Weaknesses 3-22 Flashcards
What type of security mechanism is used in ActiveX?
Digital Signature?
What type of attack redirects victim from legitimate websites to fake websites using DNS poisoning?
Pharming
Which security model incorporates “no write up” and “no read down” rules?
Biba
The Biba model is focused on protecting Confidentiality or Integrity?
Integrity
Downstream liabilities are the result of what?
Shared networks with external entities
ITSEC criteria uses what two letters for ratings?
E-F
Orange book uses what letter range for ratings?
A-D
TRUE/FALSE - Budget expenses by individuals are considered personal data
FALSE
Phase Alternative Line is a standard that provides requirements for monitors used with what?
CCTVs
TRUE/FALSE - Fire extinguishers should be inspected yearly
FALSE
How many address bits does IPv6 have?
128
When are computer files no longer considered hearsay evidence?
When the computer output is done during regular business hours
Halon fire extinguishers are restricted and need to be replaced with what?
FM-200
The purpose of plenum cabling is to protect what?
Human safety
How do plenum cables protect human safety
By releasing nontoxic chemicals when burned
Trued system design in components is essential for what CIA purpose?
Integrity
Multi-threading means a computer can do what?
Run and process multiple requests at one time
What is a common omission and mistake companies make with their security policies?
Penalties for noncompliance
Fire extinguishers should be within how many feet of electrical equipment?
50
A systematic approach to determine how different threats could be successful is what?
Threat modeling
VLAN hopping by means of modifying frame-tag values is possible with what type of rogue device?
A switch
What is the first step in disaster recover and contingency planning?
Perform a business impact analysis
TRUE/FALSE - It is the responsibility of the business continuity committee to ensure budgets are on track
FALSE
A KRI is a metric that indications when what?
A risk exceeds a threshhold
What type of architecture provides web-based distributed computing technology in distinct units?
Service-Oriented Architecture (SOA)
Allowing one object to have two security classifications requires what?
Polyinstantiation
EJC provides interfaces and methods to allow different applications to communicate across what kind of environment?
Networked
False Rejection Rate is a Type I or Type II error?
Type 1
A Type II error is also known as what?
False Acceptance Rate
Use and misuse cases are commonly depicted using what language?
Unified Modeling Language (UML)
What is the different between a fraggle attack and smurf attack?
Fraggle attack uses UDP instead of ICMP
BGP protocol lives within what TCP/IP model layer?
Internet
What type of policies are usually directives devised by management to protect individual systems?
System-specific
185 meters is the limit of what kind of cable?
10Base2 or Thin Net
The exchange point between systems and users is called what?
User interface
The process of producing for a court all electronically stored information relevant to legal cases is called what?
e-Discovery
What type of token device is driven by time or events?
Synchronous token device
TRUE/FALSE - Synchronous token devices are challenge-based
True
In terms of Stratum’s, what level is the most authoritative?
Stratum 0
The Red book addresses what?
Network components and products
The qualitative identification of susceptibility that can increase the business or productivity impact of threat events is also referred to as what?
Vulnerability assessment
COBIT is commonly used to meet the objectives of what framework?
COSO
Government agencies commonly use what encryption device based on IPSec?
High Assurance Internet Protocol Encrypter (HAIPE)
Remote Journaling is an automatic function that does what?
Sends transaction logs of backed up files to offsite location
The security kernel consists of what?
Software, hardware, and firmware
Continuity of Operations (COOP) focuses on what?
Restoring an organizations essential functions at an alternate site and performing those functions for up to 30 days
In an ISDN connection, which wire sends data and which receives?
B channels send data, D channels send control information
TRUE/FALSE - As long as employees are notified, a company can implement keyboard monitoring without consent?
TRUE
What port does Network Time Protocol (NTP) use?
UDP 123
A university might use what type of network architecture to connect different buildings?
MAN
Where does the SPX protocol reside in the TCP/IP model?
Host-to-host
In software development, the more a module can do on it’s on is better and is referred to as higher what?
Cohesion
Modules should aim for what level of cohesiveness and coupling?
Highly cohesive, low coupling
Interference can be prevented with what technique in a database?
Polyinstantiation
Polymorphism is the act of what?
Two objects responding differently to the same command
Unit testing occurs in what software development phase?
Development
Air Gapping is commonly used to protect what?
Code repositories
What type of virutal firewall monitors individual traffic links?
Bridge-mode
In SNMP a community string is similar to what protection mechanism?
Password generator
What range is the list of well known ports?
0-123
What is a physical layer standard for fiber-optic lines?
SONET
Modern bridges are more advanced and can work at what two OSI model layers?
Data link and Network
IBM Mainframes used what polling protocol?
Synchronous Data Link Control (SDLC)
IPng is another term for what new IP protocol?
IPv6
TRUE/FALSE - IPv6 requires NAT
FALSE
What 802.11 standard provides QoS?
802.11e
High Level Data Link Control (HDLC) is based upon SDLC and improves it how?
Full duplex and higher throughput
What two OSI layers correspond to the Network Access layer in the TCP/IP model?
Data Link and Physical
The OSI Transport directly maps to which TCP/IP layer?
Host-to-host
TCP and UDP work at what layer in the OSI / TCIP/IP models?
Transport or Host-to-Host
TRUE/FALSE - Protocols at the Network Layer do not ensure the delivery of packets
TRUE
ICMP, RIP, OSFP, BGP, and IGMP all live at what layer of the OSI and TCP/IP model?
Network and Internet
The 802.X standards live at what OSI layer?
Data Link
Carrier Sense Multiple Action / Collision Detection (CSMA/CD) determines what?
When the best time to send and transmit data is
CMSA/CA differs from CSMA/CD how?
Computers will signal intent to send data
What temperature does most electronic equipment suffer major damage?
175 F
What type of IDS can detect new attacks not previously identified?
Behavior based
TRUE/FALSE - Compliance testing occurs during disaster recovery and BCP testing plans
FALSE
A formal meeting of senior organizational leaders to determine whether management systems are performing effectively is known as what?
Management Review
What type of data mining identifies relationships between data elements and uses rule discovery?
Statistical
What is the first step in preventing data loss / leakage?
Perform data inventory
How often should disaster recovery and BCP plans be tested?
At least annually, or as changes occur
What is a common illumination metric used for lighting?
Two foot candles
What kind of loss can a company experience after a disgruntled worker deletes files or information regarding customer accounts?
Delayed loss
MD2 produces a hash of what size?
128-bit
What security technology uses and measures magnetic fields for variations?
Proximity
When a computer cannot carry out its task either intentional or accidentally it is referred to as what?
Compromise
Priveleged Attribute Certificates (PACs) are used in what environment?
SESAME
A security mechanism used to take a copy of an object and repopulate it with different data, used often for multiple classifications is referred to as what?
Polyinstiantiation
A race condition exists when what happens in a program?
The program goes into a vulnerable state before ensuring the vulnerable conditions are mitigated
What is derived from a passphrase?
Virtual password
Identifying feasible adverse effects on our assets is also referred to as what?
Threat modeling
In regards to virtual machines and firewalls, a hypervisor allows for monitoring of what?
All activities on a host machine
TRUE/FALSE - AES is symmetric
TRUE
What term is commonly interchanged with hacker, but more specifically refers to a person?
Cracker