Shared Flashcard Set

Details

1-25
-
25
Computer Science
Post-Graduate
01/31/2015

Additional Computer Science Flashcards

 


 

Cards

Term
Which of the following implementation steps would be appropriate for a public wireless hot-spot?
Definition
Open system authentication
Term
Which of the following is a step in deploying a WPA2-Enterprise wireless network?
Definition
Install a digital certificate on the authentication server
Term
Which of the following controls would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks?
Definition
802.1x
Term
Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host?
Definition
Disabling unnecessary services
Term
A security manager must remain aware of the security posture of each system. Which of the following supports this requirement?
Definition
Establishing baseline reporting
Term
Deploying a wildcard certificate is one strategy to:
Definition
Reduce the certificate management burden
Term
The security administrator needs to manage traffic on a layer 3 device to support FTP from a new remote site. Which of the following would need to be implemented?
Definition
Access control lists
Term
Which of the following ports is used for SSH, be default?
Definition
22
Term
A network administrator has been tasked with securing the WLAN. Which of the following cryptographic products would be used to provide the MOST secure environment for the WLAN?
Definition
WPA2 CCMP
Term
A server with the IP address of 10.10.2.4 has been having intermittent connection issues. The logs show repeated connection attempts from the following IPs:
10.10.3.16
10.10.3.23
212.178.24.26
217.24.94.83
These attempts are overloading the server to the point that it cannot respond to traffic. Which of the following attacks is occurring?
Definition
DDoS
Term
Which of the following ciphers would be BEST used to encrypt streaming video?
Definition
RC4
Term
A user attempting to log on to a workstation for the first time is prompted for the following information before being granted access: username, password and a four-digit security pin that was mailed to him during account registration. This is an example of which of the following?
Definition
Single factor authentication
Term
After analyzing an correlating activity from multiple sensors, the security administrator has determined that a group of very well organized individuals from an enemy country is responsible for various attempts to breach the company network, through the use of very sophisticated and targeted attacks. which of the following is this an example of?
Definition
Advanced persistent threat
Term
Which of the following is true about input validation in a client-server architecture, when data integrity is critical to the organization?
Definition
It should be performed on the server side.
Term
A merchant acquirer has the need to store credit card numbers in a transactional database in a high performance environment. which of the following BEST protects the credit card data?
Definition
Database field encryption
Term
A bank has a fleet of aging payment terminals used by merchants for transactional processing. The terminals currently support single DES but require an upgrade in order to be compliant with security standards. Which of the following is likely to be the simplest upgrade to the aging terminals which will improve in-transit protection of transactional data?
Definition
3DES
Term
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?
Definition
WAF
Term
Which of the following is BEST used to capture and analyze network traffic between hosts on the same network segment?
Definition
Protocol analyzer
Term
After a number of highly publicized and embarrassing customer data leaks as a result of social engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will reduce the risk of another data leak. Which of the following would be most effective in reducing data leaks in this situation?
Definition
Information Security Awareness
Term
Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?
Definition
Hashing
Term
which of the following encrypts data a single bit at a time?
Definition
Stream cipher
Term
Which of the following is used to verify data integrity?
Definition
SHA
Term
By default, which of the following uses TCP port 22?
Definition
SCP
SSH
SFTP
Term
Access mechanisms to data on encrypted USB hard drives must be implemented correctly otherwise.
Definition
the security controls on the USB drive can be bypassed.
Term
Maintenance workers find an active network switch hidden above a dropped-ceiling tile in the CEO's office with various connected cables from the office. Which of the following describes the type of attack that was occurring?
Definition
Packet sniffing
Supporting users have an ad free experience!