Weaknesses 3-20 Flashcards

1
Q

What is the appropriate default level for an access control mechanism?

A

No access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Vigenere cipher was developed in 16th century France. What does it use as a key?

A

A secret word

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are FDDI and FDDI-2 different?

A

FDDI-2 allows for fixed bandwidth to be assigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SSL requires what kind of infrastructure for certificate authorities and certificates?

A

PKI - Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In 1976 Diffie and Hellman introduced what cryptography technology?

A

Electronic Key Distribution - Diffie-Hellmen key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What three types of attacks fall under the umbrella of timing attacks?

A

Between the lines, NAK, and line disconnect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TRUE/FALSE - SYN attack is considered a timing attack

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Allowing one object to have two security classifications requires what?

A

Polyinstantiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TRUE / FALSE - PPTP can only work over IP

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the first step in an audit?

A

Determine goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

During what step of the penetration testing process do you perform port scans and identify resources?

A

Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TRUE/FALSE - TPM uses two types of internal memory for specific purposes. Persistent memory, which is static and contains the endorsement key / storage key — and Versatile memory, which is dynamic and contains attestation key, platform configuration hashes, and storage keys

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the six phases of a project?

A

Initiate project, perform BIA, create strategy, create plan, implement, test, maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between 802.11a and 802.11b?

A

802.11a works in 5GHz range and provides faster data transfer speed than 802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If a company has high turnover rate, which access control structure is best?

A

Role base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Determining what a user can access based on the data, not the subject’s identity, is called what?

A

Content-based access control

17
Q

What is the main purpose of information risk management (IRM)?

A

It is the process of identifying, assessing, and reducing the risk to an acceptable level

18
Q

Which group states that the internet is a privilege and should be treated and used with respect?

A

Internet Architecture board

19
Q

What is the goal of Operational security?

A

To keep production in proper working order, and protecting the hardware and media from unauthorized access.

20
Q

What is the difference between confusion and diffusion?

A

Confusion is carried out with substitution, diffusion is carried out through transposition

21
Q

A virus that affects both a boot record and files in a directory is called what?

A

Multipartite

22
Q

What is the proper steps in selecting and implementing a new computer project?

A

Evaluation, certification, acredidation

23
Q

What architecture type is used when an external router is used to filter traffic before it enters the network and another screening service is used to monitor traffic before it enters the internal network

A

Screened-subnet

24
Q

Why are network sniffers dangerous to an environment?

A

Their presence and activities are not auditable

25
Q

During which phase of the software development life cycle should attack surface analysis and threat modeling be performed?

A

Design

26
Q

What is the difference between OSA and SKA?

A

SKA requires a WEP encryption key

27
Q

What is the product of data mining?

A

Meta data

28
Q

If an organization has a formal media library, which individual is reponsible for the overall security and protection of the media?

A

Media librarian

29
Q

TRUE/FALSE - The volume of data is a critical factor in DLP

A

FALSE