• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/105

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

105 Cards in this Set

  • Front
  • Back
Although it is sometimes thought to be immune to attacks, Apple has shown that it too can be the victim of attackers and encourages its uders to be more secure.

True or False?
True
In a general sense, security is defined as a state of freedom from danger or risk.

True or False?
True
Utility companies, telecommunications, and financial services are considered prime targets of cyberterrorists because they can significantly disrupt business and personal activities by destroying a few targets.

True or False?
True
Removing a rootkit from an infected computer is extremely difficult.

True or False?
True
TCP/IP hijacking is successful because several protocols, such as File Transfer Protocol (FTP) and Telnet, do not check the source IP addresses of the device from which they receive packets.

True or False?
True
Controlling wireless access of devices to the WLAN is accomplished by limiting a device's access to the access point (AP)

True or False?
True
WEP relies on a secret key that is shared between the wireless client device and the AP.

True or False?
True
IEEE 802.11 WEP shared secret keys must be a minimum of 32 bits in length.

True or False?
False
Mandatory Access Control (MAC) model is the least restrictive access control model.

True or False?
False
Although ACLs can be associated with any type of object, these lists are most often viewed in relation to files maintained by the operating system.

True or False?
True
In a _____ attack, attackers can use hundreds or thousands of computers in an attack against a single computer or network.
d. Distributed
_____ ensures that only authorized parties can view information.
d. Confidentiality
_____ ensures that information is correct and that no unauthorized person or malicious software has altered that data.
d. Integrity
Business _____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
b. Data
According to the 2007 FBI Computer Crime and Security Survey, the loss due to the theft of confidential data for 494 respondents was approximately _____.
b. $10 Million
____ involves using someone's personal information, such as social security numbers, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating.
d.) Identity theft
Under the _____, healthcare enterprises must guard protected health information and implemented policies and procedures to safeguard it, whether it be in paper or electronic format.
c.) HIPAA
What is the maximum fine for those who wrongfully disclose individually indentifiable health information with the intent to sell it?
b.) $250,000
In a company of 500 employees, it is estimated that _____ employees would be required to combat a virus attack.
b.) five
Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information is sometimes known as _____.
c.) cybercrime
A security _____ focuses on the administration and management of plans, policies, and people.
c.) manager
A study by Foote Partners showed that security certifications earn employees ____ percent more than their uncertified counterparts.
a.) 10 - 14
A computer ____ is a program that secretly attaches itself to a legitimate "carrier", such as a document or program, and then executes when that document is opened or program is launched.
c.) virus
A _____ virus can interrupt almost any function executed by the computer operating system and alter it for its own malicious purposes.
d.) resident
In order to avoid detection, some viruses can alter how they appear. These are known as _____ viruses.
c.) metamorphic
A _____ is a program advertised as performing one activity but actually does something else.
d.) Trojan
A _____ is a computer program or part of a program that lies dormant until it is triggered by a specific logical event.
b.) Logic bomb
_____ involves horizontally seperating words, although it is still readable by the human eye.
d.) Word splitting
_____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
d.) Adware
Today's computer systems have a(n) _____ chip in which the contents can be rewritten to provide new functionality.
a.) PROM
Flash memory is a type of ____, nonvolatile computer memory that can be electrically erased and rewritten repeatedly.
a.) EEPROM
A _____ is a single, dedicated hard disk-based file storage device that provides centralized and consolidated disk storage available to LAN users through a standard network connection.
b.) NAS
The ____ is the link between the cellular network and the wired telephone world and controls all transmitters and base stations in the cellular network.
d.) MTSO
____ is means of managing and presenting computer resources by function without regard to their physical layout or location.
d.) Virtualization
One type of virtualization in which an entire operating system environment is simulated is known as _____ virtualization.
b.) operating system
Creating and managing multiple server operating systems is known as ____ virtualization.
c.) server
Live migration can be used for ___; if the demand for a service or application increases, then network managers can quickly move this high-demand virtual machine to another physical server with more RAM or CPU resources.
c.) load balancing
A _____ is a cumulative package of all security updates plus additional features.
a.) service pack
A(n) ____ is a computer programming language that is typically interpreted into a language the computer can understand.
b.) scripting language
____ typically involves using client-side scripts written in JavaScript that are designed to extract information from the victim and then pass the information to the attacker.
b.) Cross site scripting (XSS)
____ is a process of ensuring that any inputs are "clean" and will not corrupt the system.
a.) input validation
____ is a language used to view and manipulate data that is stored in a relational database.
b.) SQL
____ hinges on an attacker being able to enter an SQL database query into a dynamic Web page.
c.) SQL injection
Regarding e-mail, ____ is responsible for incoming mail.
d.) POP3
SMTP servers can forward e-mail sent from an e-mail client to a remote domain. THis is known as _____.
c.) SMTP relay
____ is real-time communication between two or more users.
c.) Instant Messaging (IM)
In a P2P network, a ____ is a server program operated by the person or organization that wants to share the file.
d.) tracker
BitTorrent maximizes the transfer speed by gathering pieces of the file and downloading these peices simultaneously from users who alread have them. The collective pieces are called a ____.
d.) swarm
____ allows the administrator to configure a switch to redirect traffic that occurs on some or all ports to a designated monitoring port on the switch.
d.) Port mirroring
With wireless CSMA/CA, the amount of time that a device must wait after the medium is clear is called the ____.
b.) slot time
____ specifies that before a networked device starts to send, it should first listen (called carrier sensing) to see if any other device is transmitting.
d.) CSMA/CD
A(n) ____ attack makes a copy of the transmission before sending it to the recipient.
a.) relay
One approach to substituting a fraudulent IP address is to tarter the external DNS server and is called ____.
c.) DNS poisoning
An attacker could alter the MAC address in the ARP cache so that the corresponding IP address would point to a different computer, which is known as ____.
d.) ARP poisoning
Wireless location mapping is the formal expression for ____.
c.) war driving
The most common type of antenna for war driving is an omnidirectional antenna, also known as a ____ antenna.
c.) Dipole
A group of piconets in which connections exist between different piconets is called a ____.
c.) scatternet
____ is the unauthorized access of information from a wireless device through a bluetooth connection.
a.) Bluesnarfing
Using ____, networks can essentially be divided into three parts: network, subnet and host.
c.) Subnetting
____ IP addresses are not assigned to any specific user or organization; instead, they can be used by any user on the private internal network.
a.) Private
A variation of NAT is ____. Instead of giving each outgoing packet a different IP address, each packet is given the same IP address but a different TCP port number.
c.) PAT
____ examines the current state of a system or network device before it is allowed to connect to the network.
c.) NAC
The goal of ____ is to prevent computer with sub-optimal security from potentially infecting other computers through the network.
c.) NAC
____ packet filtering keeps a record of the state of a connection between an internal computer and an external server and then makes decisions based on the connection as well as the rule base.
c.) Stateful
The goal of a ____ is to hide the IP address of client systems inside the secure network.
a.) Proxy server
____ honeypots are used mainly by organizations to capture limited information regarding attacks on that organization's honeypot.
a.) Production
____ honeypots are complex to deploy and capture extensive information. These are used primarily by research, military and government organizations.
a.) Research
A(n) ____ attempts to identify inappropriate activity.
a.) IDS
A(n) ____ finds malicious traffic and deals with it immediately.
c.) IPS
____ work to protect the entire network and all devices that are connected to it.
d.) NIPS
____ can fully decode application-layer network protocols. Once these protocols are decoded, the different parts of the protocol can be analayzed for any suspicious behavior.
a.) Protocol analyzers
____ monitor internet traffic and block access to preselected websites and files.
c.) Internet content filters
In the early 1980s, the IEEE began work on developing computer network architecture standards. This work was called ____, and it quickly expanded into several different categories of network technology.
d.) Project 802
This IEEE ____ standard specifies a maximum rated speed of 54 Mbps using the 5 GHz spectrum.
a.) 802.11a
____ was designed to ensure that only authorized parties can view transmitted wireless information.
d.) WEP
____ can fully decode application-layer network protocols. Once these protocols are decoded, the different parts of the protocol can be analayzed for any suspicious behavior.
a.) Protocol analyzers
____ monitor internet traffic and block access to preselected websites and files.
c.) Internet content filters
In the early 1980s, the IEEE began work on developing computer network architecture standards. This work was called ____, and it quickly expanded into several different categories of network technology.
d.) Project 802
This IEEE ____ standard specifies a maximum rated speed of 54 Mbps using the 5 GHz spectrum.
a.) 802.11a
____ was designed to ensure that only authorized parties can view transmitted wireless information.
d.) WEP
WEP accomplishes confidentiality by taking unencrypted text and then encrypting or "scrambling" it into ____ so that it cannot be viewed by unauthorized parties while being transmitted.
d.) ciphertext
The plaintext to be transmitted has a cyclic redundancy check (CRC) value calculated, which is a checksum based on the contents of the text. WEP calls this the ____ and appends it to the end of the text.
c.) integrity check value (ICV)
At regular intervals, a wireless AP sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ____.
b.) beaconing
With ____ scanning, a wireless device simply listens for a beacon frame for a set period of time.
a.) passive
Mobile devices constantly survey the radio frequencies at regular intervals to determine if a different AP can provide better service. If it finds one, then the device automatically attempts to associate with the new AP (this process is called ____.)
b.) a handoff
Access points have a setting called "____", which what the PSK uses as a seed value to generate new keys.
d.) Group Key Renewal
WPA replaces WEP with an encryption technology called ____.
c.) TKIP
____ is intended for personal and small office users who do not have advanced server capabilities.
c.) PSK
IEEE 802.11i authentication and key management is accomplished by the IEEE ____ standard.
d.) 802.1x
Regarding access control, a(n) ____ is a specific resource, such as a file or a hardware device.
a.) object
Regarding access control, a(n) ____ is a user or a process functioning on behalf of the user who attempts to access an object.
c.) subject
Regarding accesss control, an example of a(n) ____ is when a user attempts to delete a file.
d.) operation
In the ____ model, the end user cannot implement, modify, or transfer any controls.
d.) Mandatory Access Control (MAC)
The ____ model is considered a more "real world" approach than the other models to structuring access control.
b.) Role Based Access Control (RBAC)
The ____ model can dynamically assign roles to subjects based on a set of rules defined by a custodian.
d.) Rule Based Access Control (RBAC)
Known as ____, this practice requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.
d.) Seperation of duties
____ in access control means that if a condition is not explicitly met, then it is to be rejected.
d.) Implicit deny
____ accounts are user accounts that remain active after an employee has left an organization.
a.) Orphaned
____ is the process of setting a user's account to expire.
c.) Account expiration
A ____ is a secret combination of letters and numbers that only the user knows.
c.) password
A ____ attack begins with the attacker creating hashes of common dictionary words, and compares those hased dictionary words against those in a stolen password file.
d.) dictionary
To address the security issues in the LM hash, Microsoft introduced the ____ hash.
a.) NTLM
A ____ lock, also known as they key-in-knob lock, is the easiest to use because it requires only a key for unlocking the door from the outside.
b.) preset
Known as a ____ lock, this lock extens a solid metal bar into the doorframe for extra security.
b.) deadbolt
A ____ is a secuirty device that monitors and controls two interlocking doors to a small room (a vestibue) that separates a nonsecured area from a secured area.
d.) mantrap