Unit 2 Test Bullshit Flashcards

1
Q

What is hashing?

A

Transforming any key or string of values into another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who created Message Digest 5 (MD5) and what value does it create?

A

Ron Rivest and it produces a 128-bit hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the variants of Secure Hash Algorithm SHA?

A

SHA-224 (224 bit)
SHA-256 (256 bit)
SHA-384 (384 bit)
SHA-512 (512 bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is salting?

A

Salting adds another layer of security to hashing by allowing the owner to choose a string before hashing starts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(HMAC) is used for what?

A

Providing a key input to a hash algorithm to make it more secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do digital signatures provide?

A

used to determine if someone edits a document after the user signs it, check the authenticity of a message, digital document, or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a digital certificate?

A

Enables users and orgs to exchange information securely over the internet.
Equivalent to an electronic passport.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hash functions are ______________ functions. It is computationally infeasible for two different sets of data to come up with the same output.

A

one-way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity ensures that data remains unchanged and __________________ by anyone or anything over its entire life cycle.

A

trustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Because a hash value changes every time data is changed, cryptographic hash values are often called digital ___________________________.

A

fingerprints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hashing is relatively easy to compute and equally easy to reverse.
T or F

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptographic hash functions have the following properties:

A

a.
The output has a fixed length.

b.
Two different input values will almost never result in the same hash values.

f.
The input can be any length.

g.
The hash function is one way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An 8-bit checksum calculates the hash by converting the message into ____________________ numbers

A

binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The 8-bit checksum 2’s complement converts a binary to its opposite value, and then it adds ___________

A

one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What malware compromised the security of MD5 in 2012?

A

Flame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SHA is short for what?

A

secure hash algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MD5 is short for what?

A

message digest 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What Cisco command verifies the integrity of IOS images used on Cisco routers?

A

verify / md5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hashing is vulnerable to ______________________ attacks and does not provide security to transmitted data.

A

man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A _________________________ attack attempts every possible combination of characters up to a given length.

A

brute-force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A _______________________ attack uses a file containing common words, phrases, and passwords.

A

dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___________________ creates a different hash result for two users who have the same password.

A

salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A ____________________ table stores the pre-computed hashes of passwords in a password dictionary along with the corresponding password.

A

lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CSPRNGs generate a random number that has a high level of randomness and is completely unpredictable, so it is cryptographically secure.
T or F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

VPNs using IPsec rely on HMAC functions to authenticate the origin of every packet and provide data integrity checking.
t or f

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A(n) ______________ trail tracks an electronic document’s history for regulatory and legal defense purposes.

A

audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

_________________________ is a way to ensure that the sender of an electronic message or electronic document cannot deny having sent the message or document and that the recipient cannot deny having received the message or document.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

______________________ cryptography is the basis for digital signatures.

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

_____________________________________________________(PKI) is the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificates.

A

public key infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A bank clerk has exceeded a predetermined number of record modifications within a specific period of time block.

Their manager must then flag the record as legitimate (or not). This is an example of what Data Field Validation Control?

A

maximum record modification trigger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

System locks from unusual activity indicate what Data Field Validation Control?

A

unusual activity trigger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Data field validation via input ______________ prevents users from entering invalid data or help ensure that they enter data consistently.

A

masks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What data integrity constraints matches these descriptions?

a. All rows must have a unique identifier called a Primary Key
b. All data stored in a column must follow the same format and definition.
c. A set of rules defined by a user which does not belong to one of the other categories
d. Table relationships must remain consistent

A

a. Entity Integrity
b. Domain Integrity
c. User-defined Integrity
d. Referential Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

_________________ in a database signifies missing or unknown values.

A

null

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

NIST developed a “best practices” for Business Continuity.

Place these steps in the proper order as presented in our reading (and from NIST):

Develop recovery strategies
Develop the contingency plan
Identify preventive controls
Calculate risk
Conduct the business impact analysis
Maintain the plan
Develop the policy statement
Test the plan
A
1. 
Develop the policy statement
2. 
Conduct the business impact analysis
3. 
Calculate risk
4. 
Identify preventive controls
5. 
Develop recovery strategies
6. 
Develop the contingency plan
7. 
Test the plan
8. 
Maintain the plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

In regards to IT disaster recovery, preventative controls include keeping data backed up, keeping data backups off-site, using ____________________, or installing generators.

A

surge protectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

In regards to IT disaster recovery, Detective controls include using up-to-date _______________ software.

A

antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

An organization’s DRP restores mission critical systems first.

T or f

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are strikes and walkouts considered? (event

A

Labor events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are vandalism, protests, sabotage ,terrorism, and war considered? (events

A

Social-political events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

__________________ is a Cisco IOS technology that provides statistics on packets flowing through a Cisco router or multilayer switch.

A

NetFlow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

An IPS device operates in __________________ mode.

A

inline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CSIRT is the acronym for what term?

A

computer security incident response team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

______________________ is the methods and configurations used to make a system or network tolerant of failure.

A

resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The ability of a network to dynamically recover from the failure of a device acting as a default gateway is known as ________________ redundancy.

A

first-hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

The _______________________________ is typically the router that provides devices access to the rest of the network or to the Internet.

If there is only one router serving in this role, it is a single point of failure.

A

default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

_________________________ Protocol prevents loops on a network when switches interconnect via multiple paths.

A

Spanning tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

With RAID:

_____[a]_____ detects data errors.

_____[b]_____ writes data across multiple drives.

_____[c]_____ stores duplicate data on a second drive.

A

parity

striping

mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the minimum number of disks in a RAID 0+1 ?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is the minimum number of disks in a RAID 1 ?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A car has four tires and a spare tire in the trunk in case of a flat.

This is a comparative example of ____________ Redundancy

A

N + 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

If an organization implements complex systems that are hard to understand and troubleshoot, it may actually backfire.

What type of defense best alleviates this issue?

A

Simplicity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Concealing certain types of information makes it more difficult for cyber criminals to attack a system.

This would be considered what type of defense?

A

Obscurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

To accomplish a goal of _____________________, organizations can use security products manufactured by different companies for multifactor authentication.

A

Diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Employees in the the shipping department do not need access to marketing presentations to perform their jobs.

This is an example of what defense?

A

Limiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

An organization stores its confidential documents on a server in a building surrounded by an electronic fence.

This is an example of what defense?

A

Layering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Mitigation involves reducing the _____[a]_____ of the loss or the likelihood of the loss from occurring

A

Severity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Many technical controls mitigate risk including authentication systems, _____[b]_____, and firewalls.

A

file permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

The ___________________ Corporation maintains the CVE List and its public website.

A

MITRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

When discussing asset and systems standardization, COTS is short for what?

A

commercial off-the-shelf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Asset management manages the __________________ and inventory of technology assets including devices and software.

A

lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

_____[a]_____ management includes a complete inventory of hardware and software.

This means that the organization needs to know all of components that can be subject to _____[b]_____ risks.

A

Asset

Security

63
Q

Fault _____________________ enables a system to continue operating if one or more components fail.

A

Tolerance

64
Q

What environment corresponds to these high availability requirements?

Maintain high availability for continuous trading, compliance, and customer trust

Require high availability to provide around-the-clock care for patients

Provide security and services to a community, state, or nation

Efficient supply chains and the delivery of products to customers

Communicate information on events as they happen

A

Finance industry

healthcare facilities

public safety industry

retail industry

news media industry

65
Q

Five nines mean that systems and services are available _________________ % of the time.

A

99.999

66
Q

With the Five Nines, ensuring high availability includes eliminating ________[a]_________ of failure, designing for reliability, and detecting _____[b]_____ as they occur.

A

a. single points

b. failures

67
Q

List one component of a perimeter security system (as discussed in our reading):

A

Bollard (blocks cars)

68
Q

implement VoIP security by encrypting voice message packets to protect against _____________________.

A

eavesdropping

69
Q

Many DoS attacks use ICMP as part of the attack

T or F

A

True

70
Q

Attackers can target DNS servers in order to deny access to network resources or redirect traffic to ________________ websites

A

rogue

71
Q

A port ____________________________ is an application that probes a device for open ports by sending a message to each port and waiting for a response.

A

scanner

72
Q

IEEE 802.__________ is now the industry standard for securing WLANs.

A

802.11g

73
Q

Port security on these devices limits the number of valid MAC addresses allowed on a port.

A

switches

74
Q

Threats to these devices include attacks against network protocols like ARP/STP.

A

switches

75
Q

Threats to these devices include attacks against network protocols like RIP/OSPF.

A

routers

76
Q

The ______________________ Operation Center (SOC) is a dedicated site that monitors, assesses, and defends the organization’s information systems such as websites, applications, databases, data centers, networks, servers, and user systems.

A

security

77
Q

The _________________ Operation Center (NOC) is one or more locations containing the tools that provide administrators with a detailed status of the organization’s network.

A

network

78
Q

Hardware-monitoring systems have become an essential security countermeasure

T or f

A

True

79
Q

Hardware monitoring systems are used to monitor the health of these systems and to minimize server and application ________________.

A

Downtime

80
Q

Commercial HVAC systems and other building management systems now connect to the Internet for remote monitoring and control.

These systems are often called “__________________ systems”

A

smart

81
Q

Power degradation includes ______________, which are prolonged low voltage issues

A

brownout

82
Q

Power degradation includes ___________________ current, which is an initial surge of power

A

inrush

83
Q

A(n) _____[a]_____ log tracks user authentication attempts.

A(n) _____[b]_____ log provides all of the details on requests for specific files on a system

A

a. audit

b. access

84
Q

In all versions of Windows except Home edition, enter _______________ at the Run command to open the Local Security Policy tool.

A

secpol.msc

85
Q

An account _________________ Policy locks a computer for a configured duration when too many incorrect login attempts occur.

A

lockout

86
Q

When a computer is not part of an Active Directory domain, the user configures policies through Windows _______________ Security Policy.

A

local

87
Q

Best practices for securing privileged accounts includes establishing a process for ______________________ of rights when employees leave or change jobs

A

revocation

88
Q

Best practices for securing privileged accounts includes implementing a _________________ between the end-user and sensitive assets to limit network exposure to malware

A

gateway

89
Q

Privileged accounts have the credentials to gain access to systems and they provide _____________________, unrestricted access.

A

Elevated

90
Q

A simple method that many administrators use to help secure the network from unauthorized access is to disable all unused ________________ on a switch.

A

ports

91
Q

Telnet is an older protocol that uses unsecure _____[a]_____ transmission of both the login authentication.

Secure Shell (SSH) is a protocol that provides a secure _____[b]_____ management connection to a remote device.

A

a. Plaintext

b. Encrypted

92
Q

SSH uses what TCP port?

A

22

93
Q

Telnet uses what TCP port?

A

23

94
Q

Remote Desktop used which port number (by default)?

A

3389

95
Q

Remote ____________________ allows technicians to assist customers with problems from a remote location.

A

Assistance

96
Q

Higher frequency RFID systems have a faster data transfer rate and shorter read ranges.
T or F

A

False

97
Q

Higher frequency RFID systems are more sensitive to radio wave interference.
T or F

A

True

98
Q

_________________________________ identification (RFID) uses radio waves to identify and track objects.

A

radio frequency

99
Q

RFID tags contain an integrated circuit that connects to an ______________.

A

antenna

100
Q

Using GPS to locate a cell phone without the user’s permission is legal.

A

false

101
Q

GPS tracking can pinpoint a location within __________________ meters.

A

100 meters

102
Q

A ________________________ lock uses buttons that a user presses in a given sequence to open the door.

A

cipher

103
Q

Many portable devices and expensive computer monitors have a special steel bracket security slot built in to use in conjunction with __________________________.

A

cable locks

104
Q

Disk _____________________ copies the contents of the computer’s hard disk to an image file.

A

cloning

105
Q

With ________________, any applications installed or files saved are lost when the system restarts.

A

deep freezing

106
Q

Always _________________________ backups to ensure the integrity of the data.

A

validate

107
Q

Before using BitLocker, a user needs to enable Trusted Platform Module (TPM) in the BIOS.

The TPM is a specialized chip installed on the ________________________________.

A

motherboard

108
Q

A user can also choose to encrypt an entire hard drive in Windows using a feature called ______________________________.

A

BitLocker

109
Q

With EFS, only the user that encrypted the data will be able to access the encrypted files or folders.

A

True

110
Q

According to the Principle of ______________________________, users should be limited to only the resources they need on a computer system or on a network.

A

Least Privilege

111
Q

Will these actions keep permissions or inherit new ones?

Data moved to the same volume

Data copied to the same volume

Data moved to a different volume

Data copied to a different volume

A

Moved to same/keep

copied to save/new

moved to diff/new

copied to diff/new

112
Q

To prevent rouge access points, the computer industry developed ____________________ authentication, also called two-way authentication

A

mutual

113
Q

With WPA-PSK, the PSK is short for what?

A

pre-shared key

114
Q

A significant security improvement from WPA to WPA2 was the mandatory use of AES _________________

A

algorithms

115
Q

AES superseded TKIP for even key management and encryption protection.
T or F

A

True

116
Q

Mobile devices transmit data using ________________ signals that any device with a compatible antenna can receive.

A

radio

117
Q

Remote-access users must have a VPN ___________________ installed on their computers to form a secure connection with the corporate private network.

A

client

118
Q

Manufacturers may combine patches and upgrades into a comprehensive update application called a _______________________.

A

service pack

119
Q

___________________________________________________ assesses missing security updates and security misconfigurations in Microsoft Windows.

A

Microsoft baseline security analyzer

120
Q

MBSA checks blank, _______________________, or non-existent passwords

A

simple

121
Q

An administrator hardens an operating system by modifying the default _____[a]_____ to make it more secure to outside threats.

This process includes the removal of unnecessary programs and _____[b]_____.

A

a. configuration

b. services

122
Q

Device hardening involves implementing proven methods of physically securing network devices.

A

True

123
Q

A job site _________________________ is a job search site that gathers listings from other job board and company career sites and displays them in a single location.

A

aggregator

124
Q

The _________________________________________ is the top information security officer reporting to the CIO. The CISO is a business manager first, technologist second.

A

chief information security officer

125
Q

Kali _______________ incorporates more than 300 penetration testing and security auditing programs.

A

Linux

126
Q

“Kali Linux is an open source project that is maintained and funded by _______________________, a provider of world-class information security training and penetration testing services.”

A

offensive security

127
Q

Pen testing is the same as vulnerability testing.

t or f

A

False

Pen testing is done by humans to determine the degree to which a malicious attacker can gain unauthorized access to your assets. A vulnerability scan is typically automated.

128
Q

A vulnerability scanner looks for the following types of vulnerabilities:

Use of _____[a]_____ passwords or common passwords
Missing patches
Open _____[b]_____
Misconfiguration of operating systems and software
_____[c]_____ IP addresses

A

a. default
b. ports
c. active

129
Q

The Advanced Cyber Security Center (ACSC) is a _____[a]_____ organization that brings together industry, academia, and government to address advanced cyber threats.

The organization shares information on cyber threats, engages in cybersecurity research and development, and creates _____[b]_____ programs to promote the cybersecurity profession.

A

a. non-profit

b. education

130
Q

“The ISC was created in 2001 following the successful detection, analysis, and widespread warning of the ______________ worm.

A

Li0n

131
Q

The Internet Storm Center (ISC) gathers millions of _____________________ from intrusion detection systems every day using sensors covering 500,000 IP addresses in over 50 countries.

A

log entries

132
Q

CERT (in regards to SEI) stands for what?

A

Computer emergency response team

133
Q

The CERT Division of SEI studies and solves problems in the cybersecurity arena including security vulnerabilities in _____[a]_____ products, changes in _____[b]_____ systems, and training to help improve cybersecurity.

A

a. software

b. networked

134
Q

SCAP is a method for using specific standards to automate vulnerability management, measurement, and policy compliance evaluation.
t or F

A

True

135
Q

The ________________________________________________________ is a U.S. government repository of standards-based vulnerability management data that uses SCAP.

A

National vulnerability database

136
Q

The NVD uses the Common Vulnerability ________________ System to assess the impact of vulnerabilities.

A

scoring

137
Q

SCAP is the acronym for what?

A

security content automation protocol

138
Q

The Convention on Cybercrime is also known as the _______________________________________________________

A

Budapest convention on cybercrime

139
Q

A _________________________________________________ (or PIA) ensures that personally identifiable information (PII) is properly handled throughout an organization.

A

privacy impact assessment

140
Q

Computer Fraud and Abuse Act was created in 1986

t of f

A

true

141
Q

The Computer Fraud and Abuse Act (CFAA) makes it a crime to knowingly access a computer considered either a government computer or a computer used in interstate _________________, without permission.

A

commerce

142
Q

What are the primary sources of laws and regulations in the United States?

A

statutory/written laws

common/established by court

administrative/government agencies

143
Q

“BJA provides leadership and services in ____________________ administration and criminal justice policy development to support local, state, and tribal law enforcement in achieving safer communities.”

A

grant

144
Q

The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical ______________________________.”

A

infrastructure

145
Q

The Software & Information Industry Association is the principal trade association for the software and digital content industry.

SIIA provides global services in government relations, business development, corporate education and ____________________________ protection to the leading companies that are setting the pace for the digital age.”

A

intellectual property

146
Q

“The mission of the Internet Crime Complaint Center is to provide the public with a reliable and convenient _______________________ mechanism to submit information to the Federal Bureau of Investigation concerning suspected Internet-facilitated criminal activity and to develop effective alliances with law enforcement and industry partners.”

A

reporting

147
Q

“NW3C provides a nationwide support system for ___________________________ and regulatory agencies involved in the prevention, investigation and prosecution of economic and high-tech crime.”

A

law enforcement

148
Q

A computer may be involved in a cybercrime in different ways (per our reading).

A

computer-targeted/ targeted

computer-incidental/information like customer lists for traffickers

computer-assisted/used as a tool

149
Q

An open lobby that allows a visitor to walk straight through to the inside facilities represent what kind of common threat?

A

physical facilities

150
Q

Malware represents what kind of common threat?

A

devices

151
Q

A misconfigured firewall represents what kind of common threat?

A

LAN

152
Q

Software as a service (SaaS) is a subscription-based model that provides access to software that is centrally hosted and accessed by users via a _____[a]_____.

Platform as a service (PaaS) provides a platform that allows an organization to develop, run, and manage its _____[b]_____ on the service’s hardware using tools that the service provides.

Infrastructure as a service (IaaS) provides _____[c]_____ computing resources such as hardware, software, servers, storage and other infrastructure components over the Internet.

Note: no partial credit given

A

a. web browser
b. applications
c. virtualized

153
Q

Data theft by users can cost organizations financially resulting in damage to an organization’s _____[a]_____ or posing a legal _____[b]_____ associated with disclosure of sensitive information.

A

a. reputation

b. liability