-
Notifications
You must be signed in to change notification settings - Fork 208
/
Copy pathIAO101.txt
1413 lines (1412 loc) · 188 KB
/
IAO101.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
Which of the following threats will most likely produce a Risk that affects Confidentiality, Integrity and Availability? | Physical theft
The subject of phishing attacks is managed by which of the following domain? | User Domain
What is the weakest link in an IT infrastructure? | User Domain
Which of the following terms describes the process of scrambling data so only the intended recipient can read it? | Data confidentiality
Which of the following is NOT a U.S. compliance law or act? | PCI DSS
Which of the following ensures that only authorized parties can view the information? | Confidentiality
Which of the following is not true regarding firewalls? | They are able to block viruses.
Which of the following is NOT a property of a Packet Filtering Firewall? | Operates at the Application Layer
Which of the following is NOT a common vulnerability in the User Domain? | Transmitting private data unencrypted
Design and use seperate VLANs for voice and data is a best practice of? | Network infrastructure security
Which of the following is risk, threat or vulnerability of VoIP system? | Brute-force password attacks
What UC application is NOT supported by SIP? | Audio fast transmission
What feature is NOT provided by UC application? | Reliable data transfer
Which of the following generation is of Internet Broadband Era? | Fiber-Based DWDM Optical Backbones
Which of the following is a type of malware associated with collecting personal information without appropriately obtaining prior consent? | Spyware
Which of the following is the most common result of a buffer overflow? | Privilege escalation
Which of the following best describes spyware? | Software used for the collection of personal data
Which of the following best describes a rootkit? | Software hidden on a computer for the purpose of compromising the system
Which of the following is a threat target in the Remote Access Domain? | SSL-VPN tunnels
Which of the following is a common vulnerability in the System/Application Domain? | Weaknesses in server operating system or application software
Which of the following is NOT a common vulnerability in the Workstation Domain? | Accidental acceptable use policy violation
What is the backdoor? | A hidden access method in programs or systems
Which of the following is NOT a threat target in the Workstation Domain? | PDAs
Which of the following best describes a virus? | A program designed to attach itself to other code and replicate
Which of the following is an underlying activity of risk management? | Uncertainty analysis
You are trying to implement a strong authentication system. Which one of the following would be the appropriate system to implement? | Knowledge
Which of the following best describes the architecture of a Kerberos authentication system? | An architecture with a central server that issues tickets to allow one principal (for instance, a user) to authenticate themselves to another (such as a server).
Which of the following is not a form of identification? | Token device
What is access control? | Security features that control how users and systems communicate and interact with other systems and resources
What component of Kerberos helps mitigate replay attacks? | Authenticator
What is the baselines of a security policy? | Define basic configurations for specific types of computers or devices
What is a collection of suggestions that should be implemented. | Guideline
What is the second step of change control procedures? | Impact Assessment
Each of the following is what a security policy must do except: | State reasons why the policy is necessary
When you are attempting to install a new security mechanism for which there is not a detailed step-by-step guide on how to implement that specific product, which element of the security policy should you turn to? | Guidelines
Which of the following is NOT the type of authentication? | Physical devices
Risk should be handled in any of the following ways except: | Reject risk
A company needs to determine its security budget for the next year. It interviews users, administrators, and managers in the information technology division, who render opinions and recommendations based upon their perceptions of security risk. This is an example of what kind of approach to risk analysis? | Qualitative
The calculation for ALE is: | Single loss expectancy x Annualized rate of occurrence
Alice is responsible for an asset valued at $25,000. It is determined that her asset has an exposure factor of 10 percent. What is the single loss expectancy (SLE)? | $2,500
What procedures should take place to restore a system and its data files after system failure? | Implement recovery procedures
Which of the following is the first step in a business impact analysis? | Select individuals to interview for data gathering.
Which of the following best describes the continuity planning policy statement? | Scope of the BCP project, the team member roles, and the goals of the project.
A business impact analysis includes any of the following except: | Selecting team members
A critical company asset would most likely have which of the following MTD values? | Minutes to hours
What is used to create a digital signature? | The sender's private key
Asymmetric cryptography has all of the following strengths, except: | It is extremely fast
The asymmetric algorithm must have certain characteristics to be considered strong. Which of the following is correct pertaining to these types of characteristics? | Confusion is carried out through substitution, and diffusion is carried out through transposition.
Which of the following security services are provided if a sender encrypts data with her private key? | Authentication
Which of the following is a true difference between an asymmetric and symmetric algorithm? | Symmetric algorithms are faster because they use substitution and transposition
Which of the following best describes a digital signature? | A method to let the receiver of the message prove the source and integrity of a message
An ARP cache would provide what type of information? | IP and MAC addressing
Which is NOT a layer in the OSI architecture model? | Internet
Which of the following is NOT a true statement about Network Address Translation (NAT)? | Private addresses can easily be globally routable.
A disgruntled employee creates a utility for purging old emails from the server. Inside the utility is code that will erase the server's hard drive contents on January 1, 2012. This is an example of which of the following attacks? | Logic bomb
Which of the following is the most well-known ISO standard? | OSI reference model
The ISO/IEC 27002 is an update for which of the following standards? | ISO/IEC 17799
Which standards organization publishes standards such as XML? | W3C
What is the ISO/IEC 27002 standard? | The update version of ISO/IEC 17799
Which standards organization publishes the 802.11a standard? | IEEE
The integrity of data is NOT related to which of the following? | The extraction of data to share with unauthorized entities
Which of the following domain include managing and configuring the DMZ? | LAN-to-WAN Domain
Which is untrue of a packet filtering firewall? | High security
Which of the following generation is NOT Internet Broadband Era? | ATM Switches
What is the commnunication challenge is solved with unified communications? | Human latency
Which of the following is NOT the way to harden telephone and voice communications security? | Enable remote access via the analog modem port
Which of the following is best describes a Trojan? | It infects other systems only after a user executes the application that it is buried in.
Which of the following is a type of malware that provides the spam or virus originator with a venue to propagate? | Botnet
Which of the following is a threat target in the System/Application Domain? | ERP applications and systems
What is the residual risk? | Security risk remaining after implementing controls
How are smart cards and memory cards functionally different? | Memory cards store but do not process information while smart cards can process information.
How is Kerberos a single sign-on technology? | The user enters his credentials one time and obtains a TGT. The user uses the TGT each time he needs to communicate to a network resource.
Each of the following should serve on a security policy development team except: | Representative from an antivirus vendor
Each of the following is a guideline for developing a security policy except: | Require all users to approve the policy before it is implemented
Which of the following is not a characteristic of a policy? | Policies communicate a unanimous agreement of judgment.
Which of the following is a document that defines the scope of security needed by an organization, lists the assets that need protection, and discusses the extent to which security solutions should go to provide the necessary protection? | Security policy
Which of the following is true of a qualitative risk analysis approach? | Identifies major areas of risk
Bob is working on a risk assessment project. His boss, Alice, is very numbers-driven and analytical. What type of approach would be the smartest course of action for Bob to take? | Quantitative approach
What is the first step in developing a disaster recovery plan? | Perform a business impact analysis
Which item will a business impact analysis not identify? | If the company is best suited for a parallel or full-interrupt test
Which of the following statements regarding symmetric key cryptography is false? | Key management is a strength
Symmetric cryptography has advantages and disadvantages. Which of the following is not considered a disadvantage? | Confidentiality
Which of the following is risk, threat or vulnerability of key phone system? | Class-of-service settings are not secure
How to built the ARP tables? | Dynamically or manually
What is the purpose of the Presentation layer? | Data syntax and formatting
What is encapsulation? | Adding a header and footer to data as it moves down the OSI stack
Which standards organization publishes the C99 language? | ANSI
What is IEC? | A preeminent organization for developing and publishing international standards for technologies related to electrical and electronic devices and processes
What is IETF? | An organization develops and promotes Internet standards.
The IETF produces documents called | RFCs
Which of the following threats will most likely produce a Risk that affects Confidentiality, Integrity and Availability? | a. Physical theft
Subject of phishing attacks is managed by which of the following domain? | a. User Domain
What is the weakest link in an IT infrastructure? | a. User Domain
Which of the following terms describes the process of scrambling data so only the intended recipient can read it? | a. Data confidentiality
Which of the following is NOT a U.S. compliance law or act? | a. PCI DSS
Which of the following ensures that only authorized parties can view the information? | a. Confidentiality
Which of the following is not true regarding firewalls? | a. They are able to block viruses.
Which of the following is NOT a property of a Packet Filtering Firewall? | a. Operates at the Application Layer
Which of the following is NOT a common vulnerability in the User Domain? | a. Transmitting private data unencrypted
Design and use seperate VLANs for voice and data is a best practice of? | a. Network infrastructure security
Which of the following is risk, threat or vulnerability of VoIP system? | a. Brute-force password attacks
What UC application is NOT supported by SIP? | a. Audio fast transmission
What feature is NOT provided by UC application? | a. Reliable data transfer
Which of the following generation is of Internet Broadband Era? | a. Fiber-Based DWDM Optical Backbones
Which of the following is a type of malware associated with collecting personal information without appropriately obtaining prior consent? | a. Spyware
Which of the following is the most common result of a buffer overflow? | a. Privilege escalation
Which of the following best describes spyware? | a. Software used for the collection of personal data
Which of the following best describes a rootkit? | a. Software hidden on a computer for the purpose of compromising the system
Which of the following is a threat target in the Remote Access Domain? | a. SSL-VPN tunnels
Which of the following is a common vulnerability in the System/Application Domain? | a. Weaknesses in server operating system or application software
Which of the following is NOT a common vulnerability in the Workstation Domain? | a. Accidental acceptable use policy violation
What is the backdoor? | a. A hidden access method in programs or systems
Which of the following is NOT a threat target in the Workstation Domain? | a. PDAs
Which of the following best describes a virus? | a. A program designed to attach itself to other code and replicate
Which of the following is an underlying activity of risk management? | a. Uncertainty analysis
You are trying to implement a strong authentication system. Which one of the following would be the appropriate system to implement? | a. Knowledge
Which of the following best describes the architecture of a Kerberos authentication system? | a. An architecture with a central server that issues tickets to allow one principal (for instance, a user) to authenticate themselves to another (such as a server).
Which of the following is not a form of identification? | a. Token device
What is access control? | a. Security features that control how users and systems communicate and interact with other systems and resources
What component of Kerberos helps mitigate replay attacks? | a. Authenticator
What is the baselines of a security policy? | a. Define basic configurations for specific types of computers or devices
What is a collection of suggestions that should be implemented | a. Guideline
What is the second step of change control procedures? | a. Impact Assessment
Each of the following is what a security policy must do except: | a. State reasons why the policy is necessary
When you are attempting to install a new security mechanism for which there is not a detailed step-by-step guide on how to implement that specific product, which element of the security policy should you turn to? | a. Guidelines
Which of the following is NOT the type of authentication? | a. Physical devices
Risk should be handled in any of the following ways except: | a. Reject risk
A company needs to determine its security budget for the next year. It interviews users, administrators, and managers in the information technology division, who render opinions and recommendations based upon their perceptions of security risk. This is an example of what kind of approach to risk analysis? | a. Qualitative
The calculation for ALE is: | a. Single loss expectancy x Annualized rate of occurrence
Alice is responsible for an asset valued at $25,000. It is determined that her asset has an exposure factor of 10 percent. What is the single loss expectancy (SLE)? | a. $2,500
What procedures should take place to restore a system and its data files after system failure? | a. Implement recovery procedures
Which of the following is the first step in a business impact analysis? | a. Select individuals to interview for data gathering.
Which of the following best describes the continuity planning policy statement? | a. Scope of the BCP project, the team member roles, and the goals of the project.
A business impact analysis includes any of the following except: | a. Selecting team members
A critical company asset would most likely have which of the following MTD values? | a. Minutes to hours
What is used to create a digital signature? | a. The sender's private key
Asymmetric cryptography has all of the following strengths, except: | a. It is extremely fast
A symmetric algorithm must have certain characteristics to be considered strong. Which of the following is correct pertaining to these types of characteristics? | a. Confusion is carried out through substitution, and diffusion is carried out through transposition.
Which of the following security services are provided if a sender encrypts data with her private key? | a. Authentication
Which of the following is a true difference between an asymmetric and symmetric algorithm? | a. Symmetric algorithms are faster because they use substitution and transposition
Which of the following best describes a digital signature? | a. A method to let the receiver of the message prove the source and integrity of a message
An ARP cache would provide what type of information? | a. IP and MAC addressing
Which is NOT a layer in the OSI architecture model? | a. Internet
Which of the following is NOT a true statement about Network Address Translation (NAT)? | a. Private addresses can easily be globally routable.
A disgruntled employee creates a utility for purging old emails from the server. Inside the utility is code that will erase the server's hard drive contents on January 1, 2012. This is an example of which of the following attacks? | a. Logic bomb
Which of the following is the most well-known ISO standard? | a. OSI reference model
The ISO/IEC 27002 is an update for which of the following standards? | a. ISO/IEC 17799
Which standards organization publishes standards such as XML? | a. W3C
What is the ISO/IEC 27002 standard? | a. The update version of ISO/IEC 17799
Which standards organization publishes the 802.11a standard? | a. IEEE
1.___________ is the process of transforming data from cleartext into ciphertext | Encryption
2. The ____________ represents the fourth layer of defense for a typical IT infrastructure | Lan-to-wan
3.With wireless LANs (WLANs), radio transceivers are used to transmit IP packets from a WLAN NIC to a _____________. | Wireless access point (WAP)
4. A ________ is a collection of computers connected to one another or to a common connection medium. | Local area network (LAN)
5. A ___________ defines how a business gets back on its feet after a major disaster like a fire or hurricane. | Disaster recovery plan (DRP)
6. A ___________ gives priorities to the functions an organization needs to keep going. | Business continuity plan (BCP)
7.Connecting your computers or devices to the ________ immediately exposes them to attack. | Internet
8. The director of IT security is generally in charge of ensuring that the ____________ conforms to policy. | Workstation Domain
9. The goal and objective of a __________ is to provide a consistent definition for how an organization should handle and secure different types of data. | Data classification standard
10.The requirement to keep information private or secret is the definition of __________. | Confidentiality
11.The world needs people who understand computer-systems ________ and who can protect computers and networks from criminals and terrorists. | security
12. The ________ is where the fourth layer of defense is required. | LAN-to-WAN Domain
13. This security appliance examines IP data streams for common attack and malicious intent patterns. | intrusion detection system (IDS)
14. What name is given to a U.S. federal law that requires U.S. government agencies to protect citizens' private data and have proper security controls in place? | Federal Information Security Management Act (FISMA)
15. An encrypted channel used for remote access to a server or system, commonly used in Linux and UNIX servers and applications, is the definition of __________. | secure shell (SSH)
16.Audio conferencing is a software-based, real-time audio conference solution for ________ callers. | VoIP
17.E-commerce changed how businesses sell, and the ________ changed how they market. | Internet
18. Medical practices and hospitals realized early on that ________ provide(s) the ability to provide access to the necessary information without having to invest in many computers and network infrastructure. | mobile devices
19. The ________ in analog communications is one error for every 1,000 bits sent; in digital communications, the __________ is one error for every 1,000,000 bits sent. | Bit error rate
20.What name is given to a high-speed broadband networking technology that uses a 53-byte cell to support real-time voice, video, or data communications? | Dense wavelength division multiplexing (DWDM)
21. What term is used to describe a packet-based WAN service capable of supporting one-to-many and many-to-many WAN connections? | frame relay
22. ________ is a technique where multiple light streams can transmit data through a single strand of fiber. | Dense wavelength division multiplexing (DWDM)
23. A software program that collects information about Internet usage and uses it to present targeted advertisements to users is the definition of ________. | adware
24. A _________ has a hostile intent, possesses sophisticated skills, and may be interested in financial gain. They represent the greatest threat to networks and information resources. | cracker
25. A __________ tries to break IT security and gain access to systems with no authorization, in order to prove technical prowess. | black-hat hacker
26. A ___________ is a software program that performs one of two functions: brute-force password attack to gain unauthorized access to a system, or recovery of passwords stored in a computer system. | password cracker
27. A ___________ is a tool used to scan IP host devices for open ports that have been enabled. | port scanner
28. A ___________ fingerprint scanner is a software program that allows an attacker to send log-on packets to an IP host device. | operating system (OS)
29. An attempt to exploit a vulnerability of a computer or network component is the definition of ________. | attack
30. Black-hat hackers generally poke holes in systems, but do not attempt to disclose __________ they find to the administrators of those systems. | vulnerabilities
31. In a ________, the attacker sends a large number of packets requesting connections to the victim computer. | SYNflood
32. A ___________ is a formal analysis of an organization's functions and activities that classifies them as critical or noncritical. | business impact analysis (BIA)
33. Any organization that is serious about security will view ___________ as an ongoing process. | risk management
34. A___________ primarily addresses the processes, resources, equipment, and devices needed to continue conducting critical business activities when an interruption occurs that affects the business's viability. | business continuity plan (BCP)
35. Information security activities directly support several common business drivers, including ________ and efforts to protect intellectual property. | compliance
36. Risks apply to specific assets. If you multiply the risk __________ by the cost of the asset, the result is the exposure to a specific risk. | probability
37. The first step in risk analysis is to determine what and where the organizations _________ are located. | assets
38. The recovery point objective (RPO) identifies the amount of _________ that is acceptable. | data loss
39. What is meant by risk register? | A list of identified risks that results from the risk-identification process.
40. What name is given to a risk-analysis method that uses relative ranking to provide further definition of the identified risks in order to determine responses to them? | qualitative risk analysis
41. When you accept a __________, you take no further steps to resolve. | negative risk
42. A mechanism that limits access to computer systems and network resources is ________, | logical access control
43. How is decentralized access control defined? | A system that puts access control into the hands of people such as department managers who are closest to system users; there is no one centralized entity to process access requests in this system.
44. This device uses public key infrastructure (PKI) technology�for example, a certificate signed by a trusted certification authority�and doesn't provide one-time passwords. | USBtoken
45. Two-factor __________ should be the minimum requirement for valuable resources as it provides a higher level of security than using only one. | authentication
46. What name is given to an access control method that bases access control approvals on the jobs the user is assigned? | Role-based access control (RBAC)
47. When you apply an account-lockout policy, set the __________ to a high enough number that authorized users aren't locked out due to mis-typed passwords. | threshold
48. Which of the following is the definition of access control? | The process of protecting a resource so that it is used only by those allowed to use it; a particular method used to restrict or allow access to resources.
49. ________ is used to describe a property that indicates that a specific subject needs access to a specific object. This is necessary to access the object in addition to possessing the proper clearance for the object's classification. | Need-to-know
50. A physically constrained user interface is a user interface that does not provide a physical means of entering unauthorized information. | True
51. Access control is the process of proving you are the person or entity you claim to be. | False
52. LAN to WAN connectivity is ____. | access server
53. A(n) ____ is a network of computers and other devices that is confined to a relatively small space, such as one building or even one office. | LAN
54. A personal computer which may or may not be connected to a network is a(n) ____. | workstation
A ____ enables resource sharing by other computers on the same network. | host
____ refer to the capability of a server to share data files, applications (such as word-processing or spreadsheet programs), and disk storage space. | File services
A ____ is usually composed of a group of nodes that use the same communications channel for all their traffic. | segment
The device inside a computer that connects a computer to the network media and allows it to communicate with other computers is known as a(n) ____. | NIC (Network Interface Card)
TRUE or FALSE: Networks are usually only arranged in a ring, bus, or star formation and hybrid combinations of these patterns are not possible. | FALSE
TRUE or FALSE: Clients on a client/server network share their resources directly with each other. | FALSE
TRUE or FALSE: Protocols ensure that data are transferred whole, in sequence, and without error from one node on the network to another. | TRUE
The ____ is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. | network operating system
A(n) ____ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand. | web server
A(n) ____ allows 24 multiplexed voice signals over a single neighborhood line. | FDM (frequency-division multiplex)
The ____ is the main circuit that controls the computer. | motherboard
The ____ of a network refers to that part of the network to which segments and shared devices connect. | backbone
TRUE or FALSE: Resource sharing is controlled by a central computer or authority. | FALSE
Any device that gives off a spark is also probably emitting ___. | EMI (electro-magnetic interference)
A network that is larger than a LAN and connects clients and servers from multiple buildings is known as a(n) ____. | MAN (metropolitan area network)
In a(n) ____ network, every computer can communicate directly with every other computer. | peer-to-peer
____ coordinate the storage and transfer of e-mail between users on a network. | Mail services
____ is an organization composed of more than a thousand representatives from industry and government who together determine standards for the electronics industry and other fields, such as chemical and nuclear engineering, health and safety, and construction. | ANSI (American National Standards Institute)
____ is a technical advisory group of researchers and technical professionals interested in overseeing the Internet's design and management. | IAB (Internet Architecture Board)
The primary function of protocols in the ____ layer, is to divide data they receive from the Network layer into distinct frames that can then be transmitted by the Physical layer. | data link
The ____ is responsible for Internet growth and management strategy, resolution of technical disputes, and standards oversight. | IAB (Internet Architecture Board)
____ is a connection oriented protocol. | TCP
What defines the minimum acceptable performance of a product or service? | standards
A _____ is a unique character string that allows the receiving node to determine if an arriving data unit matches exactly the data unit sent by the source. | checksum
Who is responsible for IP addressing and domain name management. | ICANN (Internet Corporation for Assigned Names andNumbers)
____ is a method of identifying segments that belong to the same group of subdivided data. | Sequencing
A business that provides organizations and individuals with access to the Internet and often, other services, such as e-mail and Web hosting is known as a(n) _____. | ISP (internet service provider)
A device that connects network segments and direct data is known as a(n) _____. | router
The _____ provides developing countries with technical expertise and equipment to advance those nations' technological bases. | ITU (International Telecommunication Union)
The ____ is a specialized United Nations agency that regulates international telecommunications, including radio and TV frequencies, satellite and telephony specifications, networking infrastructure, and tariffs applied to global communications. | ITU (International Telecommunication Union)
Protocols at the ____ layer accept frames from the Data Link layer and generate voltage so as to transmit signals. | physical
Among the Session layer's functions are establishing and keeping alive the communications link for the duration of the session, keeping the communication secure, synchronizing the dialogue between the two nodes, determining whether communications have been cut off, and, if so, figuring out where to restart transmission, and terminating communications. | TRUE
Connectivity devices such as hubs and repeaters operate at the ____ layer. | physical
The ____ layer is the lowest, or first, layer of the OSI Model. | physical
TRUE or FALSE: Connectivity devices such as hubs and repeaters operate at the Presentation layer of the OSI Model. | FALSE
Addresses used to identify computers on the Internet and other TCP/IP-based networks are known as ____ addresses. | IP (internet protocol)
Every process that occurs during network communications can be associated with a layer of the OSI Model | TRUE
Through ____ layer protocols, software applications negotiate their formatting, procedural, security, synchronization, and other requirements with the network. | application
___ addresses contain two parts: a Block ID and a Device ID. | MAC
The Application layer separates data into ____ or discrete amounts of data. | protocol data units
The primary function of protocols at the session layer is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver. | FALSE
The ____ is a trade organization composed of representatives from electronics manufacturing firms across the United States. | EIA (Electronic Industries Alliance)
The process of gauging the appropriate rate of transmission based on how fast the recipient can accept data is known as _____. | flow control
TRUE or FALSE: Addressing is a system for assigning unique identification numbers to devices on a network. | TRUE
An anonymous login may be used with _______ . | FTP
____ is a Network layer protocol that obtains the MAC (physical) address of a host, or node, and then creates a database that maps the MAC address to the host's IP (logical) address. | ARP (Address Resolution Protocol)
____ provides information about how and where data should be delivered, including the data's source and destination addresses. | IP (Internet Protocol)
TRUE or FALSE: Routers use DHCP to determine which nodes belong to a certain multicast group and to transmit data to all nodes in that group. | FALSE
____ are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table. | Dynamic ARP table entries
____ is a transmission method that allows one node to send data to a defined group of nodes. | Multicasting
____ is the process of subdividing a network segment. | Subnetting
TRUE or FALSE: An IP whose first octet is in the range of 128-191 belongs to a Class C network. | FALSE, it belongs to a Class B network
____ is an automated means of assigning a unique IP address to every device on a network. | DHCP (Dynamic Host Configuration Protocol)
In the context of TCP/IP, a packet is also known as a(n) ____. | IP datagram
TRUE or FALSE: Static IP addressing can easily result in the duplication of address assignments. | TRUE
What defines the standards for communication between network devices? | protocols
TRUE or FALSE: UDP (User Datagram Protocol) belongs to the Transport layer of the OSI. | TRUE
____ is a Network layer protocol that reports on the success or failure of data delivery. | ICMP (Internet Control Message Protocol)
TRUE or FALSE: A device without an IP address, can get one with ARP. | FALSE
The IP address 127.0.0.1 is called a(n) ____. | loopback address
To traverse more than one LAN segment and more than one type of network through a router. | Internetwork
Process of subdividing a single class of networks into multiple, smaller logical networks, or segments. | Subnetting
An address that represents a single interface on a device. | Unicast address
The most common way of expressing IP addresses. | Dotted decimal notation
The database of Internet IP addresses and their associated names. | Name Space
Used to synchronize the clocks of computers on a network. | NTP (Network Time Protocol)
A collection of protocols designed by the IETF to simplify the setup of nodes on a TCP/IP network. | Zeroconf
Group of computers that belongs to the same organization and has part of their IP addresses in common. | domain
Protocols that can span more than one LAN. | Routable
____ operates at the Transport layer of the OSI Model and provides reliable data delivery services. | TCP (Transmission Control Protocol)
____ is a terminal emulation protocol to log on to remote hosts using the TCP/IP protocol suite. | Telnet
ICMP services are used by ______ to send echo requests. | PING (Packet INternet Groper)
In classful addressing, the network information portion of an IP address (the network ID) is limited to the first ____ bits in a Class A address. | 8
Together, the additional bits used for subnet information plus the existing network ID are known as the ____. | extended network prefix
The utility that allows you to query the DNS registration database and obtain information about a domain is called ____. | whois
The ____ utility performs the same TCP/IP configuration and management as the ipconfig utility, but applies to UNIX and Linux OS's. | ifconfig
A subnet created by moving the subnet boundary to the left is known as a(n) ____. | supernet
The formula for determining how to modify a default subnet mask is ____. | 2^n - 2 = Y
The ____ utility uses ICMP to trace the path from one networked node to another, identifying all intermediate hops between the two nodes. | traceroute
A(n) ____ indicates where network information is located in an IP address. | subnet mask
On networks that run NetBIOS over TCP/IP, the ____ utility can provide information about NetBIOS statistics and resolve NetBIOS names to their IP addresses. | nbtstat
The ____ utility allows you to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa. | nslookup
____ are a combination of software and hardware that enable two different network segments to exchange data. | Gateways
TRUE or FALSE: When a router is used as a gateway, it must maintain routing tables as well. | TRUE
A _____ consists of four 8-bit octets (or bytes) that can be expressed in either binary or dotted decimal notation. | IP address
Octet(s) that represent host information are set to equal all 1s, or in decimal notation 255 are known as _____ . | broadcast addresses
____ is a mail protocol that is incapable of doing anything more than transporting mail or holding it in a queue. | SMTP (Simple Mail Transfer Protocol)
_____ takes the form of the network ID followed by a forward slash (/), followed by the number of bits that are used for the extended network prefix. | CIDR (Classless InterDomain Routing) notation
A(n) _____ is usually assigned an IP address that ends with an octet of .1. | internet gateway
_____ is a TCP/IP utility similar to nslookup. | dig
The process of separating a network into multiple logically defined segments, or subnets is known as ______. | subnetting
_____ identifies each element of a mail message according to content type. | MIME (Multipurpose Internet Mail Extensions)
A(n) _____ requires two network connections: one that connects to the Internet and one that connects to the LAN. | ICS Host
____ is the protocol responsible for moving messages from one mail server to another over TCP/IP-based networks. | SMTP (Simple Mail Transfer Protocol)
The netstat ____ command allows you to display the routing table on a given machine. | -r
____ is an Application layer protocol used to retrieve messages from a mail server. | POP (Post Office Protocol)
____ is a command-line utility that provides information about a network adapter's IP address, subnet mask, and default gateway. | IPconfig
When working on a UNIX-type of system, you can limit the maximum number of router hops the traceroute command allows by typing the ____ switch. | -m
TRUE or FALSE: The "0" bits in a subnet mask indicate that corresponding bits in an IP address contain network information. | FALSE
____ is a mail retrieval protocol that was developed as a more sophisticated alternative to POP3. | IMAP (Internet Message Access Protocol)
A form of transmission that allows multiple signals to travel simultaneously over one medium is known as ____. | multiplexing
The distance between corresponding points on a wave's cycle is called its _____. | wavelength
____ cable consists of color-coded pairs of insulated copper wires, each with a diameter of 0.4 to 0.8 mm. | Twisted-pair
You must limit the number of ___ on a segment for a clear, strong, and timely signal. | nodes
____ signals are composed of pulses of precise, positive voltages and zero voltages. | Digital
TRUE or FALSE: A full-duplex channel is like a river. | FALSE
A(n) ____ is a piece of hardware that enables networks or segments running on different media to interconnect and exchange signals. | media converter
Can be twisted at least twelve times per foot. | Cat5
TRUE or FALSE: Transmission methods using fiber-optic cables achieve faster throughput than those using copper or wireless connections. | TRUE
A ____ is a distinct communication path between nodes, much as a lane is a distinct transportation path on a freeway. | channel
A panel of data receptors into which horizontal cabling from the workstations is inserted is called a _____ . | punch-down block
The progress of a wave over time in relationship to a fixed point is known as the ____ of the wave. | phase
_____ cable has a 250-MHz rate. | Cat6
_______ is the nondata information that must accompany data for a signal to be properly routed and interpreted by the network. | Overhead
Follows the 5-4-3 rule of networking. | 10BASE-T
_____ are digital signals sent through DC with exclusive use. | Baseband
_____ causes noise. | EMI (electro-magnetic interference)
_____ divides a channel into multiple intervals of time, or time slots. | TDM (time division multiplex)
The point of division between the telcom service provider and internal network ____. | demarc
A wave's ____ is a measure of its strength at any given point in time. | amplitude
A 568 standard is for __. | structured cabling
A device that regenerates a digital signal is called a(n) ____. | repeater
A(n) ____ segment does not contain end nodes. | unpopulated
The loss of a signal's strength as it travels away from its source is known as ____. | attenuation
The hardware that makes up the enterprise-wide cabling system is known as the ____. | cable plant
TRUE or FALSE: A pulse of positive voltage represents a 0. | FALSE
TRUE or FALSE: Seven bits form a byte | FALSE
When a data transmission involves only one transmitter and one receiver, it is considered a(n) ____ transmission. | point-to-point
____ are connectivity devices that enable a workstation, server, printer, or other node to receive and transmit data over the network media. | NICs
TRUE or FALSE: A repeater typically contains multiple data ports into which the patch cables for network nodes are connected. | FALSE
____ automatically calculates the best path between two nodes and accumulates this information in a routing table. | Dynamic routing
____ is the routing protocol of Internet backbones and is not used to route between nodes on an autonomous LAN - that is, it is used on border and exterior routers. | BGP
The term ____ refers to the most efficient route from one node on a network to another. | best path
A(n) ____ is software that enables an attached device to communicate with the computer's OS. | driver
____ are devices that connect two network segments by analyzing incoming frames and making decisions about where to direct them based on each frame's MAC address. | Bridges
TRUE or FALSE: Hubs operate at the Network layer of the OSI model. | FALSE
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks. | Gateways
Most hubs also contain one port, called a(n) ____, that allows the hub to connect to another hub or other connectivity device. | uplink port
TRUE or FALSE: If congestion or failures affect the network, a router using dynamic routing can detect the problems and reroute data through a different path. | TRUE
TRUE or FALSE: One disadvantage to using wireless NICs is that currently they are somewhat more expensive than wire-bound NICs. | TRUE
A computer's ____ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory, processor, hard disk, and NIC. | bus
A routers strength lies in its ____ . | intelligence
A(n) ____ is a device or connection on a network that,were it to fail, could cause the entire network or portion of the network to stop functioning. | single point of failure
A router with multiple slots that can hold different interface cards or other devices is called a(n) ____. | modular router
A(n) ____ hub does nothing. | passive
231. In popular usage and in the media, the term ________ often describes someone who breaks into a computer system without authorization | Hacker
Data classification standards, know the types of data and how they are classified. | Private data,Confidential, Internal use only, and public domain data.
Know the government data classification standards. | Top Secret, Secret and Confidential
Private Data | information which is confidential and only ethically available to selected individual.. The right to keep certain things to yourself; not for public viewing.
Confidential Data | Information or data that is owned by the organization. Intellectual property such as customer lists, pricing information, and patents.
Public Domain Data | Information or data shared with the public such as web site content, white papers, etc.
Top Secret | Applies to information that the classifying authority finds would cause grave damage to national security if it were disclosed.
Secret | Applies to information that the classifying authority finds would cause serious damage to national security if it were disclosed.
Confidential | Applies to information that the classifying authority finds would cause damage to national security.
IT Security Policy Framework | Policy, Standard, Procedures and Guidelines.
Policy | a short written statement that the people in charge of the organization have set as a course of action or direction. A Policy comes from upper management and applies to the entire organization.
Standard | a detailed written definition for hardware and software and how it is to be used. Standards ensure that consistent security controls are used throughout the IT system.
Procedures | are written instructions for how to use polices and standards. The may include a plan of action, installation, testing and auditing of security controls.
Guidelines | a suggested course of action for using the policy, standards, or procedures. Guidelines can be specific or flexible regarding use.
Data Classifications Standards | The goal and objective of data classification standard is to provide a consistent definition for how an organization should handle and secure different types of data. (Private Data, Confidential Data, Internal Use Only and Public Domain Data.
Compliance Laws - Sarbanes Oxley Act | Passed in 2002, it requires publicly traded companies to submit accurate financial reporting. It does not require securing private information, but it does require security controls to protect the confidentiality and integrity of the reporting itself.
Compliance Laws - Gramm-Leach-Bliley Act | Passed in 1999, requires all types of financial institutions to protect customers' private financial information.
Health Insurance Portability and Accountability Act (HIPPA) | Passed in 1996, requires health care organizations to secure to secure patient information.
Children's Internet Protection Act (CIPA) | Passed in 2000, requires public schools and public libraries to use an Internet safety policy. The policy must address the following: Children's access to inappropriate matter on the Internet, Children's security when using e-mail, chat rooms, and other electronic communications, restricting hacking and other unlawful activities by children online, disclosing and distributing personal information about children without permission, and restricting children's access to harmful materials.
Risks | the likelihood that something bad will happen to an asset. The exposure to some event that has an effect on an asset.
Threats | any action that could damage an asset. Threats include natural and human-induced threats.
Vulnerability | a weakness that allows a threat to be realized or to have an effect on an asset.
User Domain Vulnerability | Lack of awareness or concern for security policy, Accidental acceptable use policy violation, Intentional malicious activity, and Social engineering
Workstation Domain Vulnerability | Unauthorized user access, Malicious software introduced, and weaknesses in installed software.
LAN Domain Vulnerability | Unauthorized network access, transmitting private data unencrypted, and spreading malicious software.
LAN-to-WAN Domain Vulnerability | Exposure and unauthorized access of internal resources to the public, Introduction of malicious software, and Loss of productivity due to internet access.
WAN Domain Vulnerability | Transmitting private data unencrypted, Malicious attacks from anonymous sources, Denial of Service attacks, and Weaknesses in software.
Remote Access Domain Vulnerabilty | Brute-force attacks on access and private data, Unauthorized remote access to resources, and Data leakage from remote access or lost storage devices.
System/Application Domain Vulnerability | Unauthorized physical or logical access to resources, Weakness in server operating system or application software, and Data loss from errors, failures or disasters.
Types of hackers | Black-hat Hackers, Gray-hat Hackers, and White-hat Hackers
Black-hat Hackers | tries to break IT security for the challenge and to prove technical prowess. They tend to poke holes in a system but do not attempt to disclose vulnerabilities they find to the administration.
Gray-hat Hackers | a hacker with average abilities who may one day become a Black-hat or White-hat hacker.
White-hat Hackers | uses different penetration-test tools to uncover vulnerabilities so that they can be fixed.
Risk Vulnerability | The likelihood that something bad will happen.
Risk Methodology | A description of how you will manage risks. Includes the approach, required information, and the techniques to address each risk.
Security Gap | The difference between the security controls in place and the control you need in order to address all vulnerabilities.
Steps of the System Life Cycle | 1. Project initiation and planning
In the change management process, what are the configuration control and change control? | Configuration control is the management of the baseline settings for a system device. The baseline settings meet security requirements. They require that you implement them carefully and only with prior approval.
Principles of least privilege | The principles of least privilege, means giving a user account only those privileges which are essential to that user's work.
When developing, implementing and designing and organization you often must comply with the rules on what level? | Regulatory Compliance
Brewer and Nash Integrity Model | based on the mathematical theory published in 1989 to ensure fair competition. It is used to apply dynamically changing access permissions.
What are the formal models of access control? | Discretionary access control (DAC) - the owner of the resource decides who gets in. The owner can give that job to others.
What are the types of Access Control? | Physical access controls - Control entry into buildings, parking lots and protected areas.
How does identification and authorization work together in the access control process? | Identification is the method a subject uses to request access to a system or resource. Authorization is the process of deciding who has access to which computer and network resources.
What does a bushiness impact analysis determine? | ...
What are the components of a business continuity plan? | BCP &DRP
What are the primary components of Risk Management? | Mitigation, assignment, acceptance and avoidance.
What are controls that monitor activity? | IDS, IPS and Firewalls
What are monitoring issues for logging? | ...
What is a security audit? | The purpose of a security audit is to make sure your systems and security controls work as expected. Includes Monitor, Audit, Improve & Secure.
What is an advantage of IPv6 over IPv4 | More host addresses
What SSID beaconing and why is it considered a weakness of Wireless LANs? | By default, wireless networks brodcast their presence to the public sending out announcements containing the network's service identifier (SSID).
Identify and define router, switch, hub and firewalls? Which one would you not see on a corporate network? | Hub - because it broadcasts to everyone, increasing traffic.
Router | A device that forwards data packets between computer networks
Switch | A device for transmitting data on a network. A switch makes decisions, based on the media access control (MAC) address of the data, as to where the data is to be sent.
Hub | A device that is the central connecting point of a LAN. A hub is little more than a multi-port repeater taking incoming signals on one port and repeating them to all other ports. Ethernet hubs have been largely replaced by Ethernet switches.
Firewall | A software program or hardware device designed to prevent unauthorized access to computers or networks.
What is the difference between a broad firewall and a multi-layered firewall and when is i appropriate to use each type? | Pages 330-332
What are the activities/responsibilities happening on each layer of the OSI Model? | Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, and Physical Layer.
Confidentiality | Keeps information secret from all but authorized people.
Integrity | Ensures no one, even the sender, changes information after transmitting it.
Authentication | Confirms the identity of an entity.
Non-replication | Enables you to prevent a party from denying a previous statement or action.
What could be proved by an asymmetric digital signature vs a symmetric digital signature and what is the fancy name for the thing that can be proved? | Asymmetric Digital Signature - Data encrypted with one key can be decrypted only with the other key. Symmetric Digital Signature -uses the same key to encrypt and decrypt.
Identify the different Asymmetric Cryptographic Applications? | RSA, DSA & SHA
RSA | A commonly used encryption and authentication algorithm named for MIT students, An asymmetric algorithm used to encrypt data and digitally sign transmissions. It is named after its creators, Rivest, Shamir, and Adleman, and RSA is also the name of the company they founded together. RSA relies on the mathematical properties of prime numbers when creating public and private keys.
DSA | Digital Signature Algorithm. A digital signature is an encrypted hash of a message. The sender's private key encrypts the hash of the message to create the digital signature. The recipient decrypts the hash with the sender's public key, and, if successful, it provides authentication, non-repudiation, and integrity. Authentication identifies the sender. Integrity verifies the message has not been modified. Non-repudiation is used with online transactions and prevents the sender from later denying they sent the e-mail.
SHA | Secure Hash Algorithm - A one way hash algorithm designed to ensure the integrity of a message.
What are the four security objectives for internal security and what do they mean? | Privacy, Integrity, Authorization and Access Control
Privacy | Keeps information readable only by authorized people.
Integrity | Ensures that no one has changed or deleted data.
Authorization | Approving someone to do a specific task or access certain data.
Access Control | Restricting information to the right people.
What is a transposition cipher, a substitution cipher and which one is a Caesar Cipher? | Substitution is a Caesar Cipher.
Transposition Cipher | Rearranges characters or bits of data.
Substitution Cipher | Replaces bits, characters, or blocks of information with other bits, characters, or blocks.
How does Risk Management affect security roles? | Pages 252-253
What does a business impact analysis determine? | Determines the impact that a particular incident would have on business operations over time and drives the choice of the recovery strategy and the critical business functions.
What are the components of a business continuity plan? | BCP and DRP
BCP | Business continuity plan. A plan that helps an organization predict and plan for potential outages of critical services or functions. It includes disaster recovery elements that provide the steps used to return critical functions to operation after an outage.
DRP | Disaster recovery plan. A document designed to help a company respond to disasters, such as hurricanes, floods, and fires. It includes a hierarchical list of critical systems and often prioritizes services to restore after an outage. Testing validates the plan. Recovered systems are tested before returning them to operation, and this can include a comparison to baselines. The final phase of disaster recovery includes a review to identify any lessons learned and may include an update of the plan.
Qualitative Risk Analysis | Describes a risk scenario and then figures out what impact the event would have on business operations.
Quantitative Risk Analysis | Attempts to describe risk in financial terms and put a dollar value on all the elements of a risk.
What are the primary components of Risk Management? | Risk Mitigation (reduction), Risk assignment (transference), Risk Acceptance, and Risk Avoidance.
Risk Mitigation | Uses various controls to mitigate or reduce identified risks. These controls might be administrative, technical or physical.
Risk Assignment | Allows the organization to transfer the risk to another entity.
Risk Avoidance | Deciding not to take the risk by discontinuing use because the potential loss to the company exceeds the potential value gained.
What are the controls that monitor activity? | IDS, IPS andFirewalls
IDS | Intrusion detection system. A detective control used to detect attacks after they occur. A signature-based IDS (also called definition-based) uses a database of predefined traffic patterns.
IPS | a device that can take immediate action during an attack to block traffic, blacklist an IP address, or segment an infected host
What are monitoring issues for logging? | Logging produces too much information and takes up disk space.
Penetration Testing | Method of evaluating the security of a computer system or network, by simulating a malicious attack instead of just scanning for vulnerabilities
What is a baseline and how does it pertain to security monitoring? | In order to recognize something as abnormal, you first must know what normal looks like. The baseline is the normal state of the system.
What is a security audit? | A security audit is to make sure your system and security controls work as expected.
Network Infrastructure Defense | Deploys controls to protect your network by creating choke points in the network, Using proxy services and bastion hosts to protect critical services, using content filtering at choke poi to screen traffic, disabling any unnecessary network services and processes that may pose a security vulnerability, maintaining up-to-date IDS signature databases, and applying security patches to network devices to ensure protection against new threats and to reduce vulnerabilities.
Operating System Defense | Serves as an interface between application software and hardware resources. Controls to secure the operating system are important. These include: Deploying change-detection and integrity-checking software and maintaining logs, deploying or enabling change-detection and integrity-checking software on all servers, ensuring that all operating systems are consistent and have been patched with the latest updates from vendors, ensuring that only trusted sources are used when installing and upgrading OS code, and disabling any unnecessary OS services and processes that may pose a security vulnerability.
Application Defenses | Software applications provide end users with access to shared data. Some common controls include the following: Implementing regular antivirus screening on all host systems, ensuring that virus definition files are up to date, requiring scanning of all removable media, installing personal firewall and IDS software on hosts as an additional security layer, deploying change detection software and integrity checking software and maintaining logs, implementing e-mail usage controls and ensuring that e-mail attachments are scanned, establishing a clear policy regarding software installations and upgrades, ensuring that only trusted sources are used when obtaining, installing, and upgrading software through digital signatures and other validations.
What is a backdoor? | Obtaining admin access to a computer system while attempting to remain undetected
What is a worm and how does it propagate? | Self-contained programs designed to propagate from one host machine to another, using the host's own network communication protocols.
What are the four types of attacks? | Unstructured, Structured, Direct and Indirect.
Structured Attacks | Sophisticated hacking techniques to identify, penetrate, probe, and carry out malicious activities.
Unstructured Attacks | Moderately skilled attackers initially attack simply for personal gratification. Can lead to more malicious attacks.
Direct Attacks | Attacks against a specific target, such as a specific organizations through remote log on exploits.
Indirect Attacks | Result of a preprogramed hostile code exploits, such as Internet worms or viruses. The attacks are unleashed indiscriminately.
Name two of the earliest viruses on PCs? | Brain, Lehigh and Jeruselum
Laws of Security Compliance | FISMA, HIPAA, GLBA and SOX
FISMA | Federal Information Security Management Act (FISMA, United States) - Requires U.S. government agencies to protect citizens' private data and have proper security controls in place.
HIPAA | The Health Insurance Portability and Accountability Act, a federal law protecting the privacy of patient-specific health care information and providing the patient with control over how this information is used and distributed.
GLBA | Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions.
SOX | Sarbanes-oxley act of 2002: enacted in response to the financial scandals to protect shareholders and the general public from accounting errors and fraudulent practices.
What is HIPAA and what is the minimum necessary rule? | Health Insurance Portability and Accountability Act - Requires covered entities to protect all EPHI (Electronic Protected Health Information) they create, receive , maintain or transmit.
What are the standards set by PCI DCS and what are the principles on this requirement? | PCI DCS (Payment Card Industry Data Security Standard) -Build and maintain a secure network, protect cardholder data, maintain a vulnerability-management program, implement strong access control measures, regularly monitor and test networks and maintain an information security policy.
What is the difference between a Standard and a Compliance Law? | A law can actually enforce a standard.
Application Layer | The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting, procedural, security, synchronization, and other requirements with the network.
Presentation Layer | The sixth layer of the OSI model. Protocols in the Presentation layer translate between the application and the network. Here, data are formatted in a schema that the network can understand, with the format varying according to the type of network used. The Presentation layer also manages data encryption and decryption, such as the scrambling of system passwords.
Session Layer | The fifth layer in the OSI model. The Session layer establishes and maintains communication between two nodes on the network. It can be considered the "traffic cop" for network communications.
Transport Layer | The fourth layer of the OSI model. In this layer protocols ensure that data are transferred from point A to point B reliably and without errors. this layer services include flow control, acknowledgment, error correction, segmentation, reassembly, and sequencing.
Network Layer | The third layer in the OSI model. Protocols in the Network layer translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver.
Data Link Layer | The second layer in the OSI model. The Data Link layer bridges the networking media with the Network layer. Its primary function is to divide the data it receives from the Network layer into frames that can then be transmitted by the Physical layer.
Physical Layer | The lowest, or first, layer of the OSI model. Protocols in the Physical layer generate and detect signals so as to transmit and receive data over a network medium. These protocols also set the data transmission rate and monitor data error rates, but do not provide error correction.
1.1 User can access systems, applications, and datapending | User domain
1.2 A workstation can be a desktop computer, a laptop computer, aspecial-purpose. Require tight security and access controls | Workstation domain
1.3 A local area network (LAN) is a collection of computers connected to one another or to optic cables, or radio waves. The third the third layers defend required. | LAN Domain
1.4 The interface between the computer an the LAN physical media. | NIC(Network interface card)
1.5 where the IT infrastructure links to a wide area network and the Internet. Connecting to the Internet is like rolling out. Strict security controls given the risks and threats of connecting to the internet. | LAN-to-WAN domain
1.6 As network costs drop, organizations can afford faster Internet. telecommunication service providers sell. In the business of providing. Supplier troubleshooting. | WAN Domain
1.7 Organization's IT infrastructure. Critical for staff member. dangerous yet necessary for mobile worker. | Remote acess domain
1.8 Hold all the mission-critical systems, applications, and data. Authorized user. Data like treasure. Private customer data, intellectual property, or national security. Seek deep within an IT system. | System/application Domain
1.9 ISS | ( Intergrity, Avaibility, Confident)
1.10 Intergrity | ISS, Avaibility, Confident
1.12 Avaibility | ISS, Intergrity, Confident
1.13 Confident | ISS, Intergrity, Avaibility
1.15 Organizations that require customer-service representatives to access. | Blocking out
1.16 The____ is the weakest link in IT infrastructure. | User Domain
2.1 Real-time support | VoIP
2.2 VoIP | Real-Time, voice communication
2.3 convergence is the combination of voice, video, and data communications using TCP/IP. | B.Protocol
2.4 Unified communications solves the_____ Communication challenge. | A.Human Latency
2.5 SIP is more secure than VoIP. | False
2.6 VoIP is more secure than SIP. | True
2.7 SIP is less secure than VoIP. | True
2.8 VoIP is less secure than SIP. | False
3.1 Attack result in downtime or inability of a user | DoS
3.2 A type of DoS attack that also impacts availability. Overloads the computer and prevents legitimate users. | DDoS
3.3 a tool used to scan IP host devices for open port. A port is like a channel slector switch in the IP packet. | Port Scan
3.4 tries to break IT security and gain access to system with no authorization, prove technical prowess. special software tools to explois vulnerbilities. poke holes. | Black-hat
3.5 ethical hacker, is an information systems security professional, has authorization to identify vulnerabilities and perform penetration testing, fixing system | White-hat
3.6 Wannabe, average abilities, one day become a black-hat hacker, could alse opt to become a white-hat | Gray-hat
3.7 The main goal of a cyberattack is to affect one or more IT assets. | True
3.8 Which of the following terms best describes a person with very little skill? | Script kiddie
3.9 Which type of attack result in legitimate user mot having access to a system resource? | DoS
3.10 Which type of document defines | AUP
4.1 BIA | Business Impact Analysis
4.2 BCP | Business continuity Plan
4.3 the first step indeveloping plans to address interruptions is to identify those business functions crucial to your organization. | BIA
4.4 plan for a structured response to any events that result in an interruption to critical business. | BCP
5.1 These control entry into buildings, parking lots, and protected areas. | Physic access control
5.2 Access to a computer system or network. Requires that you enter a unique username and password to log to your company | Logical access controls
5.4 Create a policy to define authorization rules. Process of deciding access to which computer. | Authorization
5.5 group(s) you are in. | group membership policy
5.6 higher degree of authority to access certain resources. | Authority-level policy
5.7 subject requesting access is the same subject who has been granted access | Authentication
5.8 Owner of the resource decides who gets in and changes permissions as needed. The owner can give that job to others | Discretionary access control
5.9 determined by the sensitivity of the resource and the security level of the subject. | Mandatory AC
5.10 closely monitored by the security adminitrator, an not the system administrator. | Non-Discretion AC
5.11 A list of rules, maintained by the data owner. | Rule-based AC
5.13 access control are policies or procedure used to control access to certain items. | True
5.14 which are the best describes the authorization | approvad for
5.15 which are the best describes the identification component of access control? | to an system
5.16 which are the best describes the authentication | hasbeen granted that access
5.17 when you log on to a network, you are presented with | Logical access control
5.18 access control cannot be implemented in various | false
5.19 physic access, security bypass, eavesdropping | Compromised
5.20 when the owner of the resource determines the access and changes permissions as needed | DAC
A method of security testing that isn't based directly on knowledge of a programs architecture is the definition of ... | black-box testing
An auditing bechmark is the standard by which asystem is compared to determine whether it is securely configured | true
AnSOC 1 report is commonly implemented for organizations that must complywith Sarbanes-Oxley (SOX) or the Gramm-Leach-Bliley Act (GLBA). | true
As your organization evolves and as threats mature, it is important to make sure your ... stil meets the risks you face today | controls
What is necessary because of potential liability, negligence, mandatory regulatory complicance? | Audits
If knowing about an audit changes user behavior, an audit will | not be accurate
its essential to match your organizations required ... with its security structure | permission level
The --- framework defines the scope and content of threelevels of audit reports. | Service Organizaiton Control (SOC)
The following are al methods of collecting data: questionnaires, interviews, observation, and checklists. | true
The primary differnece between SOC 2 and SOC 3 reports is thier... | audience
What is security testing that is based on limited knowledge of an application's design? | gray-box testing
a reconnaissance technique that enables an attacker to use port mapping to learn which operating system and version are running on a computer? | operating system fingerprinting
What is the process of using tools to determine the layout and services running on an organization's systems and networks? | network mapping
What is the technique of matching network traffic with rules or signatures based on the apprearance of the traffic and its relationship to other packets? | stateful matching
An intrusion detection system that uses pattern matching and stateful matching to compare current traffic with activity patterns (signatures) of known network intruders. | anomaly-based IDS?
Incorrectly identifying abnormal activity as normal | false negative
The state of a computer or device in which you have turned off or disabled unnecessary services and protected the ones that are still running. | hardend configuration
An intrusion detection system that uses pattern matching and stateful matching to compare current traffic with activity patterns (signatures) of known network intruders. | pattern-based IDS
Security testing that is based on knowledge of the application's design and source code. | white box testing
________ provides information on what is happening as it happens. | Real-time monitoring
A company can discontinue or decide not to enter a line of business if the risk level is too high. This is categorized as ________. | risk avoidance
A control involved in the process of developing and ensuring compliance with policy and procedures is the definition of ________. | administrative control
A control that is carried out or managed by a computer system is the definition of ________. | technical control
A countermeasure, without a corresponding __________, is a solution seeking a problem; you can never justify the cost. | risk
A measure installed to counter or address a specific threat is the definition of ________. | countermeasure
A threate source can be a situation or a method that might accidentally trigger a | vulnerability
A --- is an intent and method to exploit a vulnerability | threat source
Among common recovery location options, this is one that can take over operations quickly. It has all the equipment and data already staged at the location, though you may need to refresh or update the data. | hot site
An organization seeks a balance between an acceptable level of a risk and the cost of reducing it. | true
Anorganization knows that arisk exists and has decided that the cost of reducing it is higher than the loss would be. This can include self-insuring or using a deductible. This is categorized as ________. | risk acceptance
Forensics and incident response are examples of ___________ controls. | corrective
How your organization responds to risk reflects the value it puts on its ___________. | assests
It is necessary to create and/or maintain a plan that makes sure your company continues to operate in the face of disaster. This is known as a ________. | buisness continuity plan
Residual risk is the risk that remains after you have installed countermeasures and controls. | true
The goal of risk amangement is to eliminate risk. | false
The term detective control refers to a control that determines that a threat has landed in your system. | true
________ allows anorganization to transfer risk to another entity. Insurance is a common way to reduce risk. | risk assignment
________ is arisk management phase that includes assessment of various types of controls to mitigate the identified risks, selection of a control strategy, and justification of choice of controls. | risk assessment
________ uses various controls to reduce identified risks. These controls might be administrative, technical, or physical. | risk mitigation
___________ is the likelihood that a particular threat exposes a vulnerability that could damage your organization. | risk
A ________ is oneof the simplest substitution ciphers. It shifts each letter in the English alphabet a fixed number of positions, with Z wrapping back to A. | Vigenere cipher
A process that creates the first secure communications session between a client and a server is the definition of ________. | SSL handshake
Certain security objectives add value to information systems. _________ provides an exact time when a producer creates or sends information. | Timestamping
In a ________, the cryptanalyst can encrypt any information and observe the output. This is best for the cryptanalyst. | Chosen-plaintext attack
In a --- , the cryptanalyst possesses certain pieces of information before and after encryption | Known plaintext attack
In an asymmetric key system, where everyone shares the same secret, compromising one copy of the key compromises all copies. | false
Symmetric key cryptography is a type of cryptography that cannot secure correspondence until after the two parties exchange keys. | true
The number of possible keys to a cipher is a | keyspace
The term certificate authority refers to a trusted repository of all public keys. | false
The output of a one-way algorithm; a mathematically derived numerical representation of some input. | check-sum
The process of issuing keys to valid users of a cryptosystem so they can communicate. | key distribution
What name is given to an encryption cipher that is a product cipher with a 56-bit key consisting of 16 iterations of substitution and transformation? | Data encryption standard
What name is given to an encryption cipher that rearranges characters or bits of data? | transposition cipher
What name is given to an encryption cipher that uniquely maps any letter to any other letter? | simple substitution cipher
What name is given to an object that uses asymmetric encryption to bind a message or data to a specific entity | digital signature
What name is given to random characters that you can combine with an actual input key to create the encryption key? | salt key
Which of the following is the definition of Vigenerecipher? | An encryption cipher that uses multiple encrytpion cschemes in succession.
Without any knowledge of the key, an attacker with access to an encrypted message and the decryption cipher could try every possible key to decode the message. This is referred to as ________. | brute-force attack
_______________ enables you to prevent a party from denying a previous statement or action. | non-repudiation
_______________ is another symmetric algorithm that organizations currently use. It is a 64-bit block cipher that has a variable key length from 32 to 448 bits. It is much faster than DES or IDEA and is a strong algorithm that has been included in more than 150 products, as well as v2.5.47 of the Linux kernel. Its author, Bruce Schneier, placed it in the public domain. | blowfish
A _____________ contains rules that define the types of traffic that can come and go through a network. | firewall
A method to restrict access to a network based on identity or other rules is the definition of ________. | network access control
A stateful inspection firewall compares received traffic with a set of rules that define which traffic it will permit to pass through the firewall. | flase
Border firewalls simply seperate the protected network from the internet | true
internet control message protocol is a method of IP address assignment that uses an alternate, public IP address to hide a systems real IP address | fasle
One of the OSI Reference Model layers, the Network Layer, is responsible for the logical implementation of the network. | true
One of the OSI Reference Model layers,the Transport Layer, is responsible for maintaining communication sessions between computers. | false
Telephony denial of service (TDoS) is a variation of a denial of service (DoS) attack, but is launched against traditional and packet-based telephone systems. A TDoS attack disrupts an organization's use of its telephone system through a variety of methods. | true
The traceroute command displays the path that a particular packet follows so you can identify the source of potential network problems. | true
What name is given to a protocol to implement a VPN connection between two computers? | Point to Point tunneling protocol
What term is used to describe the current encryption standard for wireless networks? | Wi- Fi protected access
Which OSI Reference Model layer creates, maintains, and disconnects communications that take place between processes over the network? | Session Layer
Which OSI Reference Model layer includes all programs on a computer that interact with the network? | Application Layer
Which OSI Reference Model layer is responsible for the coding of data? | Presentation layer
Which OSI Reference Model layer must translate the binary ones and zeros of computer language into the language of the transport medium? | Physical Layer
Which OSI Reference Model layer uses Media Access Control (MAC) addresses?Device manufacturers assign each hardware device a unique MAC address. | DataLink Layer
Which of the following is the definition of network address translation ? | A method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address.
A firewall that examines each packet it receives and compares the packet to a list of rules configured by the network administrator. | packet-filtering firewall
________ allows the computer to get its configuration information from the network instead of the network administrator providing the configuration information to the computer. It provides a computer with an IP address, subnet mask, and other essential communication information, simplifying the network administrator's job. | DHCP
________ is asuite of protocols designed to connect sites securely using IP networks. | Internet Protocol Security (IPSec)
A ________ enables the virus to take control and execute before the computer can load most protective measures. | System infector
A ________ is a virus that attacks and modifies executable programs (like COM, EXE, SYS, and DLL files). | file infector
A ____________ tricks users into providing logon information on what appears to be a legitimate Web site but is in fact a Web site set up by an attacker to obtain this information. | phishing attack
Anomaly detection involves developing a network baseline profile of normal or acceptable activity, such as services or traffic patterns, and then measuring actual network traffic againstthis baseline. | true
Defense in depth combines the capabilities of people, operations, and security technologies to establish multiple layers of protection, eliminating single lines of defense and effectively raising the cost of an attack. | true
In a __________, the attacker uses IP spoofing to send a large number of packets requesting connections to the victim computer. These appear to be legitimate but in fact reference a client system that is unable to respond. | SYN Flood attack
Malicious code attacks all three information security properties. Malware can erase or overwrite files or inflict considerable damage to storage media. This property is ________. | availability
Malicious code attacks all three information security properties.Malware can modify database records either immediately or over a period of time. This property is ________. | integrety
The primary characteristic of a virus is that it replicates and generally involves user action of some type | true
Unexplained increases in bandwidth consumption, high volumes of inbound and outbound e-mail during normal activity periods, a sudden increase in e-mail server storage utilization (this may trigger alarmthresholds set to monitor and manage disk/user partition space), and an unexplained decrease in available disk space are all telltale symptoms of a ________. | worm
Unlike viruses, worms do not require a host program in order to survive and replicate. | true
Unrecognized new processes running, startup messages indicating that new software has been (or is being) installed (registry updating), unresponsiveness of applications to normal commands, and unusual redirection of normal Web requests to unknown sites are all telltale symptoms of a ________. | trojan
A type of virus that infects other files and spreads in multiple ways. | What is meant by multiparite virus
What name is given to a type of virus that uses a number of techniques to conceal itself from the user or detection software? | stealth virus
What term is used to describe a type of virus that includes a separate encryption engine that stores the virus body in encrypted format while duplicating the main body of the virus? | polymorphic virus
Whether software or hardwarebased, a ____________ captures keystrokes, or user entries, and then forwards that information to the attacker. | keystroke logger
A botnet consists of a network of compromised computers that attackers use to launch attacks and spread malware. | a botnet
A program that executes a malicious function of some kind when it detects certain conditions. | logic bomb
________ attack countermeasures such as antivirus signature files or integrity databases. | retro virus
_____________ are the main source of distributed denial of service (DDoS) attacks and spam. | botnets
ISO 17799 is an international security standard. | true
Ininformation technology, perhaps the best-known ISO standard is the Open Systems Interconnection (OSI) Reference Model. This internationally accepted framework of standards governs how separate computer systems communicate using networks. | true
The ANSI produces standards that affect nearly all aspects of IT. | true
The National Institute of Standards and Technology (NIST) is the main United Nations agency responsible for managing and promoting information and technology issues. | false
The Payment Card Industry Data Security Standard (PCI DSS) is an international standard for handling transactions involving payment cards. | true
The ________ is aU.S. standards organization whose goal is to empower its members and constituents to strengthen the U.S. marketplace position in the global economy, while helping to ensure the safety and health of consumers and the protection of the environment. | American National Standards Institute
The ________ is an organization formed in 1994 to develop and publish standards for the World Wide Web. | W3C
The ________ is the main United Nations agency responsible for managing and promoting information and technology issues. | Internation Telecommunication Union
The _____________ is the preeminent organization for developing and publishing international standards for technologies related to electrical and electronic devices and processes. | International Electrotechnical Commission
The best-known standard that relates to information security is the IEEE 802 LAN/MAN standard family. | true
Unlike other organizations that specifically focus on engineering or technical aspects of computing and communication, the __________ primarily addresses standards that support software development and computer system operation. | ISO
What do the letters of the C - I - A triad stand for? | confidential , integrety, availabilty
A federal agency within the U.S. Department of Commerce whose mission is to "promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life." | NIST
A U.S. standards organization whose goal is to empower its members and constituents to strengthen the U.S. marketplace position in the global economy, while helping to ensure the safety and health of consumers and the protection of the environment. | ANSI
A standards organization that develops and promotes Internet standards. | Internet Engineering Task Force
________ is a document produced by the IETF thatcontains standards as well as other specifications or descriptive contents. | A request for comments (RFC)
The Internet Architecture Board (IAB) is a subcommittee of the IETF composed of independent researchers and professionals who have a technical interest the overall well-being of the Internet. | true
A certificate of completion is a document that is given to a student upon completion of the program and is signed by the instructor. | true
A professional certification states that you have taken the course and completed the tasks and assignments. | false
An educational program that is generally associated with a college or university that provides formal courses that do not lead to degrees is the definition of ________. | continuing education
Certifications that require additional education generally specity the number of credits each certificate requires | true
In general, security training programs are identical to security education programs with respect to their focus on skills and in their duration. | false
Most certifications require certification holders to pursue additional education each year to keep their certifications current. | True
Most educational institutions offer accelerated programs to complete PhD degree requirements in less than one year. | False
Obtaining the coveted CAE/IAE or CAE/R designation means the curriculum and research institutions meet or exceed the standards defined by the _______. | NSA
The Office of Personnel Management (OPM) requires that federal agencies provide the training suggested by the NIST guidelines. | true
The current term for online study is distance learning | true
The four main areas in NIST SP 800-50 are awareness, training, education, and __________________. | profesisonal development
The main purpose of security training courses is to rapidly train students in one or more skills, or to cover essential knowledge in one or more specific areas. | true
The most difficult and slowest option for IT security training is studying materials yourself. | false
The purpose of ________ is to provide formal training courses that lead to a certificate or professional certification and not a degree. | continueing education
The standard bachelor's designation is a four-year diploma program. | false
What name is given to a document that verifies that a student has completed courses and earned a sufficient score on an assessment? | Certificate of completion
What name is given to educational institueitons that meet specifif federal information assurance educational guidelines | continuing education centers
Whereas MS programs prepare students to perform information security work, MBA programs prepare students to manage and maintain the people and environment of information security. | true
Which of the following is the definition of continuing professional education (CPE)? | A standard unit of credit that equals 50 minutes of instruction.
________refers to an educational institution that has successfully undergone evaluation by an external body to determine whether the institution meets applicable standards. | accredited
An information security safeguard is also called in informaiton security control | true
GLBA distinguishes between customers and consumers for its notice requirements. A customer is any person who gets a consumer financial product or service from a financial institution. | false
Generically, this is data that can be used to individually identify a person, including Social Security number, driver's license number, financial account data, and health data. | Personally identifiable information
Information regulated under the GRamm Leach Bliey Act is | consumer financial information
Information regulated under the sarbanes oxley act is | corporate financial information
Information systems security is about ensuring the confidentiality, integrity, and availability of IT infrastructures and the systems they comprise. | true
One of the most important parts of a FISMA information security program is that agencies test and evaluate it. | true
SOX doesn't apply to publicly traded companies | false
Social Security numbers, financial account numbers, credit card numbers, and date of birthare examples of __________ as stipulated under GLBA. | NPI
Students who have had their FERPA rights violated are allowed to sue a school for that violation. | False
The FTC Safeguards Rule requires a financial institution to create a written information security program that must state how the institution collects and uses customer data. It also must describe the controls used to protect that data. | true
The Family Educational Rights and Privacy Act (FERPA) is the main federal law protecting the privacy of student information. | true
The ________ is aregulation that covered entities may disclose only the amount of protected health information absolutely necessary to carry out a particular function. | minimum necessary rule
The regulating agency for the Family Educational Rights and Privacy Act is the ________. | U.S. department of eduacation
The regulating agency for the Gramm Leach Bliley act is the | FTC
The regulating agency for the Sarbanes-Oxley Act is the ________. | Securities and Exchange Commission
Under CIPA, a technology protection measure is any technology that can block or filter the objectionable content. | true
What name is given to patient health information that is computerbased? | electronic protected health information
Which regulating agency has oversight for the Children's Internet Protection ACt? | FCC
____________ is a person's right to control the use and disclosure of his or her own personal information. | privacy
the likelyhood that something bad happens to an asset is | Risk
This defines how a business gets back on its feet after a major disaster like a hurricane | Disaster Recovery Pla (DRP)
Gives priorities to the functions an organization needs to keep going | Businees Continuity Plan
Connecting your computers or devices to the ---- immediately exposes them to attack | internet
Software vendors must protect themselves from liabilities of their own vulnerabilities with a | End-User License Agreement (
This represents the fourth layer of defense for a typical IT infrastructure | LAN - to - WAN Domain
The goal and objective of a --- is to provide a consistent definition for how an organization should handle and secure different types of data | data classification standard
The requirement to keep information private or secret is the definition of | ...
The tunnel can be created between a remote workstation using the public internet and VPN router and a --- web site | (SSL - VPN)
A --- is a weakness that allows a threat to be realized | vulnerability
The weakest link in the security of an IT infrastructure is the user | True
This appliance examines IP data streams for common attack and malicious intent patterns | (IDS)
What name is given to a U.S. federal law that requires U.S. government agencies to protect citizens private data and have proper security controls in place? | Federal Information Security Management Act
What name is given to an exterior network that acts as a buffer zone between the public internet and the organizations IT? | demilitarized zone
What term is used to describe guarding information from everyone except those who have rights to it? | confidentiality
Which of the following describes the Family Educational Rights and Private ACT? | a law that protects the private data of students
____________ is the amount of time it takes to recover and make a system, application, and data available for use after an outage. | Recover time objective
A --- is any action that could damage an asset that can be natural and or human iduced | threat
_______ means only authorized users can change information and deals with the validity and accuracy of data. | integrety
A common DSL service is ________,where the bandwidth is different for downstream and upstream traffic. | asymmetric digital subscriber line (ADSL)
An encrypted channel used for remote access to a server or system, commonly used in Linux and UNIX servers and applications, is the definition of __________. | secure shell (SSH)
E-commerce changed how businesses sell, and the --- change how they market | ...
If VoIP traffic needs to traverse through a WAN with congestion, you need | quality of service (QOS)
Medical practices and hospitals realized early on that ________ provide(s) the ability toprovide access to the necessary information without having to invest in many computersand network infrastructure | mobile devices
Network devices can implement ___________ to better support VoIP and SIP IP packets and reduce dropped calls and delays. | traffic prioritization
Security controls do not need to be implemented to secure VoIP and SIP on LANs andWANs. | false
The term Bring Your Own Device (BYOD) refers to an organizational policy of allowing or even encouraging employees, contractors, and others to connect their own personal equipment to the corporate network; this offers cost savings and other benefits but also presents security risks. | true
The total number of errors divided by the total number of bits transmitted is the definition of | bit error rate
Voice an unified communications are --- applications that use 64 byte IP packets | Session Initiation Protocol (SIP)
What is ment by application convergence? | The integration of applications to enhance productivity
The software in a phone system that performs the call switching from an inboundtrunk to a phone extension | call control
What name is given to a high-speed broadband networking technology that uses a 53-byte cell to support real-time voice, video , or data communications? | asynchronous transfer mode (ATM)
What name is given to a software-based application like WebEx that supports audio conferencing and sharing of documents (text, spreadsheets, presentations, etc.) for real-time discussions with team members or colleagues? | collaboration
What name is given to an attack that uses ping or ICMP echo-request, echo-reply messages to bring down the availability of a server or system? | denial of service
What term is used to describe a packet- based WAN service capable of supporting one-to-many and many-to-many WAN connections? | frame relay
What term is used to describe a strategy that uses a device to provide electrical power for IP phones from the RJ-45 8-pin jacks directly to the workstation outlet? | power over Ethernet (Poe)
What term is used to describe communication that doesn't happen in real time but rather consists of messages that are stored on a server and downloaded to endpoint devices? | store-and-forward communications
What term is used to describe streamlining processes with automation or simplified steps? | business process engineering
--- is the basis for unified communication and is the protocol used by real-time applications such as IM chat, conferencing and collaboration | Session Initiation Protocol (SIP)
A DoS attack is a coordinated attempt to deny service by causing a computer to perform an unproductive task. | true
A _________ has a hostile intent, possesses sophisticated skills, and may be interested in financial gain. They represent the greatest threat to networks and information resources. | cracker
A __________ tries to break IT security and gain access to systems with no authorization, in order to prove technical prowess. | black- hat -hacker
A ___________ is a software program that performs one of two functions: brute-force password attack to gain unauthorized access to a system,or recovery of passwords stored in a computer system. | password cracker
A --- is a tool used to scan IP host devices for open ports that have been enabled | port scanner
A protocol analyzer or --- is a software program that enables a computer to monitor and capture network traffic | packet sniffer
In a ________, the attacker sends a large number of packets requesting connections to the victim computer | SYN flood
Malicious software can be hidden in a | ...
spoofing means a type of attack in which one person, program, or computer disguises itself as another person, program, or computer to gain access to some resource. | true
A program or dedicated hardware device that inspects network traffic passing though it | firewall
An attack that seeks to obtain personal or private financial information through domain spoofing | pharming
The mode in which sniffers operate; it is nonintrusive and does not generate network traffic. This means that every data packet is captured and can be seen by the sniffer. | promiscuous mode
A type of malware that modifies or replaces one or more existing programs to hide the fact that a computer has been compormised | rootkit
What term is used to describe an attack in which the attacker gets between two parties and intercepts messages before transferring them on to their intended destination? | man-in-the-middle attack
When an attacker discovers a __________, he or she can use it to bypass existing security controls such as passwords, encryption, and so on. | backdoor
A network utility program that reads from and writes to network connections. | netcat
Wiretapping is an application incorporating known software vulnerabilities, data, and scripted commands to exploit a weakness in a computer system or IP host device. | false
______ is a method that black-hat hackers use to attempt to compromise logon and password access controls, usually following a specific attack plan, including the use of social engineering to obtain user information. | Brute-force password atack
____ is type of attack in which the attacker takes control of a session between two machines and masquerades as one of them. | Hijacking
A ___________ is a formal analysis of an organization's functions and activities that classifies them as critical or noncritical. | business impact analysis (BIA)
A___________ primarily addresses the processes, resources, equipment,and devices needed to continue conducting critical business activities when an interruption occurs that affects the business's viability. | ...
Annual loss expectancy (ALE) means the process of identifying, assessing, prioritizing, and addressing risks. | false
Risks apply to specific assets. If you multiply the risk __________ by the cost of the asset, the result is the exposure to a specific risk. | probability
Singe loss expectancy(SLE) means the expected loss for a single threat occurrence. The formula to calculate SLE is SLE = Resource Value x EF | true
The first step in risk analysis is to determine what and where the organizations --- are located | assets
The formal process of monitoring and controlling risk focuses on --- new risks. | analyzing
The goal of --- is to quantify possible outcomes of risks, determine probabilities of outcomes, identify high impact risks and develop plans based on risks | quantitative risk analysis
The recover point objective (RPO) identifies the amount of ---- that is acceptable | data loss
The term risk management describes the process of identifying, assessing, prioritizing and addressing risks | true
What is meant by annual rate of occurrence (ARO)? | The annual probability that a stated threat will be realized.
What is meant by risk register? | A list of identified risks that results from the risk-identification process
What is the project Management Body of Knowledge ? | A collection of the knowledge and best practices of the project management profession
What is the difference between a BCP and a DRP? | A BCP does not specify how to recover from disasters, just interruptions
What name is given to any risk that exists but has a defined response? | residual risk
When you accept a --- you take no further steps to resolve | negative risk
A risk-analysis method that uses relative ranking to provide further definition of the identified risks in order to determine responses to them. | ...
________ is the difference between the security controls you have in place and the controls you'd to have in place in order to address all vulnerabilities. | security gap
--- is rapidly becoming an increasingly important aspect of enterprisecomputing | disaster recovery
A communication protocol that is connectionless and is popular for exchanging small amounts of data or messages is called --- | User Datagram Protocol (UDP)
A method of restricting resource access to specific periods of time is called --- | temporal isolation
An organization's facilities manager is often responsible for --- | Physical Access Control
Biometrics is another --- method for identifying subjects | access control
A system that puts access control into the hands of people such as department managers who are closest to system users; there is no one centralized entity to process access requests in this system. | decentralized access control
Mandatory access control (MAC) isa means of restricting access to an object based on the object's classification and the user's security clearance. | true
The Bell-La Padula access control model focuses primarily on --- | confidentiality of data and control of access to classified information
The --- is the central part of a computing environment's hardware, software, and firmware that enforces access control for computer systems | security kernel
What is ment by constrained user interface? | Software that allows users to enter only specific information.
What name is given to an access control method that bases access control approvals on the jobs the user is assigned? | role-based access control
What term is used to describe a device used as a log on authenticator for remote users of a network? | synchronous token
An authentication token used to process challenge-response authentication with a server. It takes the server's challenge value and calculates a response. The user enters the response to authenticate a connection. | asynchronous token?
Which of the following is an accurate description of cloud computing? | The practice of using computing services that are delivered over a network.
Which of the following is not a type of authentication? | ...
The process of protecting a resource so that it is used only by those allowed to use it; a particular method used to restrict or allow access to resources. | Which of the following is the definition of access control?
a ---- is an authentication credential that is generally longer and more complex than a password | passphrase
---- is an authorization method in which access to resources is decided by the user's formal status. | Authority - level policy
---- is the process of dividing up tasks into a series of unique activities | Separation of duties
A compliance liaison works with each department to ensure that it understands, implements, and monitors compliance in accordance with the organization's policies. | True
A security awareness program includes | All of the above
A way to protect your organization from personnel - related security violations is to use job rotation. | true
An organization must comply with rules on two levels. regulatory compliance and organizational compliance. | true
Because personnel are so important to solid security, one of the best security controls you can develop is a strong security --- and awareness program | training
Enacting changes in response to reported problems is called | reactive change managment
For all the technical solutions you can devise to secure your systems, the --- remains your greatest challenge. | human element
Initiating changes to avoid expected problems is the definition of proactive change managment | true
one of the most popular types of attacks on computer systems involves--- . These attack deceive or use people to get around security controls. | Social engineering
The--- team's responsibilities include handling events that affect your computers and networks and ultimately can respond rapidly and effectively to any event. | security administration
The name given to a group that is responsible for protecting sensitive data in the event of a natural disaster or equipment failure, among other potential emergencies, is ... | emergency operations group
The term remediation refers to fixing something before it is broken, defective, of vulnerable. | true
The technical evaluation of a system to provide assurance that you have implemented the system correctly | certification
A mandated requirement for a hardware or software solution that is used to deal with a security risk throughout the organization | standard
What name is given to a method of developing software that is based on small project iteration, or sprints, instead of long project schedules? | agile development
What term is used to describe a benchmark used to make sure that a system provides a minimum level of security across multiple applications and across different products? | baseline
Which of the following is the definition of botnet | A botnet consists of a network of compromised computers that attackers use to launch attacks and spread malware
What term is used to describe a set of step-by-step actions to be performed to accomplish a security requirement, process, or objective? | procedure
When an information security breach occurs in your organization, a --- helps determine what happened to the system and when. | Security event log
Which of the following is the definition of guideline? | A recommendation to purchase or how to used a product or system
Which of the following is the definition of system owner? | The person responsible for the daily operation of a system and for ensuring that the system continues to operate in compliance with the conditions set out by the AO.
Information security is specific to securing information, whereas information systems security is focused on the security of the systems that house the information. True or False? | True
Software manufacturers limit their liability when selling software using which of the following? | End-User License Agreement (EULA)
The ___ tenet of information systems security is concerned with the recovery time objective. | Availability
Encrypting data on storage devices or hard drives is a main strategy to ensure data integrity. True or False? | False
Organizations that require customer-service representatives to access private customer data can best protect customer privacy and make it easy to access other customer data by using which of the following security controls? | Blocking out customer private data details and allowing access only to the last four digits of Social Security numbers or account numbers.
The ___ is the weakest link in an IT infrastructure. | User Domain
Which of the following security controls can help mitigate malicious e-mail attachments? | All of the above
You can help ensure confidentiality by implementing ___. | A virtual private network for remote access
Encrypting e-mail communication is needed if you are sending confidential information within an e-mail message through the public internet. True or False? | True
Using security policies, standards, procedures, and guidelines helps organizations decrease risks and threats. True or False? | True
A data classification standard is usually part of which policy definition? | Asset protection policy
The SSCP profession certification is geared toward which of the following information systems security positions? | A) IT security practitioner
Maximizing availability primarily involves minimizing ___. | E) All of the above
Which of the following is not a U.S. compliance law or act? | D) PCI DSS
Internet IP packets are to cleartext what ecnrypted IP packets are to___. | Ciphertext
Wireless access point (WAP) | With wireless LANs (WLANs), radio transceivers are used to transmit IP packets from a WLAN NIC to a _____________.
Local area network (LAN) | A ________ is a collection of computers connected to one another or to a common connection medium.
Disaster recovery plan (DRP) | A ___________ defines how a business gets back on its feet after a major disaster like a fire or hurricane.
Business continuity plan (BCP) | A ___________ gives priorities to the functions an organization needs to keep going.
Internet | Connecting your computers or devices to the ________ immediately exposes them to attack.
Workstation Domain | The director of IT security is generally in charge of ensuring that the ____________ conforms to policy.
Data classification standard | The goal and objective of a __________ is to provide a consistent definition for how an organization should handle and secure different types of data.
Confidentiality | The requirement to keep information private or secret is the definition of __________.
security | The world needs people who understand computer-systems ________ and who can protect computers and networks from criminals and terrorists.
LAN-to-WAN Domain | The ________ is where the fourth layer of defense is required.
LAN-to-WAN Domain | The ____________ represents the fourth layer of defense for a typical IT infrastructure.
intrusion detection system (IDS) | This security appliance examines IP data streams for common attack and malicious intent patterns.
Federal Information Security Management Act (FISMA) | What name is given to a U.S. federal law that requires U.S. government agencies to protect citizens' private data and have proper security controls in place?
secure shell (SSH) | An encrypted channel used for remote access to a server or system, commonly used in Linux and UNIX servers and applications, is the definition of __________.
VoIP | Audio conferencing is a software-based, real-time audio conference solution for ________ callers.
Internet | E-commerce changed how businesses sell, and the ________ changed how they market.
mobile devices | Medical practices and hospitals realized early on that ________ provide(s) the ability to provide access to the necessary information without having to invest in many computers and network infrastructure.
Bit error rate | The ________ in analog communications is one error for every 1,000 bits sent; in digital communications, the __________ is one error for every 1,000,000 bits sent.
Dense wavelength division multiplexing (DWDM) | What name is given to a high-speed broadband networking technology that uses a 53-byte cell to support real-time voice, video, or data communications?
frame relay | What term is used to describe a packet-based WAN service capable of supporting one-to-many and many-to-many WAN connections?
Dense wavelength division multiplexing (DWDM) | ________ is a technique where multiple light streams can transmit data through a single strand of fiber.
adware | A software program that collects information about Internet usage and uses it to present targeted advertisements to users is the definition of ________.
cracker | A _________ has a hostile intent, possesses sophisticated skills, and may be interested in financial gain. They represent the greatest threat to networks and information resources.
black-hat hacker | A __________ tries to break IT security and gain access to systems with no authorization, in order to prove technical prowess.
password cracker | A ___________ is a software program that performs one of two functions: brute-force password attack to gain unauthorized access to a system, or recovery of passwords stored in a computer system.
port scanner | A ___________ is a tool used to scan IP host devices for open ports that have been enabled.
operating system (OS) | A ___________ fingerprint scanner is a software program that allows an attacker to send log-on packets to an IP host device.
attack | An attempt to exploit a vulnerability of a computer or network component is the definition of ________.
vulnerabilities | Black-hat hackers generally poke holes in systems, but do not attempt to disclose __________ they find to the administrators of those systems.
SYNflood | In a ________, the attacker sends a large number of packets requesting connections to the victim computer.
business impact analysis (BIA) | A ___________ is a formal analysis of an organization's functions and activities that classifies them as critical or noncritical.
risk management | Any organization that is serious about security will view ___________ as an ongoing process.
business continuity plan (BCP) | A___________ primarily addresses the processes, resources, equipment, and devices needed to continue conducting critical business activities when an interruption occurs that affects the business's viability.
compliance | Information security activities directly support several common business drivers, including ________ and efforts to protect intellectual property.
probability | Risks apply to specific assets. If you multiply the risk __________ by the cost of the asset, the result is the exposure to a specific risk.
assets | The first step in risk analysis is to determine what and where the organizations _________ are located.
data loss | The recovery point objective (RPO) identifies the amount of _________ that is acceptable.
A list of identified risks that results from the risk-identification process. | What is meant by risk register?
qualitative risk analysis | What name is given to a risk-analysis method that uses relative ranking to provide further definition of the identified risks in order to determine responses to them?
negative risk | When you accept a __________, you take no further steps to resolve.
logical access control | A mechanism that limits access to computer systems and network resources is ________,
A system that puts access control into the hands of people such as department managers who are closest to system users; there is no one centralized entity to process access requests in this system. | How is decentralized access control defined?
USBtoken | This device uses public key infrastructure (PKI) technology�for example, a certificate signed by a trusted certification authority�and doesn't provide one-time passwords.
authentication | Two-factor __________ should be the minimum requirement for valuable resources as it provides a higher level of security than using only one.
role-based access control (RBAC) | What name is given to an access control method that bases access control approvals on the jobs the user is assigned?
threshold | When you apply an account-lockout policy, set the __________ to a high enough number that authorized users aren't locked out due to mis-typed passwords.
Need-to-know | ________ is used to describe a property that indicates that a specific subject needs access to a specific object. This is necessary to access the object in addition to possessing the proper clearance for the object's classification.
True | A physically constrained user interface is a user interface that does not provide a physical means of entering unauthorized information.
are the benchmarks that help make sure a minimum level of security exists across multiple applications of systems and across different products | Baselines
False | Access control is the process of proving you are the person or entity you claim to be.
Ping | sends a ping (ICMP Echo Request) to the target machine.
port scan | will help identify which ports are open thereby giving an indication of which services may be running on the targeted machine.
3. Critical infrastructure | are those whose loss would have severe repercussions to our nation i.e. Transportation Sector, Power Grid, Financial Infrastructure, Water Filtration Plants, Telecom Infrastructure, National Monuments, Chemical Facilities etc.
5. Access Control | is the ability of mechanisms or methods used to determine which permissions a user has for any network resource
6. An Algorithm | is a mathematical formula, usually for encryption, which gives a step by step or instructions on how to solve a problem.
4. Hackers are individuals | who deliberately access computer systems and networks without authorization.
7. Assets | are resources and information an organization need to conducts its business. Data is unquestionably a company's most important asset.
Asymmetric Encryption | Asymmetric meaning different, uses both a public and private key. Public key encrypts and Private Key decrypts.
9. Symmetric Encryption | Symmetric meaning the same, uses only 1 key, a public key that is available to everyone
anomaly | is something that does not fit into an expected pattern.
11. Confidentiality | is the principle that states information should not be disclosed to unauthorized individuals
13. Availability | means that the software, hardware and data should be available to the user when he or she wants to access it.
14. Authentication | , perhaps the most important thing we do, is where we verify a user's identity.
Backups | refer to copying and storing data in a secondary location to preserve the data in case it's destroyed or corrupted
12. Integrity | requires that the information is not changed or modified except by individuals authorized to do so.
16. Incremental backups | have a smaller backup window where files that have modified or changed are backed up. When the incremental backup is complete all archive bits are unchecked back to 0. The advantage is the backups are faster and the disadvantage is the restore process is longer and backups have to be restored in order. It is cumulative in nature.
17. Differential backups | have a larger backup window where the files that have changed or modified are backed up. After the incremental backup has occurred it does not uncheck the archive bit back to 0 as does the incremental backup, in other words with a differential backup the archive bit always reads 1. The disadvantage is the backup takes longer but the restore process is shorter as all that is needed is the last differential backup and the last full backup to restore
baseline | is a foundation for comparison or measurement. It is a comparison for what is and what it will be. For example of your boss tells you that he wants' to increase the amount of users on the network by 200 and your existing network is 500 you divide 200 by 500 and the result is a 40% increase in your baseline.
19. Switches | separate collision domains yet extend broadcast domains.
20. Biometrics | is where a individual uses finger prints, retinal scans, hand and facial geometry or voice analysis for authentication.
21. Block cipher | is where entire blocks of data are encrypted at one time and inserted back into the text randomly. The randomness contributes to unpredictability which makes for stronger encryption. It is usually used by AES where its block size is 128 bit.
22. Stream Ciphers | were at one time used by AES, and it is done one character at a time but has since been replaced by block cipher.
Control | is something you use to detect, prevent or mitigate the risk associated with a threat. Encryption is a good example of a control.
24. Mitigate | action taken to reduce the likelihood of a threat occurring.
25. AUP | is a policy that communicates to users what the who, what, why, where, when and how network resources are to be used.
26. AAR or After Action Review | is a document that lists the who, what, why, where, when and how of an incident or disaster response.
Disaster Recovery Plan or DRP | is a written plan developed to address how an organization will react to a natural or man made disaster in order to assure organizations business continuity. Remember also that some incidents can become disasters.
28. Radius Servers | use UDP port 1812 for authentication and port 1813 for accounting.
29. AES or Advanced Encryption Standard | is the defacto method of encryption used today. Its block size is 128 bit and It can use key lengths of 128, 160, 192 & 256 bit.
30. Computer Forensics | involves the preservation, identification, documentation and interpretation of computer data used in legal proceedings.
Intrusion Detection System is a (Passive Visibility Tool) | in all that it does is catch an intrusion and record it into the logs where an administrator can take whatever action is needed. It can be host or network based but generally is deployed on a network basis.
Intrusion Prevention System is a (Active Control Tool) | ) in that when it sees a problem it goes out and corrects it by either eliminating a protocol or shutting down ports for example. It can also be network based or host based but is generally deployed on a network basis.
33. Layered Security | refers to the arrangement of multiple layers of defense, a form of defense in depth and is considered by most Cyber Security Professionals to one of the only ways to truly protect a network.
34. Implicit Deny | is a philosophy where all user actions are prohibited unless specifically permitted.
35. Single Sign On | is an authentication process by which the user can enter a single user ID and password and then move from resource to resource or application to application.
36. Mutual Authentication | describes a process in which each side of an electronic communication verifies the authenticity where you would use a token and a password to authenticate. It can however be a combination of two or more types of authentication.
37. Stateful firewalls | firewalls have the capability to examine the data stream from end to end.
38. Stateless firewalls | are only capable of examining individual packets. They obviously much quicker but not as sophisticated.
Star Topology | the most often used topology today is one whose components are connected to a central connection point.
40. Fault Tolerance | is the capability of a network, system or component to continue functioning despite damage or malfunction.
41. Redundancy | is the use of one or more identical devices, connections or components for storing, processing, or transporting data. Redundancy is the most common method of achieving fault tolerance.
DMZ | acts as a buffer zone between the web where no controls exist and the LAN which has security policies and controls in place.
43. TCP | is a core protocol of the TCP/IP suite. It resides at the transport layer, it's a connection oriented protocol and it provides for reliable delivery.
44. UDP | is a connectionless protocol which also resides at the transport layer of the TCP/IP suite. It however does not provide for reliable delivery but it is more efficient and is best suited for such things as video over the web.
Proxy Server | is a software application on a network host that screens all incoming and outgoing traffic. It's sometimes called the application gateway or simply the proxy.
46. NIST Password Standard 800-118 | for Enterprise Password Management currently requires 8 characters with 1 uppercase and 1 special character.
47. Entropy | is a measure of unpredictability of information content.
48. Private Key Encryption | is data that is encrypted using a single key that only the sender and receiver know. The most common types of private key are AES and DES or 3 DES. This is known as Symmetric Encryption.
49. Public Key Encryption | is data that is encrypted using 2 keys, one private that's known only to the user and one public that's associated with the user. RSA is the most popular type used today and this type is called Asymmetric, meaning different.
50. Encryption & Algorithm Analogy | Using an envelope the Encryption is that data contained in the letter. An Algorithm is a set of detailed instructions based on a mathematical formula and how to insert the data into the envelope.
51. Signature Based Monitoring | is where an IPS or IDS examines network traffic, activity and transactions and look for well known patterns.
52. Anomaly Based Monitoring | is where an IPS or IDS establishes a baseline of normal activities over a given period of time. Then whenever a significant deviation for the baseline occurs it can detect it and sound an alarm. There are two issues with this form of detection and they are false alarms because sometimes network behavior changes rapidly and higher than usual network cost i.e. processing time.
53. Behavior-Based Monitoring | examines and analyzes the behavior of processes and programs and detect any abnormal activities. It can then decide to allow or block the activity. Its advantage is that it doesn't have to compile a baseline or update its signature files and as a result can quickly stop new attacks.
54. De Jure standards | are official standards such as those that are set by the IEEE.
55. De Facto standards | are those standards, though not set by the IEEE or any other organization, and still are accepted as the industry standard.
56. Latency | is the delay between transmission of a signal and its receipt.
57. Throughput | is the amount of data that a medium can transmit during a given period of time.
58. Scalability | is the property that allows you to increase the size of the network easily.
59. Convergence | the ability to have or use voice, data or video over a network.
60. Vulnerability | is a flaw or a weakness that allow a threat agent to bypass security.
IMPACT | is a systematic and methodical evaluation of exposure of assets to attackers, forces of Nature or any other entity that is a potential harm.
62. Risk | is the likelihood that a threat agent will exploit vulnerability
Digital Certificate | is a password protected and encrypted file that holds individuals identification information including the public key.
Incident | is an issue that may be man made or natural whose impact affects the QoS or functionality of a network is resolved in a timely manner.
Disaster | is an issue that escalates from an incident, either man made or natural that causes catastrophic damage to the functionality or QoS of a network. It is generally not solved in a timely manner.
67. CSMA/CD | is a method of accessing a wired medium and when a collision occurs it uses a technique called jamming to make sure it can transmit the data which is unlike CSMA/CA a wireless access method which uses ACK or acknowledge packets to access and verify the transmission
68. Nonrepudiation | is the ability to verify that an operation has been performed by a particular person or account. It is a system property that prevents the parties to a transaction from subsequently denying involvement in the transaction.
Virus | is program that replicates itself to other devices on the network. It needs an executable program to attach itself to in order to do its job.
Worm | is a program that travels through and replicates itself on the network. They do not alter programs as viruses do but are payload specific. They can and sometimes do carry viruses however.
Trojan | is as it suggests. It is a program that disguises itself but actually causes harm to the machine
Hot Site | is an exact copy or mirror of your present network. It includes facility, hardware, power, telecom, software and backups.
Warm Site | contains site, telecom, power and hardware. Software and backups are to be brought with.
Cold Site | contains site, power and telecom. Everything else i.e. hardware, software and backups must be brought in.
In information security, an example of a threat agent can be ____. | All of the above
Select below the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data. | Integrity
Which position below is considered an entry-level position for a person who has the necessary technical skills? | security technician
Which of the three protections ensures that only authorized parties can view information? | Confidentiality
According to the U.S. Bureau of Labor Statistics, what percentage of growth is the available job outlook supposed to reach by the end of the decade? | 22
Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? | $1,500,000
What information security position reports to the CISO and supervises technicians, administrators, and security staff? | manager
To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack? | Love Bug
What country is now the number one source of attack traffic? | Indonesia
Which term below is frequently used to describe the tasks of securing information that is in a digital format? | information security
Select below the term that is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so: | Script kiddies
An item that has value. | asset
A premeditated, politically motivated attack against information, computer systems, computer programs, and data, which often results in violence. | cyberterrorism
Attacker who attacks for ideological reasons that are generally not as well defined as a cyberterrorist's motivation | hactivist
Automated attack package that can be used without an advanced knowledge of computers | exploit kit
A situation that involves exposure to danger | risk
A type of action that has the potential to cause harm. | threat
A person or element that has the power to carry out a threat | threat agent
A flaw or weakness that allows a threat agent to bypass security | vulnerability
The means by which an attack could occur? | ?threat vector
In information security, what constitutes a loss? | all of the above
Under which law are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format? | HIPAA
Script kiddies acquire which item below from other attackers to easily craft an attack | Exploit kit
What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain? | Identity theft
What term is used to describe a loose network of attackers, identity thieves, and financial fraudsters? | Cybercriminals
The security protection item that ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter is known as? | Authentication
The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information. | Gramm-Leach-Bliley
What kind of server connects a remote system through the Internet to local serial ports using TCP/IP? | Serial server
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or network? | distributed
Which of the following is malicious computer code that reproduces itself on the same computer? | virus
The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as? | Tailgating
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware? | Adware
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms? | rootkit
The two types of malware that require user intervention to spread are: | Viruses and trojans
Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious: | Trojan
What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals? | Social engineering
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:? | ?Ransomware
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?? | ?Watering Hole
What type of malware is heavily dependent on a user in order to spread? | virus
Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?? | Oligomorphic malware
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative? | Easter egg
A virus that infects an executable program file is known as? | program virus
Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event is known as a? | logic bomb
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique? | Swiss cheese
What is the term used to describe unsolicited messages received on instant messaging software? | Spim
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user. | Adware
Software code that gives access to a program or a service that circumvents normal security protections.? | Backdoor?
A logical computer network of zombies under the control of an attacker.? | ?Botnet
Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.? | ?Computer virus
A false warning designed to trick users into changing security settings on their computer? | Hoax
Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.? | Keylogger?
Computer code that lies dormant until it is triggered by a specific logical event? | ?Logic bomb?
?A computer virus that is written in a script known as a macro | ?Macro virus
?A phishing attack that targets only specific users | ?Spear phishing
?A phishing attack that uses telephone calls instead of e-mails. | Vishing
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as: | A macro
Which of the following is not one of the four methods for classifying the various types of malware?? | ?Source
How many different Microsoft Windows file types can be infected with a virus? | 70
?What type of system security malware allows for access to a computer, program, or service without authorization? | ?Backdoor
Attacks that take place against web based services are considered to be what type of attack? | server-side
When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service: | DNS
Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database? | whatever' AND email IS NULL; --
Which type of attack below is similar to a passive man-in-the-middle attack? | replay
What portion of the HTTP packet consists of fields that contain information about the characteristics of the data being transmitted? | HTTP header
The default root directory of the Microsoft Internet Information Services (IIS) Web server is located at which directory below? | C:\Inetpub\ wwwroot