• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
Which of the following is an example of a biometric authentication?
(a) Smart card
(b) User name
(c) Fingerprint scanner
(d) Password
(c) Fingerprint scanner
Steganography is used for:
(a) Hiding data within another piece of data
(b) Checking data integrity
(c) Hashing
(d)Data encryption
(a) Hiding data within another piece of data
Penetration testing: (Select all that apply)
(a) Actively tests security controls
(b) Exploits vulnerabilities
(c) Bypasses security controls
(d) Passively tests security controls
(e) Only identifies lack of security controls
(a) Actively tests security controls
(b) Exploits vulnerabilities
(c) Bypasses security controls
Public/private key pair concept is based on:
(a) WEP
(b) PII
(c) Asymmetric encryption
(d) Symmetric encryption
(c) Asymmetric encryption
A monitored host or network specifically designed to detect unauthorized access attempts is also known as:
(a) Flood guard
(b) Honeypot
(c) Botnet
(d) Rogue access point
(b) Honeypot
What type of system can be compromised through phreaking?
(a) PBX
(b) ATX
(c) PGP
(d) BIOS
(a) PBX
Which of the following acronyms refers to a lightweight consumer electronic device?
(a) PED
(b) KDC
(c) SLED
(d) CA
(a) PED
What are the features of Elliptic Curve Cryptography (ECC)? (Select two answers)
(a) Suitable for small wireless devices
(b) Symmetric encryption
(c) High processing power requirements
(d) Asymmetric encryption
Shared key
(a) Suitable for small wireless devices
(d) Asymmetric encryption
Shared key
The term war driving refers to:
Scanning for unsecured wireless networks while driving in a car
(a) Scanning for unsecured wireless networks while driving in a car
(b) Penetration testing
(c) Vulnerability scanning
(d) Marking unsecured wireless networks
(a) Scanning for unsecured wireless networks while driving in a car
Which of the following prevents a computer screen from being viewed by others nearby?
(a) Privacy screen
(b) Multi-factor authentication
(c) HIPS
(d) Firewall
(a) Privacy screen
Which of the following measures should be used in order to prevent shoulder surfing? (Select two answers)
(a) Cable locks
(b) Privacy filters
(c) Security guards
(d) Screensavers
(e) Video surveillance
(b) Privacy filters
(d) Screensavers
Allowing a program through a firewall is also referred to as creating:
(a) Access Point
(b) Session
(c) Tunnel
(d) Exception
(d) Exception
802.1X is an IEEE standard defining:
(a) Port-based network access control
(b) Token ring networks
(c) VLAN tagging
(d) Wireless networking
(a) Port-based network access control
Which of the following protocols was designed as a secure replacement for Telnet?
(a) FTP
(b) ICMP
(c) IPv6
(d) SSH
(d) SSH
Which of the following provides confidentiality?
(a) SHA-1
(b) AES
(c) RAID 0
(d) MD5
(b) AES
Malicious code activated by a specific event is also known as:
(a) Logic bomb
(b) Computer worm
(c) Denial of service
(d) Xmas attack
(a) Logic bomb
Which of the following is an acronym for a risk assessment formula defining probable financial loss due to a risk over a one-year period?
(a) SLE
(b) ARO
(c) ALE
(d) UAT
(c) ALE
Which of the following solutions is used to hide the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?
(a) ACL
(b) DMZ
(c) NAT
(d) NAC
(c) NAT
Unsolicited messages received over an instant messaging system are also known as:
(a) Spoofing
(b) Spim
(c) Bluejacking
(d) Spam
(b) Spim
Gaining unauthorized access to a Bluetooth device is also referred to as:
(a) Bluesnarfing
(b) Bluejacking
(c) Vishing
(d) Pharming
(a) Bluesnarfing
RAID 0: (Select two answers)
(a)Requires at least two drives to implement
(b) Needs a separate disk controller for each drive
(c) Requires at least three drives to implement
(d) Offers fault tolerance and redundancy
(e) Doesn't offer fault tolerance
(a)Requires at least two drives to implement
(e) Doesn't offer fault tolerance
A cloud computing infrastructure type wherein applications are hosted over a network (typically Internet) eliminating the need to install and run the software on the customer's own computers is called:
(a) IaaS
(b) Thick client
(c) Virtualization
(d) SaaS
(d) SaaS
A group that consists of SNMP devices and one or more SNMP managers is called:
(a) SNMP community
(b) Management Information Base (MIB)
(c) Network Management System (NMS)
SNMP trap
(a) SNMP community
Which of the following devices operates at Layer 3 of the OSI model?
(a) Switch
(b) Passive hub
(c) Active hub
(d) Router
(d) Router
Using a telephone system to manipulate a user into disclosing confidential information is called:
(a) Tailgating
(b) Spoofing
(c) Shoulder surfing
(d) Vishing
(d) Vishing