• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
What is the purpose of non-repudiation?
(a) transforming plaintext to ciphertext
(b) Ensuring that received data hasn't changed in transit
(c) Preventing someone from denying that they took a specific action
(d) Hiding one piece of data in another piece of data
(c) Preventing someone from denying that they took a specific action
Which of the following refers to one of the testing stages in the software development process performed by customers or end users?
(a) NAT
(b) EULA
(c) UAT
(d) UAC
(c) UAT
The practice of sending unsolicited messages over Bluetooth is also known as:
(a) Bluejacking
(b) Phishing
(c) SPIM
(d) Bluesnarfing
(a) Bluejacking
Phishing scams targeting a specific group of users are also referred to as:
(a) Spear phishing
(b) Pharming
(c) Bluejacking
(d) Tailgating
(a) Spear phishing
What is war chalking?
(a) Marking unsecured wireless networks
(b) SSID discovery
(c) Scanning for open ports
(d) Finding unsecured wireless networks
(a) Marking unsecured wireless networks
Which of the following fall(s) into the category of social engineering attacks? (Select all that apply)
(a) Vishing
(b) Spear phishing
(c) Xmas attack
(d) MAC spoofing
(e) Whaling
(a) Vishing
(b) Spear phishing
(e) Whaling
Which of the following terms refers to a microchip embedded on the motherboard of a personal computer or laptop that can store keys, passwords and digital certificates?
(a) HCL
(b) TPM
(c) FRU
(d) EFS
(b) TPM
Finding vulnerability in an application by feeding it incorrect input is also known as:
(a) Exception handling
(b) Application hardening
(c) Patching
(d) Fuzzing
(d) Fuzzing
Which of the following is an example of a multi-factor authentication?
(a) Password and biometric scan
(b) User name and PIN
(c) Iris and fingerprint scan
(d) Smart card and identification badge
(a) Password and biometric scan
Penetration test of a computer system carried out without the prior knowledge on how the system works is also known as:
(a) Auditing
(b) Black box testing
(c) White hat testing
(d) White box
(b) Black box testing
Antivirus software can be kept up to date through: (Select all that apply)
(a) Virtualization
(b) Engine updates
(c) Virus signature updates
(d) Auditing
(b) Engine updates
(c) Virus signature updates
In this access control model every resource has a sensitivity label matching a clearance level assigned to a user.
(a) RBAC
(b) MAC
(c) HMAC
(d) DAC
(b) MAC
Which of the following is used to prevent switching loops?
(a) STP
(b) UTP
(c) RAS
(d) HMAC
(a) STP
The last default rule on a firewall is to:
(a) Allow all traffic
(b) Deny all traffic
(c) Unblock all ports
(d) Create an exception
(b) Deny all traffic
Which of the following ports are used by NetBIOS? (Select all that apply)
(a) 138
(b) 139
(c) 161
(d) 162
(e) 137
(a) 138
(b) 139
(e) 137
Which of the following sequences of steps adheres to the order of volatility while collecting an evidence?
(a) Archival media, disk files, temporary files, memory dump
(b) Memory dump, temporary files, disk files, archival media
(c) Temporary files, memory dump, archival media, disk files
(d) Memory dump, disk files, temporary files, archival media
(b) Memory dump, temporary files, disk files, archival media
Phishing scams targeting people holding high positions in an organization or business are also known as:
(a) Tailgating
(b) Pharming
(c) Shoulder surfing
(d) Whaling
(d) Whaling
What is the name of a storage solution used to retain copies of private encryption keys?
(a) Key escrow
(b) Proxy
(c) Recovery agent
(d) Trusted OS
(a) Key escrow
Which of the following are the features of a Common Access Card (CAC)? (Select all that apply)
(a) Provides access to low security areas
(b) Any type of identification badge with a photo
(c) Issued by United States Department of Defense (DoD)
(d) Smart card
(c) Issued by United States Department of Defense (DoD)
(d) Smart card
Copies of lost private encryption keys can be retrieved from a key database by:
(a) Power users
(b) GPS tracking
(c) Backup operators
(d) Recovery agents
(d) Recovery agents
Which of the following can stop attacks on the network?
(a) NIDS
(b) NIPS
(c) HIDS
(d) HIPS
(b) NIPS
A type of attack exploiting the TCP three-way handshake process is also known as:
(a) SYN flood
(b) Social engineering
(c) Xmas attack
(d) DDoS
(a) SYN flood
Which security measure is in place when a client is denied access to the network due to outdated antivirus software?
(a) IPsec
(b) DMZ
(c) NAC
(d) NAT
(c) NAC
Which type of intrusion detection relies on the previously established baseline of normal network activity?
(a) Signature-based IDS
(b) Managed Switch
(c) MD-IDS
(d) AD-IDS
(d) AD-IDS
VLAN membership can be set through: (Select all that apply)
(a) MAC addresses
(b) Switch ports
(c) Trunk ports
(d) Encryption
(a) MAC addresses
(b) Switch ports