Weaknesses 3-21 Flashcards

1
Q

Piggybacking can best be prevented by which physical control?

A

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An audit trail not only reveals the who, what, where, and how for logged activity–but also what?

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is a password generator a less effective security control than others such as using dictionary attack tools or just hiding cleartext?

A

Because they often cause users to write their passwords down, which creates a new vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A collection of data from different sources that is targeted at one group or for a specific objective is called what?

A

Datamart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What important variable is used when evaluating the effectiveness of biometric systems?

A

Crossover Error Rate (CER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Crossover Error Rate in biometric systems?

A

The point at which false acceptance and false rejection rates are equal. Lower CER is higher accuracy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of computer memory improves system performance by acting as a special storage area for information that is retrieved often, especially while an application is in use.

A

Cache memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TRUE/FALSE - Database security measures can protect against buffer overflow attacks?

A

FALSE - Buffer overflows are an application weakness, not a database security weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Clark-Wilson model requires users do what?

A

Use an external program to interface with an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The external program used in Clark-Wilson models is also referred to as what?

A

Access Triple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What security service is provided if a sender encrypts data with the receiver’s public key?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TRUE/FALSE - Message Authentication Code is part of the Kerberos authentication implementation?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In a hospital type environment, what role would be responsible for protecting health and personal information?

A

Chief Privacy Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a common technique spammers use to hide the origin of their spam email?

A

Blacklist of companies with wide open mail server relays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In programming, what language type represents binary to the processor?

A

Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What Windows utility can be used to encrypt the database that holds all of the system’s, or network’s passwords?

A

Syskey

17
Q

Where are passwords stored in a Windows environment by default?

A

A Security Accounts Management (SAM) databse

18
Q

What is the main purpose of interrogating an employee?

A

To obtain evidence for trial

19
Q

Access controls that give subjects and objects a range of upper and lower bound capabilities are called what?

A

Lattice based

20
Q

SOAP encapsulates what?

A

Web service request and authentication data

21
Q

What is a meta-directory?

A

Central directory for all passwords and passphrases for proper password management

22
Q

TRUE/FALSE - Discretionary is not a single sign-on access approach

A

TRUE

23
Q

Platforms using the CORBA framework send requests to where?

A

Object Request Brokers (ORBs)

24
Q

OSI Data Link Layer is broken down into what two sublayers?

A

802.2 and 802.3

25
Q

Tunnel mode is used in what VPN implementations?

A

IPSec