Application In Information Security Chapter 4
A(n) ______ is used to prevent cars from ramming a building
Bollard
True or False? A retina pattern system is an eye recognition system that matches the person's blood vessels on the back of the eye.
False
True or False? Physical security is less important than logical security
False
True or False? A fence should limit an intruder's access to a facility as well as provide a psychological barrier.
True
True or False? In the field of IT security, the concept of defense in depth is layering more than one control on another
True
Which of the following statements is true regarding wireless networks (WLANs)? a. Wireless networks open the company to risks not found in a wired network. b. Wireless access points are extremely expensive. c. Wireless access points are difficult for all but the foremost experts to configure. d. WLAN infrastructures are free from inherent threats and vulnerabilities.
a. Wireless networks open the company to risks not found in a wired network.
The __________ tool is used for packet capturing of raw 802.11 frames. a. airodump-ng b. aircrack-ng c. aireplay-ng d. airmon-ng
a. airodump-ng
It is critical to use encryption techniques on a wireless LAN because the data payload within IP packets, including logons, passwords, and privacy data, would otherwise: a. appear in cleartext. b. appear as hypertext. c. be unfiltered. d. be captured.
a. appear in cleartext.
Although both guards and dogs are good for physical security, which of the following more commonly applies to dogs? a. liability b. discernment c. dual role d. multifunction
a. liability
During an assessment, you discovered that the target company was using a fax machine. Which of the following is the LEAST important? a. phone number is publicly available b. fax machine is in open, unsecured area c. faxes frequently sit in printer tray d. fax machine uses a ribbion
a. phone number is publicly available
Which of the following is a suite of WLAN auditing tools that can be used to compromise WLAN security implementations? a. Kali b. Aircrack-ng c. Airmon-ng d. Airodump-ng
b. Aircrack-ng
Which of the following is an encryption method that has 128-bits of encryption and is a subset of IEEE 802.11i? a. WPA2 (WiFi Protected Access 2) b. WPA (WiFi Protected Access) c. WEP (Wired Equivalent Privacy) d. SSID (Service Set Identifier)
b. WPA (WiFi Protected Access)
The __________ tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. a. airodump-ng b. aircrack-ng c. aireplay-ng d. airmon-ng
b. aircrack-ng
Which type of biometric system is frequently found on laptops? a. retina b. fingerprint c. iris d. voice recognition
b. fingerprint
For a fence to deter a determined intruder, it should be at least ____ ft tall a. 4 b. 5 c. 8 d. 10
c. 8
________ is a common physical control that can be used as both detective and reactive tool A. fence B. alarm C. CCTV D. Lock
c. CCTV
What grade of lock would be appropriate to protect a critical business asset a. Grade 4 b. Grade 2 c. Grade 1 d. Grade 3
c. grade 1
At the end of the lab, you drafted a WLAN __________ to mitigate the risk, threats, and vulnerabilities identified by the lab. a. summary assessment b. security progress report c. security implementation plan d. capture file
c. security implementation plan
Which of the following statements is true regarding security countermeasures on your wireless access point (WAP)? a. MAC address filtering on the WAPs should be disabled. b. SSID broadcast should be enabled. c. WPA2 should be disabled. d. Hashing should be used for data transmissions and e-mails through WLANs
d. Hashing should be used for data transmissions and e-mails through WLANs
_________ is an intrusion detection system used exclusively in conjunction with fences a. infrared wave pattern b. motion detector c. RFID d. PIDAS
d. PIDAS
A type II error is known as what? a. false rejection rate b. failure rate c. crossover error rate d. false acceptance rate
d. false acceptance rate
______ defines camera's effectiveness in viewing objects from horizontal and vertical view a. granularity b. ability to zoom c. field of view d. focal length
d. focal length
What do lock pick sets typically contain, at a min? a. tension wrenches and drivers b. a pick c. pick and driver d. pick and tension wrench
d. pick and tension wrench