Shared Flashcard Set

Details

276-300
-
25
Computer Science
Professional
01/31/2015

Additional Computer Science Flashcards

 


 

Cards

Term
An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender?
Definition
Non-repudiation
Term
Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a specific server?
Definition
HIPS
Term
Matt, the IT Manager, wants to create a new network available to virtual servers on the same hypervisor, and does not want this network to be routable to the firewall. How could this BEST be accomplished?
Definition
Create a virtual switch.
Term
A security administrator implements access controls based on the security classification of the data and need-to-know information. Which of the following BEST describes this level of access control?
Definition
Mandatory Access Controls
Term
A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by default?
Definition
21
Term
Which of the following could cause a browser to display the message below?
“The security certificate presented by this website was issued for a different website’s address.”
Definition
HTTPS://127.0.01 was used instead of HTTPS://localhost.
Term
A company that purchased an HVAC system for the datacenter is MOST concerned with which of the following?
Definition
Availability
Term
Which of the following pseudocodes can be used to handle program exceptions?
Definition
If program module crashes, then restart program module.
Term
Which of the following technologies uses multiple devices to share work?
Definition
Load balancing
Term
Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session?
Definition
HTTPS
Term
Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?
Definition
Bluejacking
Term
Pete, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following should be used to accomplish this task?
Definition
Recovery agent
Key escrow
Term
Which of the following mitigation strategies is established to reduce risk when performing updates to business critical systems?
Definition
Change management
Term
Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
Definition
Clustering
Term
Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools?
Definition
Capture system image
Term
Jane, an administrator, needs to make sure the wireless network is not accessible from the parking area of their office. Which of the following would BEST help Jane when deploying a new access point?
Definition
Placement of antenna
Term
Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?
Definition
Implement WPA
Term
Which of the following is a management control?
Definition
Written security policy
Term
Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?
Definition
Containment strategies
Term
In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a four digit PIN. Which of the following authentication methods is Sara using?
Definition
Single factor
Term
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
Definition
Shoulder surfing
Term
Which of the following application attacks is used to gain access to SEH?
Definition
Buffer overflow
Term
Which of the following is an authentication service that uses UDP as a transport medium?
Definition
RADIUS
Term
Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen?
Definition
Remote wipe
Device encryption
Term
Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane’s company?
Definition
Honeynet
Supporting users have an ad free experience!