Shared Flashcard Set

Details

Security Plus
Security Plus
292
Computer Science
Professional
09/04/2008

Additional Computer Science Flashcards

 


 

Cards

Term

A VPN typically provides a remote access link from one host to another over:

Definition
The Internet
Term
The employees at the Johnson Company are using instant messaging on company networked computers.  The most important security issue to address when using instant messaging is that instant messaging:
Definition
Communications are open and unprotected
Term
Which of the following would be BEST to do when network file sharing is needed.
Definition

1.  Set a disk quota

 

2.  Place the share on a different volume than the operating system

Term
Which of the following programming techniques should be used to prevent buffer overflow attacks?
Definition
Input validation
Term
A large company wants to deploy an FTP server to support file transfers between business customers and partners.  Which of the following should the security specialist consider before making these changes?
Definition
FTP transfers data in an unencrypted format
Term
WEP uses which of the following stream ciphers?
Definition
RC4
Term
A common tool used for wireless sniffing and war driving is:
Definition
NetStumbler
Term

Which of the following is a common type of attack on web servers?

Definition
Buffer overflow
Term
Which of the following would be needed to ensure that a user who has received an email cannot claim that the email was not received?
Definition
Non-repudiation
Term
Spam is considered a problem even when deleted before being opened because spam:
Definition
Wastes company bandwidth
Term

In order to secure web-based communications, SSL uses

Definition

1.  Public-key cryptography

 

2.  Symmetric cryptography

Term

A URL for an internet site begins with 'https': rather than "http:' which is an indication that the website uses:

 

Definition
SSL
Term
A web server administrator should adopt which of the following preventative measures?
Definition
Apply the most recent manufacturer updates and patches to the server
Term
A web page becomes unresponsive whenever the embedded calendar control is used.  Which of the following types of vulnerabilities is occurring.
Definition

Activex

Term
The Johnson Company is upgrading the network and needs to reduce the ability of users on the same floor and network segment to see each other's traffic.  Which of the following network devices should be used?
Definition
Switch
Term
Which of the following would be the MOST important reason to apply updates?
Definition
Software is inherently insecure and as new vulnerabilities are found the vulnerabilites must be fixed.
Term
Which of the following types of firewalls provides inspection at layer 7 of the OSI model?
Definition
Application-proxy
Term
A company implements an SMTP server on their firewall.  This implementation would violate which of the following
Definition
Use of device as intended
Term

A newly hired security specialist is asked to evaluate a companys network security.  The security specialist discovers taht users have installed personal software; the network OS has default settings and no patches have been installed and passwords are not required to be changed regularly.  Which of the following would be the first step to take?

Definition
Enforce the security policy
Term
Which of the following is most often used to allow a client or partner access to the network?
Definition
Extranet
Term

A demilitarized zone (DMZ) is a network segment that can be created by using:

 

Definition

two firewalls

Term
Stateful packet inspections is a methodology used by:
Definition
A firewall
Term
Which of the following types of IDS should be employed to obtain the MOST information about the enterprise?
Definition

Network Based

Term
Giving each user or group of users only the access they need to do their jobs is an example of which of the following security principles?
Definition
Least Privilege
Term
A system administrator reports that an unauthorized user has accessed the network.  Which of the following would be the FIRST action to take?
Definition
Contain the problem
Term
Which of the following portions of a company's network is between the Internet and an internal network.
Definition
Demilitarized Zone (DMZ)
Term
Which of the following may be a security issue during transport of stored tape media to an offsite storage location.
Definition
Theft of the media
Term
A company's security specialist is securing a web server that is reachable from the internet.  The web server is located in the core internal corporate network.  The network cannot be redesigned and the server cannot be moved.  Which of the following should the security specialist implement to secure the web server? (select 2)
Definition

1.  Host-based IDS

 

2.  Host-based firewall

Term
When a patch is released for a server the administrator should?
Definition
Test the patch on a non-production server then install the patch to production.
Term
A security specialist is called to an onsite vacant office where an employee has found an unauthorized wireless access device connected to an RJ-45 jack linked to the corporate LAN.  Which of the following actions should the administrator take FIRST?
Definition
Disconnect the network cable
Term
An IDS sensor on a network is not capturing all the network data traffic.  This may be happening because the sensor is connected to the network with a:
Definition
Switch
Term
Most current encryption schemes are based on:
Definition
algorithms
Term
Message authentication codes are used to provide which service?
Definition
Integrity
Term
The IPSec Security Association is managed by:
Definition
ISAKMP
Term

Which of the following protects the confidentiality of data making the data unreadable to those who don't have the correct key?

Definition
Encryption
Term
A user has a sensitive message that needs to be sent in via email.  The message needs to be protected from interception.  Which of the following should be used when sending the email?
Definition
Encryption
Term
Which of the following describes a type of algorithm that cannot be reversed in order to decode the data?
Definition
One way function
Term
The most common Certificate Server port required for secure web page access is port:
Definition
443
Term
While Jim Jones is surfing, he encounters a pop-up window that prompts the user to download a browser plug-in.  The pop-up window is a certificate which validates the identity of the plug-in developer.  Which of the following BEST describes this type of certificates?
Definition
Software publisher certificates
Term
Secret key encyption is also known as
Definition
symmetrical
Term
Which of the following are types of certificate-based authentication? (Select two)
Definition

1.  Many-to-one mapping

2.  One-to-one mapping

Term
Which of the following types of cryptography is typically used to provide an integrity check?
Definition
Hashing
Term

Which of the following refers to the ability to be reasonably certain that data is not disclosed to unintended persons?

Definition
Confidentiality
Term
While reviewing the running services on a production server, an unknown service is observed.  Which of the following actions should be taken?
Definition
Investigate the service and determine whether the service is necessary.
Term
Which of the following methods of password guessing typically requires the longest attack time?
Definition
Brute force
Term
Which of the following BEST describes a set of programs and code that allows an undetectable presence on a system with administrative rights?
Definition
Rootkit
Term
Which of the following access control models uses subject and object labels?
Definition
Mandatory Access Control (MAC)
Term
A task-based control model is an example of which of the following?
Definition
Role Based Access Control (RBAC)
Term
Reusing a ticket, as a replay attack, in Kerberos authentication will not be successful because the tickets:
Definition
are time stamped
Term
Controlling access to information systems and associated networks is necessary for the preservation of their:
Definition
confidentiality, integrity and availability
Term
Which of the following types of authentication BEST describes providing a username, password and undergoing a thumb print scan to access a workstation?
Definition
Multifactor
Term
Which of the following steps is MOST often overlooked duringthe auditing process?
Definition
Reviewing event logs regularly
Term
The risks of social engineering can be decreased by implementing: (Select TWO)
Definition

1.  Security awareness training

 

2.  Identity verification methods

Term

A user downloads and installs a new screen saver and the program starts to rename and delete random files.  Which of the following would be the BEST description of this program?

Definition
Trojan Horse
Term
Which of the following authentication methods is based upon an authentication server that distributes tickets to clients?
Definition
Kerberos
Term
Turnstiles, double entry doors and security guards are all prevention measures for which of the following types of social engineering?
Definition
Piggybacking
Term

Which of the following types of malicious software travles across computer networks without requiring a user to distribute the software?

Definition
Worm
Term
Non-essential services are often appealing to attackers because non-essential services: (select TWO)
Definition

1.  are not typically configured correctly or secured

 

2.  sustain attacks that go unnoticed

Term
A manager reports that users are receiving multiple emails from the account of a user who no longer works for the company.  Which of the following would be the BEST way to determine whether the emails originated internally?
Definition
Look at the source IP address in the SMTP header of the emails.
Term
Audit log information can BEST be protected by (select 2)
Definition

1.  access controls that restrict usage

 

2.  recording to write-once media

Term
Which of the following authentication methods requires that the client authenticate itself to the server and the server authenticate itself to the client?
Definition
Mutual
Term
Which of the following is an inherent flaw of Discretionary Access Control (DAC) relating to security?
Definition
DAC relies only on the identity of the user or process, leaving room for a Trojan Horse.
Term

Which of the following should be done if an audit recording fails in an information system?

Definition
Send an alert to appropriate personnel
Term
On a Windows host, which of the following event logs would contain failed logons?
Definition
Security log
Term
Kerberos uses which of the following ports by default?
Definition
88
Term
During a live response to an unauthorized access, a forensics specialist executes a command on the computer being investigated.  Which of the following commands would be used to display the current network connections on the local computer?
Definition
NETSTAT
Term
The first step in risk identification would be to identify.
Definition
assests
Term
Which of the following would be an example of a high-availablity disk technology?
Definition
RAID
Term
Documentation describing a groups expected minimum behavior is known as:
Definition
a code of ethics
Term
A companys new employees are asked to sign a document that describes the methods of and purposes for accessing the comanys IT system.  Which of the following BEST describes the document?
Definition
Acceptable Use Policy
Term
A company has implemented a policy stating that users will only receive access to the systems needed to perform their job duties.  This is an example of:
Definition
least privilege
Term
Which of the following is a supression method for a Class C fire?
Definition
Carbon dioxide (CO2)
Term

Which of the following is the BEST place to obtain a hotfix or patch for an application or system?

Definition
The manufacturer's website
Term
Communication is important to maintaining security because communication keeps:
Definition
the user commuity informed of threats
Term
Which of the following would be MOST important to have to ensure that a comapny will be able to recover in case of severe environmental trouble or destruction?
Definition
Disaster recovery plan
Term

An important component of a good data retention policy is:

Definition
offsite storage
Term
Discretionary Access Control (DAC) depends on
Definition
owner defined permissions
Term
A security specialist for a large distributed network with numerous divisions is selecting an access control model.  Employees in the human resource division need access to personnel information by not production data and operations employees need access to production data only.  Which of the following access control models would be MOST appropriate?
Definition
Role Based Access Control (RBAC)
Term
The security of an encryption scheme depends on the secrecy of the:
Definition
key
Term
A host-based active IDS should be placed on a:
Definition
server
Term
Which of the following authentication methods requires that computers have time sources synchronized?
Definition
Kerberos
Term
Which of the following access control models would be MOST compatible with the concept of least privilege?
Definition
Mandatory Access Control (MAC)
Term

Time stamps of audit records for multiple systems are BEST generated using which of the following types of system clocks? (select TWO)

Definition

1.  Synchronized

 

2.  Internal

Term
Which of the following types of network monitoring activities would be used to obtain plain text user names an passwords?
Definition
Sniffing
Term

Which of the following BEST describes IP spoofing?

Definition
Changing the apparent IP address of the source computer.
Term
Which of the following needs to be backed up on a domain controller to be able to recover Active Directory?
Definition
System state
Term
The process of increasing the security of an operating system from its normally installed state is called:
Definition
Hardening
Term
The aid in preventing the execution of malicious code in email clients, which of the following should be done by the email administrator?
Definition
Spam and anti-virus filters should be used
Term
ACME issues Certificates as a Local Registration Autority and users report that emails sent outside ACME can not be validated by the recipients.  Which fo the following actions should be taken?
Definition
Turn off the digitial signatures on emails going out of the organization
Term
Part of the backup media security includes: (select three)
Definition

1.  labeling each tape

 

2. storing all tapes in a safe location

 

3.  scrubbing data from old tapes before disposing of the tapes.

Term
Pretty good Privacy (PGP) uses which of the following symmetric encryptions of message data and hashing methods?
Definition
3DES and SHA-1
Term
A security specialist is called to an onsite vacant office where an employees has found an unauthorized wireless access device connected to an RJ-45 jack linked to the corporate LAN.  Which of the following actions should the administrator take FIRST?
Definition
Disconnect the network cable
Term
Which of the following BEST describes the baseline process of securing devices on a network infrastructure?
Definition
Hardening
Term
BSU wants to connect the network to a manufacturer's network to be able to order parts.  Which of the following types of networks should BSU implement to provide the connection while limiting the services allowed over the connection?
Definition
Extranet
Term
Which of the following are components of host hardening?  (Select TWO)
Definition

1.  Disabling unnecessary services

 

2.  Applying patches

Term
L2TP tunneling replies on which of the following for security?
Definition
IPSec
Term
A security administrator tasked with confining sensitive data traffic to a specific subnet would do so by manipulating privilege policy based tables in the network-s:
Definition
Router
Term
Which of the following could cause communication errors with an IPSec VPN tunnel because of changes made in the IP header?
Definition
NAT
Term
Which of the following is the primary method of performing network hardening?
Definition
Disable any unnecessary ports and services
Term
A remote user has a laptop computer and wants to connect to a wireless network in a hotel.  Which of the following should be implemented to protect the laptop computer when connecting to the hotel network:
Definition
Personal firewall
Term
Bakur Industries wants to implement a VLAN.  Senior management believes that a VLAN will be secure because authentication is accomplished by MAC addressing and that dynamic trunking protocol (DTP) will facilitate network effciency.  Which of the following issues should be discussed with senior management before VLAN implementation?
Definition
MAC addressing can be spoofed and DTP allows rogue network devices to configure ports.
Term
Kirat Refrigeration Services' web server needs to be accessible by remote users, business partners, and coporate users.  Which of the following would be the BEST location for the web server?
Definition
Demilitarized zone (DMZ)
Term
Fibor optic cable is considered safer than CAT5 because fiber optic cable: (Select TWO)
Definition

1.  Is not susceptible to interferences

 

2.  Is hard to tap into

Term
Which of the following types of IDS uses known patterns to deteck malicious activity?
Definition
Signature based
Term
Which of the following types of removable media is write-once and appropriate for archiving security logs?
Definition
CD-R
Term
Which of the following ports are typically used by email clients? (select TWO)
Definition

1.  143

 

2.  110

Term
All of the following types of attacks can be detected by an IDS EXCEPT:
Definition
Spoofed e-mail
Term
A system administrator reports that an unauthorized user has accessed the network.  Which of the following would be the FIRST action to take?
Definition
Contain the problem
Term
Access controls based on security labels associated with each data item and each user are known as:
Definition
Mandatory Access Control (MAC)
Term
A user has received an email from a mortagage company asking for personal information including bank account numbers.  This would BEST be described as:
Definition
phishing
Term
Which of the following connectivity is required for a web server that is hosting an SSL based web site?
Definition
Port 443 inbound
Term
Which of the following types of attacks consist of a computer sending PING packets with the destination address set to the network's broadcast address and the source address set to the target computer's IP address?
Definition
Smurf
Term
Which of the following would be the BEST reason to disable unnecessary services on a server?
Definition
Attack surface and opportunity for compromise are reduced.
Term
Which of the following access decisions are based on a Mandatory Access Control (MAC) environment?
Definition
Sensitivity labels
Term
On a Windows host, which of the following event logs would contain failed logons?
Definition
Security Logs
Term
Which of the following authentication methods is based upon an authentication server that distributes tickets to clients?
Definition

a.  Challenge Handshake authentication protocol (CHAP)

b.  Username/password

c.  Multifactor

Term
Which of the following access control models uses subjects and object labels?
Definition

Mandatory Access Control (MAC)

Term
Which of the following methods of password guessing typically requires the longest attack time?
Definition
Brute Force
Term
A credential that has been digitally signed by a trusted authority is known as:
Definition
a certificate
Term
Which of the following authentication methods requires that the client authenticate itself to the server and the server authenticate itself to the client.
Definition
Mutual
Term
Malicious code that enters a computer by means of a freely distributed game that is intentionally installed and played is known as:
Definition
a Trojan Horse
Term
Which of the following is used to determine equipment status and modify the configuration or setting of network devices?
Definition
SNMP
Term
Kerberos uses which of the followig ports by default?
Definition
88
Term
A user is assigned access rights explicity.  This is a feature of which of the following access control models?
Definition
Discretionary Access Control (DAC)
Term
Audit log information can BEST be protected by: (select TWO).
Definition

1.  access controls that restrict usage

 

2.  recording to write-once media

Term
A user is assigned access rights based on the function within the organization.  This is a feature of which of the following types of access control models?
Definition
Role Based Access Control (RBAC)
Term
Which of the following types of malicious software copies itself by attaching to other porgrams on teh same host computer?
Definition
Virus
Term
Which of the following describes an attacker encouraging a person to perform an action in order to be successful?
Definition
Social engineering
Term
Which of the following types of attacks is targeting a web server if thousands of computers are simultaneiously sending hundreds of FIN packets with spoofed source IP addresses?
Definition
DDos
Term
Which of the following is the MOST effective social engineering defenseive strategy?
Definition
Training and awareness
Term
Malicious port scanning is a method of attack to determine which of the following?
Definition
Mandatory Access Control (MAC)
Term
Which of the following types of authentication models uses a smart card and a User ID/Password for accessing network resources?
Definition
Multifactor
Term
A user has a sensitive message that needs to be sent via email.  The message needs to be protected from interception.  Which of the following should be used when sending the email?
Definition
Encryption
Term
PKI provides non-repudiation by prividing third-party assurance of certificate:
Definition
validation
Term
Using software on an individual computer to generate a key pair is an example of which of the following approaches to PKI architecture?
Definition
Decentralized
Term
Which of the following is the number of security associations in an IPSec encrypted session for each direction?
Definition
one
Term
Which of the following trust models would allow each user to create and sign certificates for the people they know?
Definition
Web-of-trust
Term
Which of the following would be an effective way to ensure that a compromised PKI key can not access a system?
Definition
Revoke the key
Term
Which of the following provides the MOST secure form of encryption?
Definition
AES
Term
Which of the following would be achieved by using encryption? (Select THREE)
Definition

1.  Non-repudiation

 

2.  Confidentiality

 

3.  Integridty

Term
Which of the following types of encryption would be BEST to use for a large amount of data?
Definition
Symmetric
Term
Pretty Good Privacy (PGP) uses a PKI Trust Model where no certificate authority (CA) is subordinate to another.  The model with no single trusted root is known as:
Definition

peer-to-peer

Term
A digitial signature is used for:
Definition

Integrity and non-repudiation

Term

Which of the following describes the validation of a message's origin?

Definition

Non-repudiation

Term
A JPEG file that contains a message in blue letters on a solid white background is published on a website.  The file has slight variations in color on the edge of each letter which can be mapped to an ASCII table revealing a hidden message.  The process known as:
Definition
steganography
Term
The authentication process where the user can access several resources without the need for multiple credentials is known as:
Definition
single sign-on
Term
Which of the following would be the minimally acceptable method of ensuring that a disposed hard drive does not reveal sensitive data?
Definition
Perform multiple bit level overwrites
Term
Which of the following types of backups requires that files and software that have been changed since the last full backup be copied to storage media.
Definition
Differential
Term

A company has implemented a policy stating that users will only receive access to the systems needed to perform their job duties.  This is an example of:

Definition

least privilege

Term
Mark walks up to a group of people who have physical access to a network operations room.  As some of the group enters the room.  Mark walks into the room behind the group without providing credentials to gain access.  Which of the following would BEST describe this activity?
Definition
Tailgating
Term
A security specialist is reviewing writable FTP directories and observes several files that viotate the company's security policy.  In addition to checking the FTP server, the specialist should:
Definition
Contain the affected system, review logs for other compromises and report the situation.
Term
To preserve evidence for later use in court, which of the following needs to be documented?
Definition
Chain of custody
Term
The first step in risk identification would be to identify:
Definition
assets
Term
Following a disaster, which of the following functions should be returned first from the backup facility to the primary facility?
Definition
Least critical functions
Term
An important component of a good data retention policy is:
Definition
offsite storage
Term
Which of the following describes the process by which a single user name and password can be entered access multiple computer applications
Definition
Single sign-on
Term

Which of the following is a major reason that social engineering attacks succeed?

Definition
Lack of security awareness
Term
Which of the following would be MOST important when designing a security awareness program?
Definition
Conducting user training sessions
Term

Which of the following are important for password management? (select TWO)

Definition

1.  Changing the password often and not reusing the same password.

 

2.  Using three of the four character sets

Term
Which of the following authentication methods requires that computers have time sources synchronized?
Definition
Kerberos
Term

Default passwords in hardware and software should be changed:

Definition
When the hardware or software is turned on
Term
Which of the following needs to be backed up on a domain controller to be able to recover Active Directory?
Definition
System state
Term
The largest benifit gained by internally authorized security scanning would be:
Definition
finding vulnerabilities before the attackers do
Term
Which of the following would be BEST for deploying third-party application security updates on a network with 1,000 computers?
Definition

Enterprise system management (ESM)

Term
Which of the following methods of authentication uses physical characteristics of a user to authenticat the user?
Definition
Biometrics
Term

When using client side certificates, which of the following can be done to ensure that a computer can not access another company's web site?

Definition
Revoke the computer's certificate
Term
Which of the following describes an authorized user redirecting wireless network traffic from the intended access point to a laptop to inject a packet with malware?
Definition

A man-in-the-middle attack

Term
During business hours, a company employee accesses retail sites unrelated to the employee's job from the workstation.  Which of the following should be reviewed with this employee?
Definition
Acceptable use policy
Term
Which of the following disaster recovery backup sites would be MOST difficult to test?
Definition
Cold site
Term
Shopmart issues Certificates as a Local Registration Authority and user report that emails sent outside Shopmart can not be validated by teh recipients.  Which of the following actions should be taken?
Definition
Turn off the digital signatures on emails going out of Shopmart
Term
Which of the following remote access processes is BEST described as matching user supplied credentials with those previously stored on a host server?
Definition
Authentication
Term
Which of the following standards does S/MIME use to perform public key exchange and authentication?
Definition
X.509
Term
Which of the following security services are provided by digital signatures? (select THREE)
Definition

1.  Integrity

 

2.  Authentication

 

3.  Non-repudiation

Term
The purpose of SSID in a wireless network is to:
Definition

Identify the network

Term
SSL runs by default on which of the following ports?
Definition
443
Term
Pretty Good Privacy (PGP) uses which of the following symmetric encryptions of message data and hashing methods?
Definition
3DES and SHA-1
Term
Which of the following would be the BEST step to take to stop unauthorized users from targeting a wireless network with a site survey? (select TWO)
Definition

1.  Disabling SSID broadcasting

 

2.  Charging the default SSID

Term
Poor programming techniques and lack of code review can lead to which of the following types of attacks?
Definition
Buffer overflow
Term
Which of the following is often misused by spyware to collect and report a user's activities?
Definition
Tracking cookies
Term
Which of the following daemons is MOST likely to be the cause if an unauthorized user obtains a copy of Linux systems/etc/passwd files?
Definition
FTP configures to allow anonymous user access
Term
Which of the following protocols is used by Encapsulating Security Payload (ESP) in IPSec?
Definition
50
Term
To keep an 802.11x network from being automatically discovered, a user should:
Definition
turn off the SSID broadcast
Term

A security specialist with a large company has seen an increase in the number of spam emails.  A user tells the specialist that even though the user has unsubscribed from the lists, the problem seems to be worsening.  Which of the following would be a possible cause?

Definition
Unsubscribe requests confirm email addresses
Term
IPSec works at which of the following layers of the TCP/IP model?
Definition

Network

Term
Which of the following types of vulnerability operates by passing a program invalid data?
Definition
Buffer overflows
Term
Which of the following would be the MOST common method for attackers to spoof email?
Definition
Open relays
Term
Which of the following programming techniques should be used to prevent buffer overflow attacks?
Definition
Input validation
Term
Which of the following would be considered a detrimental effect of a virus hoax? (select TWO)
Definition

1.  Technical support resources are consumed by increased user calls.

 

2.  Users are tricked into changing the system configuration.

Term
Which of the following would be BEST to do when network file sharing is needed? (Select TWO)
Definition

1.  Place the share on a different volume then the operating system

 

2.  Set a disk quota

Term
In a classified environment, a clearance into a Top Secret compartment only allows access to certain information within that compartment.  This is known as:
Definition
need to know
Term
ACME has a hierarchical-based concept of privilege management with administrators having full access, human resources personnel having slightly less access and managers having access to their own department files only.  This is BEST described as:
Definition
Role Based Access Control (RBAC)
Term
Which of the follwoing would be the MOST effective backup site for disaster recovery?
Definition
Hot site
Term
The process of predicting threats and vulerabilities to assets is known as threat:
Definition
Modeling
Term
An enclosure that prevents radio frequency signals from emaneting out of a controlled environment is BEST described as which of the following?
Definition

Faraday cage

Term
Which of the following sequence of steps should be contained in a computer incident response policy?
Definition
Preparation; detection and analysis; containment, eradication and recovery; post-incident activity
Term
Which of the following describes backig up files and software that have changed since the last full or incremental backup?
Definition
incremental backup
Term
A security specialist is reviewing writable FTP directories and observes several files that violate the company's security policy.  In addition to checking the FTP server, the specialist should:
Definition
Contain the affected system, review logs for other compromises and report the situation
Term
Which of the following methods of documenting and storing a password is considered acceptable?
Definition
Writing the password on a piece of paper and storing the paper in a locked safe
Term
The process of documenting who applied a patch to a specific firewall at a specific time and what the patch is supposed to accomplish is known as:
Definition
change control management
Term
Company intranet, newsletters, posters, login banners and e-mails would be good tools to utilize in a security:
Definition
awareness program
Term
Human Resource department personnel should be trained about security policy:
Definition
Guidelines and enforcement
Term
An authentication system where a unique username and password is used to access multiple systems within an organization is an example of which of the following?
Definition
Single sign-on
Term
Malicious software that travels across computer networks without user assistance is an example of a:
Definition
worm
Term
When setting password rules, which of the following would lower the level of security of a network?
Definition
Complex passwords that users can not remotely change are randomly generated by the administrator and given to users.
Term
A user is assigned access rights explicity.  This is a feature of which of the following access control models?
Definition
Discretionary Access control (DAC)
Term
Nmap has been run against a server and more open ports then expected have been discovered.  Which of the following would be the FIRST step to take?
Definition
The process using the ports should be examined
Term
An employee receives a request from a person claiming to be an employee at a remote office location.  The caller is knowledgeable about the company and the caller's name is listed in the company telephone and email directory; however, the caller claims there is an emergency and asks that the request be expedited.  Which of the following would be the BEST action for the employee to take?
Definition
Follow established procedures and report any abnormal incidents.
Term
Which of the following types of authentication models uses a smart card and a User ID/password for accessing network resources?
Definition
Multifactor
Term
Which of the following would be MOST desirable when attacking encrypted data?
Definition
Term
Which of the following types of attacks is targeting a web server if thousands of computers are simultaneously sending hundreds of FIN packets with spoofed source IP addresses?
Definition
DDoS
Term
Which of the following should be doen if an audit recording falls in an information system.
Definition
Send an alert to the appropriate personnel
Term
Which of the following would be the FIRST step to take to mitigate the threat of non-essential domain accounts?
Definition
Develop a security policy
Term
Social engineering attacks would be MOST effective in which of the following environments? (Select TWO).
Definition

1.  A public building that has shared office spaces.

 

2.  A company with a help desk whose personnel have minimal training.

Term
MITRE and CERT are:
Definition
virus and malware cataloging organizations
Term
A user is assigned access rights based on the function within the organization.  This is a feature of which of the following types of access control models?
Definition
Role Based Access Control (RBAC)
Term
A person pretends to be a telecommunications repair technician, enters a building stating that there is a networking trouble work order and requests that a security guard unlock the wiring closet.  The person connects a packet sniffer to teh network switch in the wiring closet and hides the sniffer behind the switch against the wall.  This is an example of:
Definition
Social engineering
Term
Users are reporting that when attempting to access the companys web page on the Internet, the user is rerouted to a protest webpage.  This is MOST likely:
Definition
DNS poisoning
Term
A workstation is being used as a zombie set to attack a web server on a certain date.  The infected workstation is MOST likely part of a:
Definition
DDoS Attack
Term
Reusing a ticket, as a replay attack, in Kerberos authentication will not be successful because the tickets:
Definition
are time stamped
Term
A task based control model is an example of which of the following:
Definition
Role Based Access Code (RBAC)
Term
Which of the following is an internet flaw of Discretionary Access Control (DAC) relating to security?
Definition
DAC relies only on the identity of the user or process, leaving room for a Trojan horse.
Term
Which of the following access control models refers to assigning sensitivity labels to the user and the data?
Definition
Mandatory Access Control (MAC)
Term
Audit record storage capacity must be large enough to ensure that:
Definition
the storage is not exceeded
Term
In a certificate hierarchy, the ultimate authority is called the:
Definition
Root Certifying Authority (Root CA)
Term
A security system that uses labels to Identify objects and requires formal authorization to use is BEST described as:
Definition
Mandatory Access Control (MAC)
Term
Which of the following types of authentication BEST describes providing a username, password and undergoing a thumb print scan to access a workstation?
Definition
Multifactor
Term
Which of the following is the MOST effective way for an administrator to determine what security holes reside on a network?
Definition
Perform a vulnerability assessement
Term
A large company wants to deploy an FTP server to support file transfers between business customers and partners.  Which of the following should the security specialist consider before making these changes?
Definition
FTP transfers data in an unencrypted format.
Term
Which of the following is often misused by spyware to collect and report a user's activities?
Definition
Tracking cookie
Term
The MOST common exploits of Interneto-exposed network services are due to:
Definition
buffer overflows
Term
Which of the following would be MOST effective in preventing network traffic sniffing?
Definition

Use switches instead of hubs

Term
Which of the following problems will MOST likely occur if an HTML-based email has a mislabeled MIME type, exe attachment?
Definition
the executable can automatically execute
Term
Which of the following uses private key/public key technology to secure web sites?
Definition
SSL
Term
Which of the following is the MOST significant flaw in Pretty Good Privacy (PGP) authentication?
Definition
A user must trust the public key that is received
Term

Which of the following would be the MOST common method for attackers to spoof email?

Definition

open relays

Term
Open FTP file shares on servers can facilitate which of the following types of attacks?
Definition
Disk storage consumption
Term
Which of the following VPN implementations consists of taking IPv6 security features and porting them IPv4?
Definition
IPSec
Term
IPSec works at which of the following layers of the TCP/IP model?
Definition
Network
Term
The concept of that a web script is run in its own environment and cannot interfere with any other process is known as a:
Definition
sandbox
Term
A company has instituted a VPN to allow remote users to connect to the office.  As time progresses multiple security associations are created with each association being more secure.  Which of the following should be implemented to automate the selection of the BEST security association for each user?
Definition
IKE
Term
Which of the following would be needed to ensure that a user who has received an email cannot claim tha tthe email was not received?
Definition
Non-repudiation
Term
A URL for an Internet site begins with 'https:' which is an indication that this web site uses:
Definition
SSL
Term
The purpose of the SSID in a wireless network is to:
Definition
identifiy the network
Term
A small manufacturing company wants to deploy secure wireless on their network.  Which of the following wireless security protocols could be used?  (Select TWO)
Definition

1.  WEP

 

2.  WPA

Term
Most current encryption schemes are based on:
Definition
algorithms
Term

Which of the following are types of certificate-based authentications? (Select two)

Definition

1.  Many-to-one mapping

 

2.  One-to-one mapping

Term
Which of the following would be an example of a hardware device where keys can be stored?  (select TWO)
Definition

1.  Smart card

 

2.  PCMCIA card

Term
PKI is based on which of the following types of encryption?
Definition

Asymmetric

Term
Which of the following provides the MOST secure form of encryption?
Definition
AES
Term
Which of the following describes the validation of a message's origin?
Definition

non-repudiation

Term
Which of the following is a critical element in private key technology?
Definition
keeping the key a secret
Term
Which of the following trust models would allow each user to create and sign certificates for the people they knew?
Definition
Web-of-trust
Term
Message authentication codes are used to provide which service?
Definition
Integrity
Term
Pretty Good Privacy (PCP) uses PKI Trust Model where no certificate authority (CA) is subordinate to another.  The model with no single trusted root is known as:
Definition
peer-to-peer
Term
Which of the following correctly identifies some of the contents of an end user's X.509 certificate?
Definition
User public key, the certificate's serial number, and the certificate's validity dates.
Term

The Diffie-Hellman encryption algorithm relies on which of the following?

Definition
Key exchange
Term
Non-repudiation is enforced by which of the following?
Definition
key exchange
Term
Non-repudiation is enforced by which of the following?
Definition
Digital signatures
Term
Which of the following would be the MOST important step take to recognize suspicious activity with audity logs?
Definition
Determine the usual activity.
Term
Which of the following freeware forensic tools are used to capture packet traffic from a network?
Definition
tcpdump
Term
A honeypot would be installed on a network to:
Definition
divert intruders from more vital assets
Term
The process of increasing the security of an operating system from its normally installed state is called:
Definition
hardening
Term
An SMTP server is the source of email spam in an organization.  Which of the following is MOST likely the cause?
Definition
Anonymous relays have not been disabled.
Term
Which of the following protocols works with 802.1X to authenticate a client to a network?
Definition
EAP
Term
The mode of operation that allows the capture of network data that travels on all devices on a local Ethernet segment in addition to packets destined for the host machine is known as:
Definition
promiscuous
Term
Which of the following BEST describes IP spoofing?
Definition
Scanning a range of IP addresses
Term
A comapny has decided to allow onsite IT contractors to connect to the contractors home office through a VPN.  Which of the following protocols would be allowed through the firewall AH and Encapsulating Security Protocol (ESP)? Select Two.
Definition

1. 51

 

2.  50

Term
When reviewing traces from an IDS the following entries are observed: Date       Time        Source IP     Destination IP           Port          Type10/21   0900 192.1683, (etc).  What of the following is MOST likely occurring?
Definition
Port scanning
Term
A computer system containing personal identification info is being implemented by a company's sales department.  The sales department has requestd that the system become operational before a security review can be completed.  Which of the following can be used to explain the reasons a security review must be completed?
Definition
Company security policy
Term
Which of the following access control models assigns rights based on job descriptions?
Definition
Role Based Access Control (RBAC)
Term

Which of the following describes a semi-trusted location used to securely house public facing servers between the internet and the local network?

Definition
Demilitarized zone (DMZ)
Term
Which of the following could cause communication errors with an IPSec VPN tunnel because of changes made to the IP header?
Definition
NAT
Term
The first step in effectively implementing a firewall is:
Definition
developing a firewall policy
Term
Which of the following is MOST often used to allow a client or partner access to a network?
Definition
Extranet
Term
Which of the following types of IDS uses known patterns to detect malicious activity?
Definition
Signature based
Term
Which of the following ports are typically used by email clients? (Select two)
Definition

1.  143

 

2.  110

Term
Which of the following types of removable media is write-once and appropriate for archiving security logs?
Definition
CD-R
Term
Which of the following is employed to allow distrusted hosts to connect to services inside a network without allowing the hosts direct access to the internal networks?
Definition
Demilitarized zone (DMZ)
Term
Which of the following types of servers should be placed on a private network?
Definition
File and print server
Term
A company is upgrading the network and needs to reduce the ability of users on the same floor and network segment to see each other's traffic.  Which of the following network devices should be used?
Definition
Switch
Term
Which of the following would be the MOST important reason to apply updates?
Definition
Software is inherently insecure and as new vulnerabilities are found the vulnerabilities must be fixed.
Term
Which of the following BEST describes an attempt to transfer DNS zone data?
Definition
Reconnaissance
Term
A companys security specialist is securing a web server tha tis reachable from the internet.  The web server is located in the core internal corporate network.  The network cannot be redesigned and the server cannot be moved.  Which of the following should the security specialist implement to secure the web server?  (Select Two).
Definition

1.  Host-based IDS

 

2.  Host-based firewall

Term
A honeypot is used for:
Definition
allow administrators a chance to ovserve an attack.
Term
An IDS has been employed to enhance security on a companys network.  A security specialist has identified traffic from an internal host IP address accessing internal network resources from the Internet.  Which of the following would MOST likely be the cause?
Definition
An unauthorized user is spoofing internal IP addresses.
Term
Which of the following are components fo host hardening? (select TWO)
Definition

1.  Disabling unnecessary services

 

2.  Applying patches

Term
Which of the following may be a security issue during transport of stored tape media to an offsite storage location?
Definition
Theft of the media
Supporting users have an ad free experience!