which CAT cable minimum should carry 10 Gb/s for 30m?

A

Cat 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the dynamic, well known, and registered port ranges?

A

Well known - 0 to 1023
Registered - 1024 to 49151
Dynamic - Else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the name of the port range that services like LDAP and FTP live on?

A

Well known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the name of the port range that might contain a service like RDP?

A

Registered

22
Q

What is the name of a port range that applications may used randomly?

23
Q

What is the KDC in kerberos?

A

Key distribution server, focal point of authentication, must be protected.

24
Q

What is the most important part of kerberos to protect?

25
What authentication method can be disturbed by bad NTP?
Kerberos
26
What is code coverage?
Percentage of source code evaluated.
27
What is function coverage?
Evaluation of the subroutines
28
What is statement coverage?
Evaluating each line of executable code.
29
What is branch coverage?
Evaluating if and case statements.
30
What is condition coverage?
Evaluating true/false statements.
31
What type of code review is the percentage of source code evaluated?
Code coverage.
32
What type of code review is the evaluation of subroutines?
Function coverage
33
What type of code review is reviewing each line of executable code?
Statement coverage
34
What type of code review is evaluating if and case statements?
Branch coverage
35
What type of code review is evaluating boolean operators?
Condition coverage.
36
What are the principles of COBIT?
``` Meet the needs of the stakeholder Cover the entirety of the project Apply a single integrated framework Enable a holistic approach Separate governance from management ```
37
What is real evidence?
Tangible, may be seen or touched
38
What kind of evidence may be seen or touched?
Real
39
What is direct evidence?
Evidence that provides a validation of a fact
40
What evidence provides a validation of a fact?
Direct
41
What does a grand jury require?
Probable Cause
42
What type of hearing requires only probable cause?
Grand Jury / Indictment
43
What is ECB?
Electronic code book DES block cipher mode that is simple and fast, but predictable. Works best for small files. Lacks diffusion.
44
What type of fast encryption would work best for small files?
ECB
45
What part of a system does port filtering protect?
Applications
46
What part of a system does address filtering protect?
Host
47
What type of network filtering protects a host?
Address ranges or address filtering
48
What type of network filtering protects applications?
Port
49
What is the TCP header?
6
50
What protocol has a header of 6
TCP
51
What are the TCP/IP layers?
Network Access / Link Internet Host to Host / Transport Application Layer / Process
52
Which is the 'bottom' TCP/IP layer?
Network Access