Weaknesses 3-22 Flashcards
What type of security mechanism is used in ActiveX?
Digital Signature?
What type of attack redirects victim from legitimate websites to fake websites using DNS poisoning?
Pharming
Which security model incorporates “no write up” and “no read down” rules?
Biba
The Biba model is focused on protecting Confidentiality or Integrity?
Integrity
Downstream liabilities are the result of what?
Shared networks with external entities
ITSEC criteria uses what two letters for ratings?
E-F
Orange book uses what letter range for ratings?
A-D
TRUE/FALSE - Budget expenses by individuals are considered personal data
FALSE
Phase Alternative Line is a standard that provides requirements for monitors used with what?
CCTVs
TRUE/FALSE - Fire extinguishers should be inspected yearly
FALSE
How many address bits does IPv6 have?
128
When are computer files no longer considered hearsay evidence?
When the computer output is done during regular business hours
Halon fire extinguishers are restricted and need to be replaced with what?
FM-200
The purpose of plenum cabling is to protect what?
Human safety
How do plenum cables protect human safety
By releasing nontoxic chemicals when burned
Trued system design in components is essential for what CIA purpose?
Integrity
Multi-threading means a computer can do what?
Run and process multiple requests at one time
What is a common omission and mistake companies make with their security policies?
Penalties for noncompliance
Fire extinguishers should be within how many feet of electrical equipment?
50
A systematic approach to determine how different threats could be successful is what?
Threat modeling
VLAN hopping by means of modifying frame-tag values is possible with what type of rogue device?
A switch
What is the first step in disaster recover and contingency planning?
Perform a business impact analysis
TRUE/FALSE - It is the responsibility of the business continuity committee to ensure budgets are on track
FALSE
A KRI is a metric that indications when what?
A risk exceeds a threshhold
What type of architecture provides web-based distributed computing technology in distinct units?
Service-Oriented Architecture (SOA)
Allowing one object to have two security classifications requires what?
Polyinstantiation
EJC provides interfaces and methods to allow different applications to communicate across what kind of environment?
Networked
False Rejection Rate is a Type I or Type II error?
Type 1
A Type II error is also known as what?
False Acceptance Rate
Use and misuse cases are commonly depicted using what language?
Unified Modeling Language (UML)
What is the different between a fraggle attack and smurf attack?
Fraggle attack uses UDP instead of ICMP
BGP protocol lives within what TCP/IP model layer?
Internet
What type of policies are usually directives devised by management to protect individual systems?
System-specific
185 meters is the limit of what kind of cable?
10Base2 or Thin Net
The exchange point between systems and users is called what?
User interface
The process of producing for a court all electronically stored information relevant to legal cases is called what?
e-Discovery
What type of token device is driven by time or events?
Synchronous token device
TRUE/FALSE - Synchronous token devices are challenge-based
True