• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

What type of attack is launched on order to determin the protocols (services) running on one or more targeted machines?


A. Ping Sweep


B. Port Scan


C. Replay


D. Session hijack


E. zero day

B. Port Scan

Which type of attack uses a collection of zombie clients (botnets) in a unified attack against a single target


A. Sniffing


B. Replay


C. DOS


D. Spoofing


E. Smishing

C. DOS

Which e-mail protocol allows client machines to open messages while keeping them housed on designated e-mail server


A. NNTP


B. ICMP


C. SMTP


D. POP

D. POP

Limiting a user's access to computing resources based on his/her job responsibilities is known as


A. least privilege


B. non repudiation


C. validation


D. due care


E. role equivalency

A. least privilege

The best way to reduce the number of buffer overflow occurences is by


A. conducting frequent user awareness training


B. insuring computer networks require multi-factor authentication


C. performing system auditn on a consistent basis


D. increase the number of access controls on a router and firewalls


E. Writing more secure code as software programs are being developed

E. Writing more secure code as software programs are being developed

Port 22


Select One:


A. is often used to prived security to other non-secure protocols


B. resolves IP addresses to MAC addresses


C. resolves URLs to their corresponding IP addresses


D. is responsible for assigning IP addresses to requesting host devices


E. Allows users to establish remote sessions and manage devices through tesxt-based commands

A. is often used to prived security to other non-secure protocols

Server Clustering can be implemented as one measure of which security principle?


A. Authentication


B. Authorization


C. Availability


D. Confidentiality


E. Integrity

C. Availability

As it applies to information security, accountability (or accounting)


A. Restricts user access to resources through the use of permissions


B. requires users to provide credentials in an effort to validate their identity


C. offers proof that users cannot deny an action or participating in an activity


D. involves the tracking of user activities throught the review log files


E. means organizations have taken measured steps to insure data on their network is not comprimised

D. involves the tracking of user activities throught the review log files

The unsecured protocol used for web site connectivivity uses which port by default


A. 23


B. 53


C. 80


D. 443


E. 1029

C. 80

Which of the following practices help reduce the liklihood unauthorized users can access a wireless (WLAN) network


A. Disable the SSID


B. Implement MAC filtering


Increase the complexity of user passwords required for server access


d. two of the above


e. all of the above

e. all of the above

What protocol uses a centralized authentication database and encrypts the entire authentication process?


A. Chap


B. TACACS+


C. MS-CHAPv2


D. RADIUS


E. EAP

B. TACACS+

What event has just occured if an airport's facial recognition biometric system reports type 2 error?


A. The system identified a user included in its database


B. The system failed to recognize an infividual included in its database


C. System lost power, making detection impossible


D. The system failed to identify a user not included in its database


E. The system identified a user not included in its database

E. The system identified a user not included in its database

Which type of computer virus alters the code it uses to replicate each time it is run, making it very difficult for even updated AV software to detect?


A. Multipartite


B. Pyromorphic


C. MAcro


D. Metamorphic


E. Polymorphic



D. Metamorphic

Labels are used as part of which access control module?


A. Mandatory


B. Arbitrary


C. Role-Based


D. Rule-Based


E. Discretionary

A. Mandatory

Stateful inspection firewalls


Select one:


A. filter traffic based onuser identiy


B. filter traffic based on the status of protocols and expected procedures


C. filter traffic ased on ports/services being requested


D. perform filtering based solely on source or destination addresses


E. None of the aboce

B. filter traffic based on the status of protocols and expected procedures

All of the following options are useful countermeasures to threats from malicious code attacks except


Select one:


A. keeping anti-virus software updated


B. placing a content filter on system firewalls


C. educating users


D. increasing the password complexity requirements for authenticating users


E. adding an e-mail proxy server

D. increasing the password complexity requirements for authenticating users

Which VPN protocol offers two different encryption options that can be applied based on how much of the connection path needs to be secure


A. SSL


B. SSH


C. IPSec


D. PPTP


E. L2TP

C. IPSec

Which type of attack uses e-mail messages to create fear or play on individual emotions so that they will pass the message along to others


A. Worm


B. Hoax


C. Keylogger


D. Logic Bomb


E. Rootkit

B. Hoax

___ is a dial-up technology that offers two 64Kbps channels that can be used for voice, data or a combination of the two


A. T1


B. DSL


C. ISDN


D.X.25


E. Pots

C. ISDN

The process of making software available to users across a web-based connection is commonly refered to as..


A. Privatization


B. Escalation of Privileges


C. Virtulization


D. Accounting


E. Provisioning

C. Virtulization