• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/90

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

90 Cards in this Set

  • Front
  • Back

The IP header contains a protocol field. If this field contains the value of 17, what type of data is contained within the ip datagram?

If the protocol field has a value of 17 then it would indicate it was UDP.

The IP header contains a protocol field. If this field contains the value of 1, what type of data is contained within the ip datagram?

ICMP

The IP header contains a protocol field. If this field contains the value of 2, what type of data is contained within the ip datagram?

IGMP

The IP header contains a protocol field. If this field contains the value of 6, what type of data is contained within the ip datagram?

TCP

Prior to its use in malicious activity, spyware was typically a hidden application injected through poor browser security by companies seeking to gain more information about a user’s Internet activity. Today, those methods are used to deploy other malware, collect private data, send advertising or commercial messages to a system, or monitor system input, such as keystrokes or mouse clicks.

Spyware

is a general term referring to programs that appear desirable, but actually contain something harmful. A Trojan horse purports to do one thing that the user wants while secretly performing other potentially malicious actions. For example, a user may download a game file, install it, and begin playing the game. Unbeknownst to the user, the application may also install a virus, launch a worm, or install a utility allowing an attacker to gain unauthorized access to the system remotely, all without the user’s knowledge.

Trojan Horse: Named after the Trojan horse of Greek mythology (and serving a very similar function), a Trojan horse

Self-propagating code that exploits system or application vulnerabilities to replicate. Once on a system, it may execute embedded routines to alter, destroy, or monitor the system on which it is running, then move on to the next system. _____ is effectively a virus that does not require human interaction or other programs to infect systems.

A worm

Parasitic code that requires human action or insertion, or which attaches itself to another program to facilitate replication and distribution. Virus-infected containers can range from e-mail, documents, and data file macros to boot sectors, partitions, and memory fobs. Viruses were the first iteration of malware and were typically transferred by floppy disks (also known as “sneakernet”) and injected into memory when the disk was accessed or infected files were transferred from system to system.

Virus

A public key algorithm that does both encryption and digital signature is which of the following?

RSA can be used for encryption, key exchange, and digital signatures.

DES IS a _____ algorithm

symmetric

IDEA IS a _______ algorithm

symmetric

Diffie-Hellman is a common _______algorithm,

asymmetric

When backing up an applications system's data, which of the following is a key question to be answered first?

›What records to backup

What is the primary role of cross certification?

Creating trust between different PKIs

The DOD's Model first from the top down is The ____ Layer contains protocols that implement user-level functions, such as mail delivery, file transfer and remote login.

Application

The DOD's Model second from the top down isthe ______ Layer handles connection rendez vous, flow control, retransmission of lost data, and other generic data flow management between hosts. The mutually exclusive TCP and UDP protocols are this layer's most important members.

Host-to-Host

The DOD's 3rd from the top down The ____Layer is responsible for delivering data across a series of different physical networks that interconnect a source and destination machine. Routing protocols are most closely associated with this layer, as is the IP Protocol,

Internet

The DOD's 4th from the top down The ______ Layer is responsible for delivering data over the particular hardware media in use. Different protocols are selected from this layer, depending on the type of physical network

Network Access

Which of the following can prevent hijacking of a web session?

SSL

What is the maximum number of different keys that can be used when encrypting with Triple DES?

3

Which of the following floors would be most appropriate to locate information processing facilities in a six-story building?

You data center should be located in the middle of the facility or the core of a building to provide protection from natural disasters. Not basement nor roof nor main floor too much traffic

To understand the whys in crime, many times it is necessary to understand the

Motivations, Opportunities, and Means (MOM). Motivations are the who and why of a crime. Opportunities are the where and when of a crime, and Means pertains to the capabilities a criminal would need to be successful. Methods is not a component of MOM.

Who is responsible for initiating corrective measures and capabilities used when there are security violations?

Management is responsible for protecting all assets that are directly or indirectly under their control.They must ensure that employees understand their obligations to protect the company's assets, and implement security in accordance with the company policy. Finally, management is responsible for initiating corrective actions when there are security violations.

Which of the following term best describes a weakness that could potentially be exploited?

Vulnerability: A vulnerability is mostly a weakness, it could be a weakness in a piece of sotware, it could be a weakness in your physical security, it could take many forms.

It is the combination of a threat exploiting some vulnerability that could cause harm to some asset.

Risk

Possibility that vulnerability may be exploited to cause harm to a system, environment, or personnel. Any potential danger.

Threat

he equation used to calculate the total number of symmetric keys (K) needed for a group of users (N) to communicate securely with each other is given by which of the following?

N(N – 1)/ 2

Which two of the following technologies help protect web communications and promote a secure online environment?

TLS and SSL

Type I error,

False Rejection Rate or False Reject Rate (FRR)

Type II error,

False Acceptance Rate or False Accept Rate (FAR)

Cross Over Error Rate (CER)

Equal error rate (ERR)

the probability that the system fails to detect a match between the input pattern and a matching template in the database. It measures the percent of valid inputs which are incorrectly rejected. An authorize individual is falsely rejected by the system

False Rejection Rate (FRR) or Type 1 error

the probability that the system incorrectly matches the input pattern to a non-matching template in the database. It measures the percent of invalid inputs which are incorrectly accepted. An impostor is being falsely accepted by biometric system

False Acceptance Rate (FAR) or Type 2 error

the rate at which both acceptance and rejection errors are equal.

Equal error rate (ERR) – the rate at which both acceptance and rejection errors are equal. The value of the EER can be easily obtained from the ROC curve. The EER is a quick way to compare the accuracy of devices with different ROC curves. In general, the device with the lowest EER is the most accurate.

n operation (represented by the➢symbol) that checks to see whether at least one ofthe input values is true.

OR symbol

The _____operation (represented by the ∧ symbol) checks to see whether two values are both true. In Boolean math, there are only two possible values for each of these variables, leading to four possible inputs to the ____function. It’s this finite number of possibilities that makes it extremely easy for computers to implement logical functions in hardware. Notice in the following truth table that only one combination of inputs (where both inputs are true) produces an output value of true:

The AND operation (represented by the ∧ symbol) checks to see whether two values areboth true.

The ________operation (represented by the ∨ symbol) checks to see whether at least one of theinput values is true. Refer to the following truth table for all possible values of the ORfunction. Notice that the only time the OR function returns a false value is when both ofthe input values are false:

The OR operation (represented by the ∨ symbol) checks to see whether at least one of theinput values is true.

The ____operation (represented by the ∨ symbol) checks to see whether at least one of theinput values is true.

The OR operation (represented by the ∨ symbol) checks to see whether at least one of theinput values is true.

The _______operation (represented by the ∧ symbol) checks to see whether two values areboth true.

The AND operation (represented by the ∧ symbol) checks to see whether two values areboth true.

What is the formula used to compute the ALE?

ALE = AV * EF * ARO

What is EF?

Exposure Factor

What is ARO

Annualized Rate of Occurrence

What is AV

asset value

is computed as the product of the asset value (AV) times the exposure factor (EF) times the annualized rate of occurrence (ARO)

The annualized loss expectancy (ALE)

SLE*ARO

annualized loss expectancy (ALE)

what AV*EF?

SLE Single Loss Expectancy

?what layer File Transfer Protocol (FTP)

application

what layer Trivial File Transfer Protocol (TFTP)

application

what layer Simple Network Management Protocol (SNMP)

application

what layer Simple Mail Transfer Protocol (SMTP)

application

what layer telnet

application


what layer Hypertext Transfer Protocol (HTTP)

application

what layer American Standard Code for Information Interchange (ASCII)

presentation

what layer Extended Binary-Coded Decimal Interchange Mode (EBCDIC)

presentation

what layer Tagged Image File Format (TIFF)

presentation

what layer Joint Photographic Experts Group (JPEG)

presentation

what layer Motion Picture Experts Group (MPEG)

presentation

what layer Musical Instrument Digital Interface (MIDI)

presentation

what layer Network File System (NFS)

session

what layer NetBIOS

session

what layer Structured Query Language (SQL)

session

what layer Remote procedure call (RPC)

session

what layer Transmission Control Protocol (TCP)

transport

what layer User Datagram Protocol (UDP)

transport

what layer Secure Sockets Layer (SSL)/Transport Layer Security (TLS)

transport

what layer Sequenced Packet Exchange (SPX)

transport

what layer Internet Protocol (IP)

network

what layer Internet Control Message Protocol (ICMP)

network

what layer Internet Group Management Protocol (IGMP)

network

what layer Routing Information Protocol (RIP)

network

what layer Open Shortest Path First (OSPF)

network

what layer Internetwork Packet Exchange (IPX)

network

what layer Address Resolution Protocol (ARP)

datalink

what layer Reverse Address Resolution Protocol (RARP)

data link

what layer Point-to-Point Protocol (PPP)

data link

what layer Serial Line Internet Protocol (SLIP)

data link

what layer Ethernet

data link

what layer Token Ring

data link

what layer

FDDI

what layer ATM

data link

what layer EIA-422, EIA-423, RS-449, RS-485

physical

what layer 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX, 100BASE-FX, 100BASE-T,1000BASE-T, 1000BASE-SX

physical

what layer Integrated Services Digital Network (ISDN)

physical

what layer Digital subscriber line (DSL)

physical

what layer Synchronous Optical Networking (SONET)

physical

In response to an access-request from a client,


a RADIUS server returns one of three authentication responses:

access-accept,


access-reject, or


access-challenge

is simply a primary drive with a mirror drive.

Raid 1

This RAID configuration stripes data at the bit-level but quickly became useless and is now considered obsolete.

Raid 2

______ comprises block-level striping, not byte-level striping AND, it has largely been replaced by RAID 6.

Raid 4

Which RAID disk configuration uses three separate physical drives, byte-level striping, plus one additional physical drive for parity data?

Raid 3