Shared Flashcard Set

Details

CIT 165 Ptest1
CIT
50
Computer Networking
Undergraduate 1
03/03/2015

Additional Computer Networking Flashcards

 


 

Cards

Term
What is the correct approach for addressing security and organization objectives?

a.Security and organization objectives should be developed separately

b.Security should drive organization objectives

c.Security should support support organization objectives

d.The site security officer should approve or reject organization objectives
Definition
c.Security should support support organization objectives
Term
The two components of risk management are:

a.Risk assessment and risk analysis

b.Vulnerability assessment and risk
treatment

c.Risk assessment and risk mitigation

d.Risk assessment and risk treatment
Definition
d.Risk assessment and risk treatment
Term
The impact of a specific threat is defined as:

a.The cost of recovering the asset

b.The cost required to protect the related asset

c.The effect of the threat if it is realized

d.The loss of revenue if it is realized
Definition
c.The effect of the threat if it is realized
Term
Exposure factor is defined as:

a.The part of an asset's value that is likely to be lost by a particular threat

b.The probability that the threat will be realized

c.The probability that a loss will occur in a year's time

d.The cost of a single loss
Definition
a.The part of an asset's value that is likely to be lost by a particular threat
Term
A security manager is performing a quantitative risk assessment on a particular asset. The security manager wants to determine the quantitative loss for a single loss based on a particular threat. The correct way to calculate this is:

a.Divide the asset's value by the exposure factor

b.Multiply the asset's value times the annualized rate of occurrence

c.Multiply the asset's value times the single loss expectancy

d.Multiply the asset's value times the exposure factor
Definition
d.Multiply the asset's value times the exposure factor
Term
A security manager is performing a quantitative risk assessment on a particular asset. The security manager wants to estimate the yearly loss based on a particular threat. The correct way to calculate this is::

a.Multiply the single loss expectancy times the asset's value

b.Multiply the asset's value times the exposure factor

c.Multiply the asset's value times the exposure factor times the single loss expectancy

d.Multiply the single loss expectancy times the annualized rate of occurrence
Definition
d.Multiply the single loss expectancy times the annualized rate of occurrence
Term
An organization suffered a virus outbreak when malware was download by an employee in a spam message. This outbreak might not have happened had the organization followed what security principle:

a.Heterogeneity

c.Integrity

b.Fortress

d.Defense in depth
Definition
d.Defense in depth
Term
The statement, “Information systems should be configured to require strong passwords”, is an example of a/an:

a.Security requirement

c.Security objective

b.Security policy

d.Security control
Definition
b.Security policy
Term
An organization wishes to purchase an application, and is undergoing a formal procurement process to evaluate and select a product. What documentation should the organization use to make sure that the application selected has the appropriate security-related characteristics?

a.Security guidelines

c.Security requirements

b.Security policies

d.Functional requirements
Definition
c.Security requirements
Term
A security manager is developing a data classification policy. What elements need to be in the policy?

a.Sensitivity levels, marking procedures,
access procedures, and handling procedures

b.Labeling procedures, access procedures, and handling procedures

c.Sensitivity levels, access procedures, and handling procedures

d.Sensitivity levels and handling procedures
Definition
a.Sensitivity levels, marking procedures, access procedures, and handling procedures
Term
An employee with a previous criminal history was terminated. The former employee leaked several sensitive documents to the news media. To prevent this, the organization should have:

a.Reviewed access logs

b.Restricted the employee’s access to sensitive information

c.Obtained a signed non-disclosure statement

d.Performed a background verification prior to hiring the employee
Definition
d.Performed a background verification prior to hiring the employee
Term
An organization recently underwent an audit of its financial applications. The audit report stated that there were several segregation of duties issues that were related to IT support of the application. What does this mean?

a.IT personnel should not have access to financial data

b.The duties of personnel are not formally defined

c.IT needs to begin the practice of job rotation

d.Individuals in IT have too many roles or privileges
Definition
d.Individuals in IT have too many roles or privileges
Term
An organization employs hundreds of office workers that use computers to perform their tasks. What is the best plan for informing employees about security issues?

a.Include security policy in the employee handbook

b.Perform security awareness training at the time of hire and annually thereafter

c.Perform security awareness training at the time of hire

d.Require employees to sign the corporate security policy
Definition
b.Perform security awareness training at the time of hire and annually thereafter
Term
An information system that processes sensitive information is configured to require a valid userid and strong password from any user. This process of accepting and validating this information is known as:

a.Authentication

c.Two factor authentication

b.Strong authentication

d.Single sign-on
Definition
a.Authentication
Term
All of the following are advantages of using self-signed SSL certificates EXCEPT:

a.Server authentication

c.Easier to create

b.Lower cost

d.More difficult to crack
Definition
a.Server authentication
Term
The best defense against a NOP sled attack is:

a.Firewall

c.The strcpy() function

b.Anti-virus

d.Input boundary checking
Definition
d.Input boundary checking
Term
The instructions contained with an object are known as its:


a.Class

c.Code

b.Firmware

d.Method
Definition
d.Method
Term
The purpose for putting a “canary” value in the stack is:

a.To detect a dictionary attack

c.To detect parameter tampering

b.To detect a stack smashing attack

d.To detect script injection
Definition
b.To detect a stack smashing attack
Term
Rootkits can be difficult to detect because:

a.They are encrypted

b.They are polymorphic

c.They reside in ROM instead of the hard drive

d.They use techniques to hide themselves
Definition
d.They use techniques to hide themselves
Term
An attack on a DNS server to implant forged “A” records is characteristic of a:

a.Pharming attack

c.Whaling attack

b.Phishing attack

d.Spim attack
Definition
a.Pharming attack
Term
An organization wants to prevent SQL and script injection attacks on its Internet web application. The organization should implement a/an:

a.Intrusion detection system

c.Application firewall

b.Firewall

d.SSL certificate
Definition
c.Application firewall
Term
A defense in depth strategy for anti-malware is recommended because:

a.There are many malware attack vectors

b.Anti-virus software is often troublesome on end user workstations

c.Malware can hide in SSL transmissions

d.Users can defeat anti-malware on their workstations
Definition
a.There are many malware attack vectors
Term
The primary advantage of the use of workstation-based anti-virus is:

a.Virus signature updates can be performed less often

b.Virus signature updates can be performed more often

c.The user can control its configuration

d.This approach can defend against most, if not all, attack vectors
Definition
d.This approach can defend against most, if not all, attack vectors
Term
At the beginning of a disaster recovery planning project, the project team will be compiling a list of all of the organization’s most important business processes. This phase of the project is known as:

a.Business Impact Analysis

b.Risk Analysis

c.Business Process Analysis

d.Determination of maximum tolerable
downtime (MTD)
Definition
a.Business Impact Analysis
Term
In what sequence should a disaster recovery planning project be performed?

a.Business Impact Analysis, Maximum Tolerable Downtime, Recovery Point Objective, Recovery Time Objective, training, testing

b.Survey business processes, threat and risk analysis, develop recovery targets, criticality analysis

c.Project plan, risk assessment, statements of impact, criticality analysis, recovery targets, test recovery plans

d.Project plan, Business Impact Analysis, develop recovery plans, train personnel, test recovery plans
Definition
d.Project plan, Business Impact Analysis, develop recovery plans, train personnel, test recovery plans
Term
Benefits from disaster recovery and business continuity planning include all of the following EXCEPT:

a.Improved system resilience

c.Improved market advantage

b.Process improvements

d.Improved performance
Definition
d.Improved performance
Term
The types of BCP and DRP tests are:

a.Document review, walkthrough, parallel test, cutover test

b.Document review, walkthrough, simulation, parallel test, cutover test

c.Document review, walkthrough, sanity test, parallel test, cutover test

d.Walkthrough, simulation, parallel test, cutover test, live test
Definition
b.Document review, walkthrough, simulation, parallel test, cutover test
Term
The purpose of a parallel test is:

a.To determine the ability to perform live business transactions on production systems instead of on backup systems

b.To determine the ability for a recovery test to be interrupted

c.To determine the ability to perform live business transactions on production systems and backup systems at the same time

d.To determine the ability for the last minute substitution of a recovery team
Definition
c.To determine the ability to perform live business transactions on production systems and backup systems at the same time
Term
The greatest risk related to a cutover test is:

a.If backup servers do not function correctly, the test will fail

b.A cutover test tests only the live load and not the switchover

c.A cutover test tests only the switchover and not the live load

d.If backup servers do not function correctly, critical business processes may fail
Definition
d.If backup servers do not function correctly, critical business processes may fail
Term
An organization that is building a disaster recovery capability needs to re-engineer its application servers to meet new recovery requirements of 4 hour RPO and 24 hour RTO. Which of the following approaches will best meet this objective?

a.Active/Passive server cluster with replication

b.Tape backup and restore to a hot site

c.Tape backup and restore to a cold site

d.Server cluster with shared storage
Definition
a.Active/Passive server cluster with replication
Term
The purpose of a server cluster includes all of the following EXCEPT:

a.Improve an application’s availability

c.Increase an application’s data storage

b.Increase an application’s capacity

d.Provide fault tolerance
Definition
c.Increase an application’s data storage
Term
The purpose of off-site media storage is:

a.To protect media from damage in the event of a disaster

b.To protect media from theft

c.To provide additional storage not available on-site

d.To meet regulatory requirements for media protection
Definition
a.To protect media from damage in the event of a disaster
Term
An organization that is performing a disaster recovery planning project has determined that it needs to have on-site electric power available for as long as ten days, in the event of an electric utility failure. The best approach for this requirement is:

a.Uninterruptible power supply (UPS) and power distribution unit (PDU)

b.Electric generator

c.Uninterruptible power supply (UPS)

d.Uninterruptible power supply (UPS) and electric generator
Definition
d.Uninterruptible power supply (UPS) and electric generator
Term
The first priority for disaster response should be:

a.Backup media

c.Personnel safety

b.Paper records

d.Remote access
Definition
c.Personnel safety
Term
Which of the following would NOT be on a list of parties to notify in the event of a disaster-related emergency:

a.Civil authorities

c.Shareholders

b.Utilities

d.Customers
Definition
b.Utilities
Term
Why is disaster recovery-related training a vital component in a DRP project?

a.The plan will be able to be certified

b.Recovery is performed by outside organizations

c.The personnel who are most familiar with systems may be unavailable during a disaster

d.Personnel may be unfamiliar with recovery procedures
Definition
c.The personnel who are most familiar with systems may be unavailable during a disaster
Term
Public key cryptography is so-named because:

a.It is the world standard for HTTPS

b.It works on all popular computer operating systems

c.It uses an encryption key that can be released to the public

d.The encryption algorithms reside in the public domain
Definition
c.It uses an encryption key that can be released to the public
Term
A security manager is searching for an encryption algorithm to be used to encrypt data files containing sensitive information. Which of the following algorithms should NOT be considered:

a.FISH

c.Blowfish

b.Twofish

d.CAST
Definition
a.FISH
Term
A particular encryption algorithm transforms plaintext to ciphertext by XORing the plaintext with the encryption key. This is known as:

a.Electronic codebook

c.Block cipher

b.Cipher block chaining

d.Stream cipher
Definition
d.Stream cipher
Term
Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography. How should the parties begin?

a.The receiving party should send its public encryption key to the transmitting party

b.Each party should exchange public encryption keys

c.Each party should send the encryption key via the communications channel to the other party

d.One party should transmit the encryption key via an out of band communications channel to the other party
Definition
d.One party should transmit the encryption key via an out of band communications channel to the other party
Term
Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin?

a.The receiving party should send its private encryption key to the transmitting party.

b.The transmitting party should send its private encryption key to the receiving party.

c.The receiving party should send its public encryption key to the transmitting party.

d.The transmitting party should send its public encryption key to the receiving party.
Definition
c.The receiving party should send its public encryption key to the transmitting party.
Term
Two parties, Party A and Party B, regularly exchange messages using public key cryptography. One party, Party A, believes that its private encryption key has been compromised. What action should Party B take?

a.Request a new public key from Party A

c.Send a new public key to Party A

b.Request a new private key from Party A

d.Send a new private key to Party A
Definition
a.Request a new public key from Party A
Term
The Advanced Encryption Standard is another name for which cipher:

a.Digital Encryption Algorithm (DEA)

b.3DES

c.Rijndael

d.International Data Encryption Algorithm (IDEA)
Definition
c.Rijndael
Term
The Data Encryption Standard:

a.Is used by Secure Sockets Layer (SSL)
encryption

b.Has been replaced by the International
Data Encryption Algorithm (IDEA)

c.Uses a 64-bit encryption key

d.Uses a 56-bit encryption key
Definition
d.Uses a 56-bit encryption key
Term
Two parties are exchanging messages using public key cryptography. Which of the following statements describes the proper procedure for transmitting an encrypted message?

a.The sender encrypts the message using the recipient’s public key, and the recipient decrypts the message using the recipient’s private key

b.The sender encrypts the message using the sender’s public key, and the recipient decrypts the message using the recipient’s public key

c.The sender encrypts the message using the sender’s private key, and the recipient decrypts the message using the recipient’s private key

d.The sender encrypts the message using the sender’s public key, and the recipient decrypts the message using the sender’s public key
Definition
a.The sender encrypts the message using the recipient’s public key, and the recipient decrypts the message using the recipient’s private key
Term
The purpose of digitally signing a message is to ensure:

a.Integrity of the sender

c.Authenticity of the sender

b.Confidentiality of the message

d.Confidentiality of the sender
Definition
c.Authenticity of the sender
Term
The purpose of digitally signing a message is to ensure:

a.Integrity of the message

c.Integrity of the sender

b.Confidentiality of the message

d.Confidentiality of the sender
Definition
a.Integrity of the message
Term
The purpose of the Diffie-Hellman key exchange protocol is:

a.To decrypt a symmetric encryption key

b.To encrypt a symmetric encryption key

c.To permit two parties who have never communicated to establish public encryption keys

d.To permit two parties who have never communicated to establish a secret encryption key
Definition
d.To permit two parties who have never communicated to establish a secret encryption key
Term
An attacker is attempting to learn the encryption key that is used to protect messages being sent between two parties. The attacker is able to create his own messages, get them encrypted by one of the parties, and can then examine the ciphertext for his message. This type of attack is known as:

a.Ciphertext only attack

c.Chosen plaintext attack

b.Chosen ciphertext attack

d.Man in the middle attack
Definition
c.Chosen plaintext attack
Term
Which is the best approach for two parties who wish to establish a means for confirming the confidentiality and integrity of messages that they exchange:

a.Digital signatures

c.Key exchange

b.Encryption and digital signatures

d.Encryption
Definition
b.Encryption and digital signatures
Supporting users have an ad free experience!