# Shared Flashcard Set

## Details

CIT 165 Ptest1
CIT
50
Computer Networking
03/03/2015

Term
 What is the correct approach for addressing security and organization objectives?a.Security and organization objectives should be developed separatelyb.Security should drive organization objectivesc.Security should support support organization objectivesd.The site security officer should approve or reject organization objectives
Definition
 c.Security should support support organization objectives
Term
 The two components of risk management are:a.Risk assessment and risk analysisb.Vulnerability assessment and risktreatmentc.Risk assessment and risk mitigationd.Risk assessment and risk treatment
Definition
 d.Risk assessment and risk treatment
Term
 The impact of a specific threat is defined as:a.The cost of recovering the assetb.The cost required to protect the related assetc.The effect of the threat if it is realizedd.The loss of revenue if it is realized
Definition
 c.The effect of the threat if it is realized
Term
 Exposure factor is defined as:a.The part of an asset's value that is likely to be lost by a particular threatb.The probability that the threat will be realizedc.The probability that a loss will occur in a year's timed.The cost of a single loss
Definition
 a.The part of an asset's value that is likely to be lost by a particular threat
Term
 A security manager is performing a quantitative risk assessment on a particular asset. The security manager wants to determine the quantitative loss for a single loss based on a particular threat. The correct way to calculate this is:a.Divide the asset's value by the exposure factorb.Multiply the asset's value times the annualized rate of occurrencec.Multiply the asset's value times the single loss expectancyd.Multiply the asset's value times the exposure factor
Definition
 d.Multiply the asset's value times the exposure factor
Term
 A security manager is performing a quantitative risk assessment on a particular asset. The security manager wants to estimate the yearly loss based on a particular threat. The correct way to calculate this is::a.Multiply the single loss expectancy times the asset's valueb.Multiply the asset's value times the exposure factorc.Multiply the asset's value times the exposure factor times the single loss expectancyd.Multiply the single loss expectancy times the annualized rate of occurrence
Definition
 d.Multiply the single loss expectancy times the annualized rate of occurrence
Term
 An organization suffered a virus outbreak when malware was download by an employee in a spam message. This outbreak might not have happened had the organization followed what security principle:a.Heterogeneity c.Integrityb.Fortress d.Defense in depth
Definition
 d.Defense in depth
Term
 The statement, “Information systems should be configured to require strong passwords”, is an example of a/an:a.Security requirement c.Security objectiveb.Security policy d.Security control
Definition
 b.Security policy
Term
 An organization wishes to purchase an application, and is undergoing a formal procurement process to evaluate and select a product. What documentation should the organization use to make sure that the application selected has the appropriate security-related characteristics?a.Security guidelines c.Security requirementsb.Security policies d.Functional requirements
Definition
 c.Security requirements
Term
 A security manager is developing a data classification policy. What elements need to be in the policy?a.Sensitivity levels, marking procedures, access procedures, and handling proceduresb.Labeling procedures, access procedures, and handling proceduresc.Sensitivity levels, access procedures, and handling proceduresd.Sensitivity levels and handling procedures
Definition
 a.Sensitivity levels, marking procedures, access procedures, and handling procedures
Term
 An employee with a previous criminal history was terminated. The former employee leaked several sensitive documents to the news media. To prevent this, the organization should have:a.Reviewed access logsb.Restricted the employee’s access to sensitive informationc.Obtained a signed non-disclosure statementd.Performed a background verification prior to hiring the employee
Definition
 d.Performed a background verification prior to hiring the employee
Term
 An organization recently underwent an audit of its financial applications. The audit report stated that there were several segregation of duties issues that were related to IT support of the application. What does this mean?a.IT personnel should not have access to financial datab.The duties of personnel are not formally definedc.IT needs to begin the practice of job rotationd.Individuals in IT have too many roles or privileges
Definition
 d.Individuals in IT have too many roles or privileges
Term
 An organization employs hundreds of office workers that use computers to perform their tasks. What is the best plan for informing employees about security issues?a.Include security policy in the employee handbookb.Perform security awareness training at the time of hire and annually thereafterc.Perform security awareness training at the time of hired.Require employees to sign the corporate security policy
Definition
 b.Perform security awareness training at the time of hire and annually thereafter
Term
 An information system that processes sensitive information is configured to require a valid userid and strong password from any user. This process of accepting and validating this information is known as:a.Authentication c.Two factor authenticationb.Strong authentication d.Single sign-on
Definition
 a.Authentication
Term
 All of the following are advantages of using self-signed SSL certificates EXCEPT:a.Server authentication c.Easier to createb.Lower cost d.More difficult to crack
Definition
 a.Server authentication
Term
 The best defense against a NOP sled attack is:a.Firewall c.The strcpy() functionb.Anti-virus d.Input boundary checking
Definition
 d.Input boundary checking
Term
 The instructions contained with an object are known as its:a.Class c.Codeb.Firmware d.Method
Definition
 d.Method
Term
 The purpose for putting a “canary” value in the stack is:a.To detect a dictionary attack c.To detect parameter tamperingb.To detect a stack smashing attack d.To detect script injection
Definition
 b.To detect a stack smashing attack
Term
 Rootkits can be difficult to detect because:a.They are encryptedb.They are polymorphicc.They reside in ROM instead of the hard drived.They use techniques to hide themselves
Definition
 d.They use techniques to hide themselves
Term
 An attack on a DNS server to implant forged “A” records is characteristic of a:a.Pharming attack c.Whaling attackb.Phishing attack d.Spim attack
Definition
 a.Pharming attack
Term
 An organization wants to prevent SQL and script injection attacks on its Internet web application. The organization should implement a/an:a.Intrusion detection system c.Application firewallb.Firewall d.SSL certificate
Definition
 c.Application firewall
Term
 A defense in depth strategy for anti-malware is recommended because:a.There are many malware attack vectorsb.Anti-virus software is often troublesome on end user workstationsc.Malware can hide in SSL transmissionsd.Users can defeat anti-malware on their workstations
Definition
 a.There are many malware attack vectors
Term
 The primary advantage of the use of workstation-based anti-virus is:a.Virus signature updates can be performed less oftenb.Virus signature updates can be performed more oftenc.The user can control its configurationd.This approach can defend against most, if not all, attack vectors
Definition
 d.This approach can defend against most, if not all, attack vectors
Term
 At the beginning of a disaster recovery planning project, the project team will be compiling a list of all of the organization’s most important business processes. This phase of the project is known as:a.Business Impact Analysisb.Risk Analysisc.Business Process Analysisd.Determination of maximum tolerable downtime (MTD)
Definition
Term
 In what sequence should a disaster recovery planning project be performed?a.Business Impact Analysis, Maximum Tolerable Downtime, Recovery Point Objective, Recovery Time Objective, training, testingb.Survey business processes, threat and risk analysis, develop recovery targets, criticality analysisc.Project plan, risk assessment, statements of impact, criticality analysis, recovery targets, test recovery plansd.Project plan, Business Impact Analysis, develop recovery plans, train personnel, test recovery plans
Definition
 d.Project plan, Business Impact Analysis, develop recovery plans, train personnel, test recovery plans
Term
 Benefits from disaster recovery and business continuity planning include all of the following EXCEPT:a.Improved system resilience c.Improved market advantageb.Process improvements d.Improved performance
Definition
 d.Improved performance
Term
 The types of BCP and DRP tests are:a.Document review, walkthrough, parallel test, cutover testb.Document review, walkthrough, simulation, parallel test, cutover testc.Document review, walkthrough, sanity test, parallel test, cutover testd.Walkthrough, simulation, parallel test, cutover test, live test
Definition
 b.Document review, walkthrough, simulation, parallel test, cutover test
Term
 The purpose of a parallel test is:a.To determine the ability to perform live business transactions on production systems instead of on backup systemsb.To determine the ability for a recovery test to be interruptedc.To determine the ability to perform live business transactions on production systems and backup systems at the same timed.To determine the ability for the last minute substitution of a recovery team
Definition
 c.To determine the ability to perform live business transactions on production systems and backup systems at the same time
Term
 The greatest risk related to a cutover test is:a.If backup servers do not function correctly, the test will failb.A cutover test tests only the live load and not the switchoverc.A cutover test tests only the switchover and not the live loadd.If backup servers do not function correctly, critical business processes may fail
Definition
 d.If backup servers do not function correctly, critical business processes may fail
Term
 An organization that is building a disaster recovery capability needs to re-engineer its application servers to meet new recovery requirements of 4 hour RPO and 24 hour RTO. Which of the following approaches will best meet this objective?a.Active/Passive server cluster with replicationb.Tape backup and restore to a hot sitec.Tape backup and restore to a cold sited.Server cluster with shared storage
Definition
 a.Active/Passive server cluster with replication
Term
 The purpose of a server cluster includes all of the following EXCEPT:a.Improve an application’s availability c.Increase an application’s data storageb.Increase an application’s capacity d.Provide fault tolerance
Definition
 c.Increase an application’s data storage
Term
 The purpose of off-site media storage is:a.To protect media from damage in the event of a disasterb.To protect media from theftc.To provide additional storage not available on-sited.To meet regulatory requirements for media protection
Definition
 a.To protect media from damage in the event of a disaster
Term
 An organization that is performing a disaster recovery planning project has determined that it needs to have on-site electric power available for as long as ten days, in the event of an electric utility failure. The best approach for this requirement is:a.Uninterruptible power supply (UPS) and power distribution unit (PDU)b.Electric generatorc.Uninterruptible power supply (UPS)d.Uninterruptible power supply (UPS) and electric generator
Definition
 d.Uninterruptible power supply (UPS) and electric generator
Term
 The first priority for disaster response should be:a.Backup media c.Personnel safetyb.Paper records d.Remote access
Definition
 c.Personnel safety
Term
 Which of the following would NOT be on a list of parties to notify in the event of a disaster-related emergency:a.Civil authorities c.Shareholdersb.Utilities d.Customers
Definition
 b.Utilities
Term
 Why is disaster recovery-related training a vital component in a DRP project?a.The plan will be able to be certifiedb.Recovery is performed by outside organizationsc.The personnel who are most familiar with systems may be unavailable during a disasterd.Personnel may be unfamiliar with recovery procedures
Definition
 c.The personnel who are most familiar with systems may be unavailable during a disaster
Term
 Public key cryptography is so-named because:a.It is the world standard for HTTPSb.It works on all popular computer operating systemsc.It uses an encryption key that can be released to the publicd.The encryption algorithms reside in the public domain
Definition
 c.It uses an encryption key that can be released to the public
Term
 A security manager is searching for an encryption algorithm to be used to encrypt data files containing sensitive information. Which of the following algorithms should NOT be considered:a.FISH c.Blowfishb.Twofish d.CAST
Definition
 a.FISH
Term
 A particular encryption algorithm transforms plaintext to ciphertext by XORing the plaintext with the encryption key. This is known as:a.Electronic codebook c.Block cipherb.Cipher block chaining d.Stream cipher
Definition
 d.Stream cipher
Term
 Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography. How should the parties begin?a.The receiving party should send its public encryption key to the transmitting partyb.Each party should exchange public encryption keysc.Each party should send the encryption key via the communications channel to the other partyd.One party should transmit the encryption key via an out of band communications channel to the other party
Definition
 d.One party should transmit the encryption key via an out of band communications channel to the other party
Term
 Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin?a.The receiving party should send its private encryption key to the transmitting party.b.The transmitting party should send its private encryption key to the receiving party.c.The receiving party should send its public encryption key to the transmitting party.d.The transmitting party should send its public encryption key to the receiving party.
Definition
 c.The receiving party should send its public encryption key to the transmitting party.
Term
 Two parties, Party A and Party B, regularly exchange messages using public key cryptography. One party, Party A, believes that its private encryption key has been compromised. What action should Party B take?a.Request a new public key from Party A c.Send a new public key to Party Ab.Request a new private key from Party A d.Send a new private key to Party A
Definition
 a.Request a new public key from Party A
Term
 The Advanced Encryption Standard is another name for which cipher:a.Digital Encryption Algorithm (DEA)b.3DESc.Rijndaeld.International Data Encryption Algorithm (IDEA)
Definition
 c.Rijndael
Term
 The Data Encryption Standard:a.Is used by Secure Sockets Layer (SSL)encryptionb.Has been replaced by the InternationalData Encryption Algorithm (IDEA)c.Uses a 64-bit encryption keyd.Uses a 56-bit encryption key
Definition
 d.Uses a 56-bit encryption key
Term
 Two parties are exchanging messages using public key cryptography. Which of the following statements describes the proper procedure for transmitting an encrypted message?a.The sender encrypts the message using the recipient’s public key, and the recipient decrypts the message using the recipient’s private keyb.The sender encrypts the message using the sender’s public key, and the recipient decrypts the message using the recipient’s public keyc.The sender encrypts the message using the sender’s private key, and the recipient decrypts the message using the recipient’s private keyd.The sender encrypts the message using the sender’s public key, and the recipient decrypts the message using the sender’s public key
Definition
 a.The sender encrypts the message using the recipient’s public key, and the recipient decrypts the message using the recipient’s private key
Term
 The purpose of digitally signing a message is to ensure:a.Integrity of the sender c.Authenticity of the senderb.Confidentiality of the message d.Confidentiality of the sender
Definition
 c.Authenticity of the sender
Term
 The purpose of digitally signing a message is to ensure:a.Integrity of the message c.Integrity of the senderb.Confidentiality of the message d.Confidentiality of the sender
Definition
 a.Integrity of the message
Term
 The purpose of the Diffie-Hellman key exchange protocol is:a.To decrypt a symmetric encryption keyb.To encrypt a symmetric encryption keyc.To permit two parties who have never communicated to establish public encryption keysd.To permit two parties who have never communicated to establish a secret encryption key
Definition
 d.To permit two parties who have never communicated to establish a secret encryption key
Term
 An attacker is attempting to learn the encryption key that is used to protect messages being sent between two parties. The attacker is able to create his own messages, get them encrypted by one of the parties, and can then examine the ciphertext for his message. This type of attack is known as:a.Ciphertext only attack c.Chosen plaintext attackb.Chosen ciphertext attack d.Man in the middle attack
Definition
 c.Chosen plaintext attack
Term
 Which is the best approach for two parties who wish to establish a means for confirming the confidentiality and integrity of messages that they exchange:a.Digital signatures c.Key exchangeb.Encryption and digital signatures d.Encryption
Definition
 b.Encryption and digital signatures
Supporting users have an ad free experience!