• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

Card Range To Study



Play button


Play button




Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

145 Cards in this Set

  • Front
  • Back

3 types of access controls:

type 1: what you have(lock and key, CaC)

type 2: what you know ( information, passwords)

type 3: what you are (biometrics)

What is accountability?

the idea that user should be accountable to the actions performed under his/her name.

What is Kerberos?

Client sends login information to KDC (Key Distribution Center), which verifies a clients credentials and sends request to TGS (ticket granting server), followed by a TGT (ticket granting ticket) to the client.

What is an SYN flood?

Sending TCP packets to deny availability

What is an ICMP flood?

Sending ICMP (usually ping) packets to deny availability.

What is smurfing?

A special ICMP flood attack that braodcasts ICMP requests.

Buffer Overflow:

Sending a malformed packet that overflows a memory address to deny availability and possibly gain privileges


Gain access through a secret program (ex. trojan horse)


Read information off the network


Hiding or disguising an address to make it appear that the requests come from another source.

Man n the middle

Intercepting packets and changing the contents. (denies confidentiality and integrity.)


session key sniffed and then used.

Birthday attack:

probability based

How does a virus propagate?

through user action, usually by email.

How does a worm propagate?

self-propagating and uses exploits

L2TP operates on the _____ layer.


IPSec operates on the ____ layer and has 2 protocols: ____ and ___.

network layer, AH and ESP

what are S/MIME, MOSS. PEM and PGP?

email security programs.

What is an applet?

Programs that run in a browser such as Java and activeX.

what is the difference between S-HTTP and SSL?

S-HTTP is connectionless while SSL is connection oriented.

What does disk spanning allow?

Allows a file system to be spread over multiple physical drives.

What is WTLS?

WAP's built in security system and operates over TLS

What is WEP?

a weak security system for wireless LANs and operates on layers 1 and 2 (physical and data)

What is cladding?

the glass insulator in the fiber optic cable

What is the key anagement protocol that uses EAP?


Which type of cabling is said to be shielded against EMI?

STP cabling

Circuit level gateway:

Maintains state information (connection based)

Application level gateway:

examines each packet coming in for content

What is a proxy server?

special application level gateway that ensures no direct connection between an untrusted and trusted network.

What is an ACL?

the list that defines the rules that a packet filtering firewall follows

Screening router:

a router between the trusted and untrusted

Screened host gateway

A bastion host that can examine traffic between trusted and untrusted

Dual-homed gateway

a bastion host and router between trusted and untrusted

Screened subnet:

A bastion host (DMZ zone) between two routers

Whats the difference between and active IDS and a passive IDS?

active finds and attempts to circumvent threats, a passive finds threats and alerts administrator

How does a host based IDS operate?

requires special software to be installed on each node

Knowledge based IDS:

works using signatures and known attacks

Behavior based IDS:

works by analyzing baseline v.s real time network traffic

what is relaying?

the behavior of SMTP servers that will send a message from any source (should be disabled)

What do anonymous services do?

allow access without authentication

What is AES>

a symmetric algorithm based on Rijndael Block Cipher

What do block ciphers do?

Encrypt clear text block by block while stream ciphers encrypt in real time

Name some symmetrical algorithms


Name some asymmetric algorithms

Diffie-Hellman, RSA and El Gamel

What are the three types of backups?

Full, Differential and Incremental

What is a differential backup?

Only the data that has changed since the last full backup was done is backed up

What is an incremental backup?

Only the data that has changed since the last incremental or full backup is backed up

What is MTD?

Maximum tolerable downtime- the greatest amount of time a system can withstand being un-operational


sym. 64 bit (56+8 parity) very weak 3DES


sym. 192 bit (168bit + 24 parity) Moderate AES


sym. Variable (128, 192, 256) strong N/A


sym. (up to 2048) Very strong N/A


Asym. 512 strong

El Gamel

N/A very strong

MD5 Hash

Rivest MD5 block hash 512 bit block processing/128 it digest strong MD6


512 bit processing/160 bit digest very strong


Variable, very strong

That is CCMP?

counter mode with cipher block chaining messaging authentication code protocol.

a wrapper that uses 128 bit AES encryption

An achievement providing worldwide internet security was the signing of certificates associated with which protocol?


A chief Information Security officer (CISO) wants to implement two-factor authentication within the company. What will fulfill his requirements?

USB token and PIN

What can a security administrator implement on mobile devices that will help prevent unwanted people from viewing the data if the device is left unattended?

screen lock

What would a security manager implement in order to ID a problem between two systems that are not communication properly?

Protocol analyzer

What can result in significant administrative overhead from incorrect reporting?

false positives

A security admin wants to perform routine tests in the network during working hours when certain apps are being accessed. What will allow the S.A. to test the lack of security controls for those applications with the least impact to the system?

vulnerability scan

What risk concept requires an organization to determine the number of failures per year?


A system security analyst using an enterprise monitoring tool notices an unknown internal host exfiltrating files to several foreign IP addresses. What would be an appropriate mitigation technique?

rogue machine detection

what are three primary security control types that can be implemented?

operational, technical, and management

The helpdesk reports increased call from clients reporting spiked in malware infections on their systems. What phases of incident response is MOST appropriate as a first response?


What are the steps to incident response?

Identification, Containment, Validation, Eradication, Recovery, Follow-up.

Which protocol operates at the highest level of the OSI model?


Joe, the S.A has been asked to calculate the annual loss expectancy (ALE) for a $5000 dollar server, which often crashes. In the past year, the server crashed 10 times, requiring a system reboot to recover with only 10% loss of data or function. What is the ALE of this server?


What should an administrator implement to research current attack methodologies?


What can be implemented in hardware or software to protect a web server from cross-site scripting attacks?

Web application firewall

Which means of wireless authentication is easily vulnerable to spoofing?

MAC filtering

The BEST methods for a web developer to prevent the website application code from being vunerable to cross=site request (XSRF) are to ____ and ____.

validate and filter input on the server side and the client side; restrict and sanitize use of special characters in input and URLs

Jane, a security administrator, needs to implement a secure wireless authentication method uses a remoter RADIUS server for authentication. Which method should Jane use?


Computer evidence at a crime scene is documented with a tag stating who had possession of the evidence at a given time. What does this illustrate?

chain of custody

A net admin is configuring access control foe the sale department which has high employee turnover. What is BEST suited when assigning user rights to individuals in the sales department?

group based privileges

What is being tested when a company's payroll server is powered off for eight hours?

continuity of operations plan

A security analyst is reviewing an IRC channel and notices that a malicious exploit has been created for a frequently used application. She notifies the software vendor and asks them for remediation steps, but is alarmed to find that no patches are available to mitigate this vulnerability. What is the best description of this exploit?

Zero-day exploit

A security admin has concerns about new types of media which allow for the mass distribution of personal comments to a select group of people. To mitigate the risks involved with this media, employees should receive training on what?

social networking

A net admin is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no process in lace for the other software updates. What could MOST effectively mitigate these risks?

Application patch management

A network engineer is designing a secure tunneled VPN. Which protocol would be the MOST secure?


Which implementation steps would be appropriate for a public wireless hot spot?

open system authentication

An integral step in deploying a WPA=2 enterprise wireless network

install a digital certificate on the authentication server

Which control would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks>


What preventative control would be appropriate for responding to a directive to reduce the attack surface of a specific host?

disabling unnecessary services

A security manager must remain aware of the security posture of each system. What would support that requirement?

Establishing baseline reporting

deploying a wildcard certificate is one strategy to do what?

reduce the certificate management burden

Th security admin needs to manage traffic on a layer 3 device to support FTP from a new remote site. What would need to be implemented?

access control lists

Which port is used for SSH by default


A network admin has been tasked with securing the WLAN. Which cryptographic product would be used to provide the MOST secure environment for the WLAN?


A server with an IP address of has been having intermittent connection issues. The logs show repeated connection attempts from the following IPs:,,, and

These attempts are overloading the server to the point that it cannot respond to traffic. Which attack is occurring?


Which cipher would be best used to encrypt streaming video?


A user attempting to log on to a workstation for the first time is prompted for the following info before being granted access: username, password, and 4 digit pin that was mailed to him during account registration. This is an example of what?

single factor authentication

After analyzing and correlating activity from multiple sensors, the security admin has determined that a group of very well organized individuals from an enemy country is responsible for various attempts to breach the compay network, through the use of a very sophisticated and targeted attacks. This is an example of____.

advanced persistent threat


In a client-server architecture, when data integrity is critical to the organization, input validation should be performed on the server side.


A merchant acquirer has the need to store credit card numbers in a transitional database in a high performance environment. What best protects the credit card data?

database field encryption

A bank has a fleet of aging payment terminals used by merchants for transactional processing. The terminals currently support single DES but require an upgrade in order to be compliant with security standards. What is likely to be the simplest upgrade to the aging terminals which will improve in-transit protection of the transactional data?


What is the BEST at blocking and providing security at layer 7 of the OSI model?


What is BEST used to capture and alayze network traffic between hosts on the same network segment?

protocol analyzer

After a number of highly publicized and embarrassing customer data leaks as a result os social engineering attacks by the phone, the chief information officer (CIO) has decided the user training will reduce the risk of another data leak. What would be the MOST effective in reducing data leaks in this situation?

Information Security Awareness

What function provides an output which cannot be reversed and converts data into a string of characters?


What encrypts data a singlel bit at a time?

stream cipher

what is used to verify data integrity?


by default, TCP port 22 is used by ____.


Access mechanisms to data on encrypted USB hard drives must be implemented correctly otherwise what may occur?

the security controls on the USB drive can be bypassed.

Maintenance workers find an active network switch hidden above a dropped ceiling tile in the CEOs office with various connected cables from the office. What type of attack is occuring?

packet sniffing

A security admin is segregating all web facing server traffic from the internal network restricting it to a single interface on a firewall. What BEST describes this new network?


What was based on a previous X 500 specification and allows either unencrypted authentication or encrypted authentication through the use of TLS?


The quality assurance team is testing a new third party developed application. The quality team does not have any experience with the application. What is the team performing?

black box testing

___ has a storage root key.


A data center requires that staff be able to ID whether or not items have been removed from the facility. Which controls will allow the organization to provide automated notification of item removal?


A malicious person gained access to a datacenter by ripping the proximity badge reader off the wall near the datacenter entrance. This caused the electronic locks on the datacenter door to release because the ___.

system was designed to fail open for life-safety.

The concept of rendering data passing between two points over an IP based network impervious to all but the most sophisticated advanced persistent threats is BEST categorized as ___.

transport encryption

On Monday, all company employees report eing unable to connect to the corporate wireless network, which uses 802.1x with PEAP. A technician verifies that no configuration changes were made to the wireless network and its supporting infrastructure, and that there are no outages. What is MOST likely the cause of this?

The remote authentication dial-in user service server certificate has expired.

What would BEST deter an attacker trying to brute force 4 digit PIN numbers to access an account at a bank tell machine?

account lockout settings

In kerberos, the ticketing granting ticket s used for what?


What network design element allows for many internal devices to share on public IP address?


What component of an all in one security appliance would MOST likely be configured in order to restrict access to peer to peer file sharing websites?

URL filter

When considering a vendor specific vulnerability in critical industrial control systems, what technique supports availability?

incorporating diversity into redundant design

During the information gatherig stage of a deploying role-based access control model, what information is MOST likely required?

Matrix of job titles with required access privileges.

The CTO has been informed of a potential fraud committed by a database admin performing several other job functions within the company. What is the BEST method to prevent such activities in the future?

separation of duties

Ann would like to forward some personal identifiable information to her HR department by email, but she is worried about the confidentiality of the information. What will accomplish this task securely?


A company is trying to limit the risk associated with the use of unapproved USB devices to copy documents. Which would be the BEST technology control to use in this scenario?


A company is trying to implement physical deterrent controls to improve the overall security posture of their data center. What would help them BEST meets their goal?

Hardware locks

A company's employees were victims of a spear phishing campaign impersonating the CEO. The company would nwow like to implement a solution the overall security posture by assuring their that email originated from the CEO. Which of the following controls could they implement to BEST meet this goal?D

Digital signatures

A security technician is attempting to improve the overall security posture of an internal mail server. Which of the following actions would BEST accomplish this goal?

Disabling unnecessary services

A bank has recently deployed mobile tablets to all loan officers for use at customer sites. Which would BEST prevent the discolsure of customer data in the event that a tablet is lost or stolen?

Remote wiping

Which of the following is the primary security concern when deploying a mobile device on a network?

Data security

Which of the following technical controls is BEST used to define which applications a user can install and run on a company issued mobile device?


After a company has standardized to a single operating system, not all servers are immune to a well-known OS vulnerability. Which solution would mitigate this issue?

Patch management system

A security administrator discovers an image file that has several plain text documents hidden in the file. Which of the following security goals is met by comouflaging data inside of other files?


A company determines a need for additional protection from rogue devices plugging into physical ports around the building. What provides the highest degree of protection from unauthorized wired network access?


A company is preparing to decomission an offline, non-networked root certificate server. Before sending the server's drives to be destroyed by a contrated company, the Chief Security Officer wants to be certain that the data will not be accessed. If implimented, what would best reassure the CSO?

Full disk encryption and disk wiping prcedures

During the analysis of a PCAP file, a security noticed several communications with a remoter server on port 53. What protocol type is observed in this traffic?


A compromised workstation utilized in a DDoS attack has been created. However, the system administrator stated that the system as left unattended for several hours before the image was created. In the event of a court case, what is likely to be an issue with this incident?

chain of custody

During which phase of the incident response process should a security administrator define and the implement general defense general defence against malware?


Due to hardware limitation, a technician must impelment a wirelss encryption algorithm that used the RC4 protocol. Whcih wireless encryption solution should the technician implement to ensure the strongest level of security?


Joe, a user wants to send an encrypted email to Ann. Which of the following will Ann need to use to verofy that the email came from Joe and decrypt it?

Anns private key and Joes public key.

A technician wants to implement a udual factor authentication system that will enable the organization to authorize access to sensitive systems on a need to know basis. What should be implemented during the authorization stage?


A security researcher wants to reverse engineer an executable file to determine if it is malicious. The file was found on an underused server and appears to contain a zero-day exploit. What can the researcher do to determine in the file is malicious in nature?

OS baseline comparison

A recnet spike in virus detections has been attributed to end-users visiting www.company.com . The business has an established relationship with an organization using the URL of www.company.com but not with the site that hhas been causing the infections. What would BEST describe this type of attack?

Typo squatting

A company has proprietary mission critical devices connected to their network which are configured remotely by both employees and approved customers. The administrator wants to monitor device security without changing their baseline configuration. Whcih od the following should be implemented to secure the devices without risking availability?


An administrator has a network subnet dedicated to a group of users. Due to concerns regarding data and network secuirty. the administrator desires to proviede network access for this group only. Which of the following would BEST address this desire?

Configure the switch to allow only traffic from computers based upon their physical address.