• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/44

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

44 Cards in this Set

  • Front
  • Back
Mandatory Access requires that sensitivity labels be attached to all objects. Which of the following would be designated as objects on a MAC system?

a. devices, processes, I/O pipe, and sockets
b. files, directories, processes, and sockets
c. users, windows, and programs
d. files, directories, and print queue
d. files, directories, and print queue
An Architecture where there are more than two execution domains or privilege levels is called:

a. Security Models
b. Network Environment
c. Ring Layering
d. Ring Architecture
d. Ring Architecture
Devices that supply power when the commercial utility power system fails are called which of the following?

a. power conditioners
b. power dividers
c. power filters
d. uninterruptible power supplies
d. uninterruptible power supplies
Examples of types of physical access controls include all EXCEPT which of the following?

a. guards
b. badges
c. passwords
d. locks
c. passwords
Guards are appropriate whenever the function required by the security program involves which of the following?

a. The use of discriminating judgment
b. The operation of access control devices
c. The need to detect unauthorized access
d. The use of physical force
a. The use of discriminating judgment
If an operating system permits shared resources such as memory to be used sequentially by multiple users/application or subjects without a refresh of the objects/memory area, what security problem is most likely to exist?

a. disclosure of residual data
b. unauthorized obtaining of a privileged execution state
c. data leakage through covert channels
d. denial of service through a deadly embrace
a. disclosure of residual data
Mandatory Access requires that sensitivity labels be attached to all objects. Which of the following would be designated as objects on a MAC system?

a. devices, processes, I/O pipe, and sockets
b. files, directories, processes, and sockets
c. users, windows, and programs
d. files, directories, and print queue
d. files, directories, and print queue
Memory management in TCSEC levels B3 and A1 operating systems may utilize "data hiding". What does this mean?

a. Only security processes are allowed to write to ring zero memory
b. Auditing processes and their memory addresses cannot be accessed by user processes.
c. It is a form of strong encryption cipher
d. System functions are layered, and none of the functions in a given layer can access data outside that layer
d. System functions are layered, and none of the functions in a given layer can access data outside that layer
The Information Technology Security Evaluation Criteria (ITSEC) was written to address which of the following that the Orange Book did not address?

a. confidentiality and availability
b. integrity and availability
c. none of the above
d. integrity and confidentiality
b. integrity and availability
The most prevalent cause of computer center fires is which of the following?

a. AC equipment
b. natural causes
c. electrical distribution systems
d. heating systems
c. electrical distribution systems
Under what conditions would the use of a Class C fire extinguisher be preferable to a Class A extinguisher?

a. When the fire involves electrical equipment
b. When the fire is caused by flammable products
c. When the fire is in an enclosed area
d. When the fire involves paper products
a. When the fire involves electrical equipment
What does it mean if a system uses "Trusted Recovery"?

a. There is no such principle as "Trusted Recovery" in security
b. A single account on the system has the administrative rights to recover or reboot the system after a crash
c. A failure or crash of the system cannot be used to breach security
d. The recovery process is done from media that have been locked in a safe
c. A failure or crash of the system cannot be used to breach security
What physical characteristic does a retinal scan biometric device measure?

a. The pattern of light receptors at the back of the eye
b. The pattern of blood vessels at the back of the eye
c. The amount of light reflected by the retina
d. The amount of light reaching the retina
b. The pattern of blood vessels at the back of the eye
Which is the last line of defense in a physical security sense?

a. perimeter barriers
b. exterior barriers
c. interior barriers
d. people
d. people
Which of the following are necessary components of a Multi-Level Security Policy?

a. Security Clearances for subjects & Security Labels for objects and Mandatory Access Control
b. Sensitivity Labels for only objects and Mandatory Access Control
c. Sensitivity Labels for subjects & objects and Discretionary Access Control
d. Sensitivity Labels for subjects & objects and a "system high" evaluation
a. Security Clearances for subjects & Security Labels for objects and Mandatory Access Control
Which of the following can be used as a covert channel?

a. Storage and classification
b. Storage and low bits
c. Storage and timing
d. Storage and permissions
c. Storage and timing
Which of the following components are considered part of the Trusted Computing Base (from the Orange Book)?

a. trusted computer operators and system managers
b. trusted hardware and firmware
c. trusted hardware and software
d. trusted hardware, software and firmware
d. trusted hardware, software and firmware
Which of the following is a class A fire?

a. electrical
b. Halon
c common combustibles
d. liquid
c. common combustibles
Which of the following is a class C fire?

a. electrical
b. liquid
c. common combustibles
d. soda acid
a. electrical
Which of the following is a straightforward approach that provides access rights to subjects for objects?

a. Take-Grant model
b. Bell-LaPadula model
c. Biba model
d. Access Matrix model
d. Access Matrix model
Which of the following is the preferred way to suppress an electrical fire in an information center?

a. ABC Rated Dry Chemical
b. water or soda acid
c. CO2, soda acid, or Halon
d. CO2
d. CO2
Which of the following is true about a "dry pipe" sprinkler system?

a. It maximizes chances of accidental discharge of water.
b. It uses less water than "wet pipe" systems.
c. It reduces the issue of the sprinkler system pipes freezing.
d. It is a substitute for carbon dioxide systems.
c. It reduces the issue of the sprinkler system pipes freezing
Which of the following suppresses combustion by disrupting a chemical reaction, by doing so it kills the fire?

a. CO2
b. Halon
c. water
d. soda acid
b. Halon
Who developed one of the first mathematical models of a multilevel-security computer system?

a. Diffie and Hellman
b. Gasser and Lipner
c. Bell and LaPadula
d. Clark and Wilson
c. Bell and LaPadula
Crackers today are MOST often interested in:

a. Gaining Money or Financial Gains.
b. Getting recognition for their actions.
c. Seeing how far their skills will take them.
d. Helping the community in securing their networks.
a Gaining Money or Financial Gains
Which of the following is from the Internet Activities Board (IAB) Ethics and the Internet (RFC 1087)?

a. There must be a way for a person to prevent information about them, which was obtained for one purpose, from being used or made available for another purpose without their consent.
b. There must not be personal data record-keeping systems whose very existence is secret.
c. Access to and use of the Internet is a privilege and should be treated as such by all users of the systems.
d. Users should execute responsibilities in a manner consistent with the highest standards of their profession.
c. Access to and use of the Internet as a priviledge and should be treated as such by all users of the systems
To be admissible in court, computer evidence must be which of the following?

a. Edited
b. Incriminating
c. Relevant
d. Decrypted
c. Relevant
Which of the following addresses industrial and corporate espionage?

a. 1970 U.S. Racketeer Influenced and Corrupt Organization Act (RICO)
b. 1996 U.S Economic and Protection of Proprietary Information Act
c. Generally Accepted Systems Security Principles (GASSP)
d. 1980 Organization for Economic Cooperation and Development (OECD)
b. 1996 U.S. Economic and Protection of Propietary Information Act
Under United States law, an investigator's notebook may be used in court in which of the following scenarios?

a. If the defense has no objections.
b. To refresh the investigators memory while testifying.
c. When other forms of physical evidence are not available.
d. When the investigator is unwilling to testify.
b. To refresh the investigator's memory while testifying
Which of the following is biggest factor that makes Computer Crimes possible?

a. Collusion with others in information processing.
b. System design flaws.
c. The fraudster obtaining advanced training & special knowledge.
d. Victim carelessness.
d. Victim carelessness
The typical computer fraudsters are usually persons with which of the following characteristics?

a. They have had previous contact with law enforcement
b. They deviate from the accepted norms of society
c. They hold a position of trust
d. They conspire with others
c. They hold a position of trust
Which of the following computer crime is MORE often associated with INSIDERS?

a. Denial of service (DOS)
b. Data diddling
c. IP spoofing
d. Password sniffing
b. Data diddling
In addition to Human Resources, with what company function must the collection of physical evidence be coordinated if an employee is suspected?

a. Public Relations
b. Industrial Security
c. Computer Security
d. Legal
d. Legal
Which of the following is NOT part of the (ISC)2 Code of Ethics?

a. Not misuse the information in which they come into contact during the course of their duties, and they shall maintain the confidentiality of all information in their possession that is so identified.
b. Appropriately report activity related to the profession that they believe to be unlawful and shall cooperate with resulting investigations.
c. Not use a computer to harm people or interfere with other people's computer work.
d. Execute responsibilities in a manner consistent with the highest standards of their profession,
c. Not use a computer to harm people or interfere with other people's computer work
Once evidence is seized, a law enforcement officer should emphasize which of the following?

a. Chain of custody
b. Chain of communications
c. Chain of control
d. Chain of command
a. Chain of custody
The ISC2 Code of Ethics does not include which of the following behaviors for a CISSP:

a. legal.
b. control.
c. moral.
d. ethical.
b. control
Which of the following tools is NOT likely to be used by a hacker?

a. Nmap
b. Nessus
c. Saint
d. Tripwire
d. Tripwire
On November 23, 2001, what did thirty countries including Canada, the United States and China ratify?

a. International Computer Abuse Treaty.
b. Cybercrime Anti-Terrorist Group.
C. Cybercrime Convention.
d. Internet Protection Convention.
c. Cybercrime Convention
Which of the following groups represents the leading source of computer crime losses?

a. Employees
b. Foreign intelligence officers
c. Industrial saboteurs
d. Hackers
a. Employees
Which of the following is unlike the other three choices presented?

a. Smurf
b. Buffer Overflow
c. Teardrop
d. El Gamal
d. El Gamal
Which of the following would NOT be considered a Denial of Service Attack?

a. Smurf
b. TearDrop
c. Zone Transfer
d. Syn Flood
c. Zone Transfer
Which of the following issues is not addressed by digital signatures?

a. nonrepudiation
b. data integrity
c. denial-of-service
d. authentication
c. denial-of-service
Controls to keep password sniffing attacks from compromising computer systems include which of the following?

a. static and one-time passwords.
b. static and recurring passwords.
c. encryption and recurring passwords.
d. one-time passwords and encryption.
d. one-time passwords and encryption
Which of the following could inappropriately capture network user passwords?

a. Smurfing
b. IP Spoofing
c. Sniffing
d. Data diddling
c. Sniffing