Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
90 Cards in this Set
- Front
- Back
The IP header contains a protocol field. If this field contains the value of 17, what type of data is contained within the ip datagram? |
If the protocol field has a value of 17 then it would indicate it was UDP. |
|
The IP header contains a protocol field. If this field contains the value of 1, what type of data is contained within the ip datagram? |
ICMP |
|
The IP header contains a protocol field. If this field contains the value of 2, what type of data is contained within the ip datagram? |
IGMP |
|
The IP header contains a protocol field. If this field contains the value of 6, what type of data is contained within the ip datagram? |
TCP |
|
Prior to its use in malicious activity, spyware was typically a hidden application injected through poor browser security by companies seeking to gain more information about a user’s Internet activity. Today, those methods are used to deploy other malware, collect private data, send advertising or commercial messages to a system, or monitor system input, such as keystrokes or mouse clicks. |
Spyware |
|
is a general term referring to programs that appear desirable, but actually contain something harmful. A Trojan horse purports to do one thing that the user wants while secretly performing other potentially malicious actions. For example, a user may download a game file, install it, and begin playing the game. Unbeknownst to the user, the application may also install a virus, launch a worm, or install a utility allowing an attacker to gain unauthorized access to the system remotely, all without the user’s knowledge. |
Trojan Horse: Named after the Trojan horse of Greek mythology (and serving a very similar function), a Trojan horse |
|
Self-propagating code that exploits system or application vulnerabilities to replicate. Once on a system, it may execute embedded routines to alter, destroy, or monitor the system on which it is running, then move on to the next system. _____ is effectively a virus that does not require human interaction or other programs to infect systems. |
A worm |
|
Parasitic code that requires human action or insertion, or which attaches itself to another program to facilitate replication and distribution. Virus-infected containers can range from e-mail, documents, and data file macros to boot sectors, partitions, and memory fobs. Viruses were the first iteration of malware and were typically transferred by floppy disks (also known as “sneakernet”) and injected into memory when the disk was accessed or infected files were transferred from system to system. |
Virus |
|
A public key algorithm that does both encryption and digital signature is which of the following? |
RSA can be used for encryption, key exchange, and digital signatures. |
|
DES IS a _____ algorithm |
symmetric |
|
IDEA IS a _______ algorithm |
symmetric |
|
Diffie-Hellman is a common _______algorithm, |
asymmetric |
|
When backing up an applications system's data, which of the following is a key question to be answered first? |
›What records to backup |
|
What is the primary role of cross certification? |
Creating trust between different PKIs |
|
The DOD's Model first from the top down is The ____ Layer contains protocols that implement user-level functions, such as mail delivery, file transfer and remote login. |
Application |
|
The DOD's Model second from the top down isthe ______ Layer handles connection rendez vous, flow control, retransmission of lost data, and other generic data flow management between hosts. The mutually exclusive TCP and UDP protocols are this layer's most important members. |
Host-to-Host |
|
The DOD's 3rd from the top down The ____Layer is responsible for delivering data across a series of different physical networks that interconnect a source and destination machine. Routing protocols are most closely associated with this layer, as is the IP Protocol, |
Internet |
|
The DOD's 4th from the top down The ______ Layer is responsible for delivering data over the particular hardware media in use. Different protocols are selected from this layer, depending on the type of physical network |
Network Access |
|
Which of the following can prevent hijacking of a web session? |
SSL |
|
What is the maximum number of different keys that can be used when encrypting with Triple DES? |
3 |
|
Which of the following floors would be most appropriate to locate information processing facilities in a six-story building? |
You data center should be located in the middle of the facility or the core of a building to provide protection from natural disasters. Not basement nor roof nor main floor too much traffic |
|
To understand the whys in crime, many times it is necessary to understand the
|
Motivations, Opportunities, and Means (MOM). Motivations are the who and why of a crime. Opportunities are the where and when of a crime, and Means pertains to the capabilities a criminal would need to be successful. Methods is not a component of MOM. |
|
Who is responsible for initiating corrective measures and capabilities used when there are security violations? |
Management is responsible for protecting all assets that are directly or indirectly under their control.They must ensure that employees understand their obligations to protect the company's assets, and implement security in accordance with the company policy. Finally, management is responsible for initiating corrective actions when there are security violations. |
|
Which of the following term best describes a weakness that could potentially be exploited? |
Vulnerability: A vulnerability is mostly a weakness, it could be a weakness in a piece of sotware, it could be a weakness in your physical security, it could take many forms. |
|
It is the combination of a threat exploiting some vulnerability that could cause harm to some asset.
|
Risk |
|
Possibility that vulnerability may be exploited to cause harm to a system, environment, or personnel. Any potential danger. |
Threat |
|
he equation used to calculate the total number of symmetric keys (K) needed for a group of users (N) to communicate securely with each other is given by which of the following? |
N(N – 1)/ 2 |
|
Which two of the following technologies help protect web communications and promote a secure online environment? |
TLS and SSL |
|
Type I error, |
False Rejection Rate or False Reject Rate (FRR) |
|
Type II error, |
False Acceptance Rate or False Accept Rate (FAR) |
|
Cross Over Error Rate (CER) |
Equal error rate (ERR) |
|
the probability that the system fails to detect a match between the input pattern and a matching template in the database. It measures the percent of valid inputs which are incorrectly rejected. An authorize individual is falsely rejected by the system |
False Rejection Rate (FRR) or Type 1 error
|
|
the probability that the system incorrectly matches the input pattern to a non-matching template in the database. It measures the percent of invalid inputs which are incorrectly accepted. An impostor is being falsely accepted by biometric system |
False Acceptance Rate (FAR) or Type 2 error |
|
the rate at which both acceptance and rejection errors are equal. |
Equal error rate (ERR) – the rate at which both acceptance and rejection errors are equal. The value of the EER can be easily obtained from the ROC curve. The EER is a quick way to compare the accuracy of devices with different ROC curves. In general, the device with the lowest EER is the most accurate. |
|
n operation (represented by the➢symbol) that checks to see whether at least one ofthe input values is true. |
OR symbol |
|
The _____operation (represented by the ∧ symbol) checks to see whether two values are both true. In Boolean math, there are only two possible values for each of these variables, leading to four possible inputs to the ____function. It’s this finite number of possibilities that makes it extremely easy for computers to implement logical functions in hardware. Notice in the following truth table that only one combination of inputs (where both inputs are true) produces an output value of true:
|
The AND operation (represented by the ∧ symbol) checks to see whether two values areboth true. |
|
The ________operation (represented by the ∨ symbol) checks to see whether at least one of theinput values is true. Refer to the following truth table for all possible values of the ORfunction. Notice that the only time the OR function returns a false value is when both ofthe input values are false: |
The OR operation (represented by the ∨ symbol) checks to see whether at least one of theinput values is true. |
|
The ____operation (represented by the ∨ symbol) checks to see whether at least one of theinput values is true. |
The OR operation (represented by the ∨ symbol) checks to see whether at least one of theinput values is true. |
|
The _______operation (represented by the ∧ symbol) checks to see whether two values areboth true. |
The AND operation (represented by the ∧ symbol) checks to see whether two values areboth true. |
|
What is the formula used to compute the ALE? |
ALE = AV * EF * ARO |
|
What is EF? |
Exposure Factor |
|
What is ARO |
Annualized Rate of Occurrence |
|
What is AV |
asset value |
|
is computed as the product of the asset value (AV) times the exposure factor (EF) times the annualized rate of occurrence (ARO) |
The annualized loss expectancy (ALE) |
|
SLE*ARO |
annualized loss expectancy (ALE) |
|
what AV*EF? |
SLE Single Loss Expectancy |
|
?what layer File Transfer Protocol (FTP) |
application |
|
what layer Trivial File Transfer Protocol (TFTP) |
application |
|
what layer Simple Network Management Protocol (SNMP) |
application |
|
what layer Simple Mail Transfer Protocol (SMTP) |
application |
|
what layer telnet |
application
|
|
what layer Hypertext Transfer Protocol (HTTP) |
application |
|
what layer American Standard Code for Information Interchange (ASCII) |
presentation |
|
what layer Extended Binary-Coded Decimal Interchange Mode (EBCDIC) |
presentation |
|
what layer Tagged Image File Format (TIFF) |
presentation |
|
what layer Joint Photographic Experts Group (JPEG) |
presentation |
|
what layer Motion Picture Experts Group (MPEG) |
presentation |
|
what layer Musical Instrument Digital Interface (MIDI) |
presentation |
|
what layer Network File System (NFS) |
session |
|
what layer NetBIOS |
session |
|
what layer Structured Query Language (SQL) |
session |
|
what layer Remote procedure call (RPC) |
session |
|
what layer Transmission Control Protocol (TCP) |
transport |
|
what layer User Datagram Protocol (UDP) |
transport |
|
what layer Secure Sockets Layer (SSL)/Transport Layer Security (TLS) |
transport |
|
what layer Sequenced Packet Exchange (SPX) |
transport |
|
what layer Internet Protocol (IP) |
network |
|
what layer Internet Control Message Protocol (ICMP) |
network |
|
what layer Internet Group Management Protocol (IGMP) |
network |
|
what layer Routing Information Protocol (RIP) |
network |
|
what layer Open Shortest Path First (OSPF) |
network |
|
what layer Internetwork Packet Exchange (IPX) |
network |
|
what layer Address Resolution Protocol (ARP) |
datalink |
|
what layer Reverse Address Resolution Protocol (RARP) |
data link |
|
what layer Point-to-Point Protocol (PPP) |
data link |
|
what layer Serial Line Internet Protocol (SLIP) |
data link |
|
what layer Ethernet |
data link |
|
what layer Token Ring |
data link |
|
what layer |
FDDI |
|
what layer ATM |
data link |
|
what layer EIA-422, EIA-423, RS-449, RS-485 |
physical |
|
what layer 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX, 100BASE-FX, 100BASE-T,1000BASE-T, 1000BASE-SX |
physical |
|
what layer Integrated Services Digital Network (ISDN) |
physical |
|
what layer Digital subscriber line (DSL) |
physical |
|
what layer Synchronous Optical Networking (SONET) |
physical |
|
In response to an access-request from a client, a RADIUS server returns one of three authentication responses: |
access-accept, access-reject, or access-challenge |
|
is simply a primary drive with a mirror drive. |
Raid 1 |
|
This RAID configuration stripes data at the bit-level but quickly became useless and is now considered obsolete. |
Raid 2 |
|
______ comprises block-level striping, not byte-level striping AND, it has largely been replaced by RAID 6. |
Raid 4 |
|
Which RAID disk configuration uses three separate physical drives, byte-level striping, plus one additional physical drive for parity data? |
Raid 3 |