Shared Flashcard Set

Details

251-275
-
25
Computer Science
Professional
01/31/2015

Additional Computer Science Flashcards

 


 

Cards

Term
Which of the following components MUST be trusted by all parties in PKI?
Definition
CA
Term
Which of the following should Matt, a security administrator, include when encrypting smartphones?
Definition
Internal memory
Removable memory cards
Term
Which of the following is the below pseudo-code an example of?

IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT
Definition
Input validation
Term
A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted?
Definition
TACACS+
Term
Which of the following can use RC4 for encryption?
Definition
SSL
WEP
Term
Which of the following defines a business goal for system restoration and acceptable data loss?
Definition
RPO
Term
If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts Organization C.Which of the following PKI concepts is this describing?
Definition
Transitive trust
Term
Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency?
Definition
Succession planning
Term
Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?
Definition
Recovery agent
Term
Which of the following devices will help prevent a laptop from being removed from a certain location?
Definition
Cable locks
Term
Which of the following is the MOST secure protocol to transfer files?
Definition
FTPS
Term
Suspicious traffic without a specific signature was detected. Under further investigation, it was determined that these were false indicators. Which of the following security devices needs to be configured to disable future false alarms?
Definition
Anomaly based IDS
Term
A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data. Which of the following administrative controls should be implemented to BEST achieve this?
Definition
Warning banners
Term
Which of the following protocols is used to authenticate the client and server’s digital certificate?
Definition
TLS
Term
Which of the following can be used to mitigate risk if a mobile device is lost?
Definition
Strong passwords
Term
Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?
Definition
Clean desk policy
Term
Which of the following is an example of multifactor authentication?
Definition
Credit card and PIN
Term
After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen:

`Please only use letters and numbers on these fields’

Which of the following is this an example of?
Definition
Proper input validation
Term
Which of the following should the security administrator implement to limit web traffic based on country of origin?
Definition
Proxies
Firewall
URL filtering
Term
Several bins are located throughout a building for secure disposal of sensitive information. Which of the following does this prevent?
Definition
Dumpster diving
Term
Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected?
Definition
Initial baseline configuration
Term
Sara, a company’s security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Sara should immediately implement which of the following?
Definition
Security awareness training
Term
Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales websites. Which of the following would be BEST suited for this task?
Definition
NIPS
Term
Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company’s live modem pool. Which of the following activities is MOST appropriate?
Definition
War dialing
Term
Users at a company report that a popular news website keeps taking them to a web page with derogatory content. This is an example of which of the following?
Definition
DNS poisoning
Supporting users have an ad free experience!