Weaknesses 3-22 Flashcards

(95 cards)

1
Q

What type of security mechanism is used in ActiveX?

A

Digital Signature?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of attack redirects victim from legitimate websites to fake websites using DNS poisoning?

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which security model incorporates “no write up” and “no read down” rules?

A

Biba

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Biba model is focused on protecting Confidentiality or Integrity?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Downstream liabilities are the result of what?

A

Shared networks with external entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ITSEC criteria uses what two letters for ratings?

A

E-F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Orange book uses what letter range for ratings?

A

A-D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TRUE/FALSE - Budget expenses by individuals are considered personal data

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phase Alternative Line is a standard that provides requirements for monitors used with what?

A

CCTVs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TRUE/FALSE - Fire extinguishers should be inspected yearly

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many address bits does IPv6 have?

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When are computer files no longer considered hearsay evidence?

A

When the computer output is done during regular business hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Halon fire extinguishers are restricted and need to be replaced with what?

A

FM-200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The purpose of plenum cabling is to protect what?

A

Human safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do plenum cables protect human safety

A

By releasing nontoxic chemicals when burned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trued system design in components is essential for what CIA purpose?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Multi-threading means a computer can do what?

A

Run and process multiple requests at one time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a common omission and mistake companies make with their security policies?

A

Penalties for noncompliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fire extinguishers should be within how many feet of electrical equipment?

A

50

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A systematic approach to determine how different threats could be successful is what?

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

VLAN hopping by means of modifying frame-tag values is possible with what type of rogue device?

A

A switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the first step in disaster recover and contingency planning?

A

Perform a business impact analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TRUE/FALSE - It is the responsibility of the business continuity committee to ensure budgets are on track

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A KRI is a metric that indications when what?

A

A risk exceeds a threshhold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What type of architecture provides web-based distributed computing technology in distinct units?
Service-Oriented Architecture (SOA)
26
Allowing one object to have two security classifications requires what?
Polyinstantiation
27
EJC provides interfaces and methods to allow different applications to communicate across what kind of environment?
Networked
28
False Rejection Rate is a Type I or Type II error?
Type 1
29
A Type II error is also known as what?
False Acceptance Rate
30
Use and misuse cases are commonly depicted using what language?
Unified Modeling Language (UML)
31
What is the different between a fraggle attack and smurf attack?
Fraggle attack uses UDP instead of ICMP
32
BGP protocol lives within what TCP/IP model layer?
Internet
33
What type of policies are usually directives devised by management to protect individual systems?
System-specific
34
185 meters is the limit of what kind of cable?
10Base2 or Thin Net
35
The exchange point between systems and users is called what?
User interface
36
The process of producing for a court all electronically stored information relevant to legal cases is called what?
e-Discovery
37
What type of token device is driven by time or events?
Synchronous token device
38
TRUE/FALSE - Synchronous token devices are challenge-based
True
39
In terms of Stratum's, what level is the most authoritative?
Stratum 0
40
The Red book addresses what?
Network components and products
41
The qualitative identification of *susceptibility* that can increase the business or productivity impact of threat events is also referred to as what?
Vulnerability assessment
42
COBIT is commonly used to meet the objectives of what framework?
COSO
43
Government agencies commonly use what encryption device based on IPSec?
High Assurance Internet Protocol Encrypter (HAIPE)
44
Remote Journaling is an automatic function that does what?
Sends transaction logs of backed up files to offsite location
45
The security kernel consists of what?
Software, hardware, and firmware
46
Continuity of Operations (COOP) focuses on what?
Restoring an organizations essential functions at an alternate site and performing those functions for up to 30 days
47
In an ISDN connection, which wire sends data and which receives?
B channels send data, D channels send control information
48
TRUE/FALSE - As long as employees are notified, a company can implement keyboard monitoring without consent?
TRUE
49
What port does Network Time Protocol (NTP) use?
UDP 123
50
A university might use what type of network architecture to connect different buildings?
MAN
51
Where does the SPX protocol reside in the TCP/IP model?
Host-to-host
52
In software development, the more a module can do on it's on is better and is referred to as higher what?
Cohesion
53
Modules should aim for what level of cohesiveness and coupling?
Highly cohesive, low coupling
54
Interference can be prevented with what technique in a database?
Polyinstantiation
55
Polymorphism is the act of what?
Two objects responding differently to the same command
56
Unit testing occurs in what software development phase?
Development
57
Air Gapping is commonly used to protect what?
Code repositories
58
What type of virutal firewall monitors individual traffic links?
Bridge-mode
59
In SNMP a community string is similar to what protection mechanism?
Password generator
60
What range is the list of well known ports?
0-123
61
What is a physical layer standard for fiber-optic lines?
SONET
62
Modern bridges are more advanced and can work at what two OSI model layers?
Data link and Network
63
IBM Mainframes used what polling protocol?
Synchronous Data Link Control (SDLC)
64
IPng is another term for what new IP protocol?
IPv6
65
TRUE/FALSE - IPv6 requires NAT
FALSE
66
What 802.11 standard provides QoS?
802.11e
67
High Level Data Link Control (HDLC) is based upon SDLC and improves it how?
Full duplex and higher throughput
68
What two OSI layers correspond to the Network Access layer in the TCP/IP model?
Data Link and Physical
69
The OSI Transport directly maps to which TCP/IP layer?
Host-to-host
70
TCP and UDP work at what layer in the OSI / TCIP/IP models?
Transport or Host-to-Host
71
TRUE/FALSE - Protocols at the Network Layer do not ensure the delivery of packets
TRUE
72
ICMP, RIP, OSFP, BGP, and IGMP all live at what layer of the OSI and TCP/IP model?
Network and Internet
73
The 802.X standards live at what OSI layer?
Data Link
74
Carrier Sense Multiple Action / Collision Detection (CSMA/CD) determines what?
When the best time to send and transmit data is
75
CMSA/CA differs from CSMA/CD how?
Computers will signal intent to send data
76
What temperature does most electronic equipment suffer major damage?
175 F
77
What type of IDS can detect new attacks not previously identified?
Behavior based
78
TRUE/FALSE - Compliance testing occurs during disaster recovery and BCP testing plans
FALSE
79
A formal meeting of senior organizational leaders to determine whether management systems are performing effectively is known as what?
Management Review
80
What type of data mining identifies relationships between data elements and uses rule discovery?
Statistical
81
What is the first step in preventing data loss / leakage?
Perform data inventory
82
How often should disaster recovery and BCP plans be tested?
At least annually, or as changes occur
83
What is a common illumination metric used for lighting?
Two foot candles
84
What kind of loss can a company experience after a disgruntled worker deletes files or information regarding customer accounts?
Delayed loss
85
MD2 produces a hash of what size?
128-bit
86
What security technology uses and measures magnetic fields for variations?
Proximity
87
When a computer cannot carry out its task either intentional or accidentally it is referred to as what?
Compromise
88
Priveleged Attribute Certificates (PACs) are used in what environment?
SESAME
89
A security mechanism used to take a copy of an object and repopulate it with different data, used often for multiple classifications is referred to as what?
Polyinstiantiation
90
A race condition exists when what happens in a program?
The program goes into a vulnerable state before ensuring the vulnerable conditions are mitigated
91
What is derived from a passphrase?
Virtual password
92
Identifying feasible adverse effects on our assets is also referred to as what?
Threat modeling
93
In regards to virtual machines and firewalls, a hypervisor allows for monitoring of what?
All activities on a host machine
94
TRUE/FALSE - AES is symmetric
TRUE
95
What term is commonly interchanged with hacker, but more specifically refers to a person?
Cracker