• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
SHA and MD5 are:
(a) Encryption algorithms
(b) Hash functions
(c) Virus signatures
(d) Trust models
(b) Hash functions
Which of the following provide the means for checking data integrity? (Select two answers)
(a) WEP
(b) RC4
(c) WPA2
(d) SHA-1
(e) MD5
(d) SHA-1
(e) MD5
Packet sniffer is a common term for:
(a) Router
(b) Multilayer switch
(c) Port scanner
(d) Protocol Analyzer
(d) Protocol Analyzer
A set of rules enforced in a network that restrict the use to which the network may be put is also known as:
(a) FAQ
(b) AUP
(c) UAT
(d) OEM
(b) AUP
Which of the following protocols periodically reauthenticates a client?
(a) CHAP
(b) PAP
(C)SHA
(d) MD5
(a) CHAP
A piece of hardware and associated software/firmware that usually attaches to the inside of a PC or server and provides at least the minimum of cryptographic functions is called:
(a) PKI
(b) OUI
(c) HSM
(d) BIOS
(c) HSM
An IPv6 address consists of:
(a) 48 bits
(b) 64 bits
(c) 32 bits
(d) 128 bits
(d) 128 bits
Which of the following terms refers to an access control method based on user identity?
(a) MAC
(b) RBAC
(c) HMAC
(d) DAC
(d) DAC
Coding errors and security vulnerabilities in software that has already been released can be rectified through:
(a) Fuzzing
(b) Virtualization
(c) Patch management
(d) Application hardening
(c) Patch management
Which of the following is a stream cipher?
(a) RC4
(b) 3DES
(c) DES
(d) AES
(a) RC4
Advanced Encryption Standard (AES): (Select all that apply)
(a) Uses block cipher algorithm
(b) Is an asymmetric encryption algorithm
(c) Requires multiple passes to encrypt data
(d) Is a symmetric encryption algorithm
(e) Uses 128-, 192-, and 256-bit keys
(a) Uses block cipher algorithm
(d) Is a symmetric encryption algorithm
(e) Uses 128-, 192-, and 256-bit keys
Which of the following allows for encrypting e-mail messages?
(a) PGP
(b) SMTP
(c) OVAL
(d) PPP
(a) PGP
Which of the following actions can be taken by an IDS? (Select two answers)
(a) Sending an alert
(b) Closing down connection
(c) Terminating process
(d) Logging
(e) Reconfiguring firewall
(a) Sending an alert
(d) Logging
Which of the following ports are used by the File Transfer Protocol (FTP)? (Select two answers)
(a) 23
(b) 21
(c) 22
(d) 25
(e) 20
(b) 21
(e) 20
Which of the following measures fall(s) into the category of detective security controls? (Select all that apply)
(a) Security guard
(b) IDS
(c) Video surveillance
(d) IPS
(b) IDS
(c) Video surveillance
An access control model in which access to resources is granted or denied depending on Access Control List (ACL) entries is also known as:
(a) Mandatory Access Control
(b) Rule-Based Access Control
(c) Lattice-Based Access Control
(d) Role-Based Access Control
(b) Rule-Based Access Control
Which of the following provide availability? (Select all that apply)
(a) Hot site
(b) Encryption
(c) RAID 5
(d) RAID 1
(e) RAID 0
(a) Hot site
(c) RAID 5
(d) RAID 1
Which of the following terms refers to software or hardware based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of a corporate network?
(a) UAT
(b) LTO
(c) EULA
(d) DLP
(d) DLP
Which of the following port numbers is used by Kerberos?
(a) 23
(b) 22
(c) 80
(d) 88
(d) 88
Which of the following attacks uses multiple compromised computer systems against its target?
(a) Logic bomb
(b) DoS
(c) DDoS
(d) Botnet
(c) DDoS
A lightly protected subnet placed on the outside of the company's firewall consisting of publicly available servers is also referred to as:
(a) Access Point (AP)
(b) DMZ
(c) VLAN
(d) VPN
(b) DMZ
Which of the following terms refers to a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain, regardless of their physical location?
(a) DMZ
(b) VLAN
(c) SNMP community
(d) MAC filtering
(b) VLAN
In which of the cloud computing infrastructure types clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment?
(a) IaaS
(b) RAS
(c) PaaS
(d) SaaS
(a) IaaS
WPA2 standard is also known as:
(a) 802.3
(b) 802.1X
(c) 802.11i
(d) 802.11
(c) 802.11i
One of the measures used in securing an Ethernet switch includes disabling unused ports.
(a) True
(b) False
(a) True