FINAL CH: 5,7,9,10

¡Supera tus tareas y exámenes ahora con Quizwiz!

Henry is created a firewall rule that will allow inbound mail to the organization. What TCP port must he allow through the firewall

25

Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of access control is Ed concerned about

Accountability

Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?

Alice's public key

Ricky is reviewing security logs to independently assess security controls. Which security review process is Ricky engaging in

Audit

Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works?

Chosen plaintext

Which characteristic of a biometric system measures the system's accuracy using a balance of different error types?

Crossover Error rate

Betty receives a cipher text message from her colleague Tim. What type of function does Betty need to use to read the plaintext message?

Decryption

What information should an auditor share with the client during an exit interview

Details on major issues

Temporal isolation is commonly used in combination with rule-based access control

False

An SOC 1 report primarily focuses on security.

False Internal controls over financial reporting

Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion alert each time that an administrator connects to a server using Secure Shell (SSH). What type of error is occurring?

False positive error

The four main types of logs that you need to keep to support security auditing include event, access, user, and security.

False. Event, Access, Security and Audit logs

Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network should be replaced to alleviate these issues.

Hub

Which of the following is not a benefit of cloud computing to organizations?

Lower dependence on outside vendors

Which one of the following is not an advantage of biometric systems

Physical characteristics may change

Which approach to cryptography provides the strongest theoretical protection

Quantum Cryptography

What firewall approach is shown in the figure?

Screened subnet

What type of network device normally connects directly to endpoints and uses MAC-based filtering to limit traffic flows

Switch

What type of security monitoring tool would be most likely to identify an unauthorized change to a computer system?

System integrity monitoring

A digitized signature is a combination of a strong hash of a message and a secrete key

True

A firewall is a basic network security defense tool

True

A salt value is a set of random characters you can combine with an actual input key to create the encryption key

True

A trusted operating system provides features that satisfy specific government requirements for security

True

Anomaly-based intrusion detection systems compare current activity with stored profiles of normal (expected) activity.

True

Digital signatures require asymmetric key cryptography

True

Many jurisdictions require audits by law.

True

Message authentication confirms the identity of the person who started a correspondence

True

Single Sin on can provide for stronger passwords because with only one password to remember users are generally willing to use stronger passwords

True

The hash message authentication code is a hash function that uses a key to create a hash or message digest

True

Which one of the following is NOT a commonly accepted best practice for password security

Use at least six alphanumeric characters

What standard is NOT secure and should never be used on modern wireless networks

Wired Equivalent Privacy (WEP)

Gina is preparing to monitor network activity using packet sniffing. Which technology is most likely to interfere with this effort if used on the network?

Secure Sockets Layer (SSL)

A wirelss access point (WAP) is the connection between a wired and wireless network

True

The DHE algorithm is the basis for several common key exchange protocols including Diffie Hellman in Ephemeral mode and Elliptic Curve DHE

True

What is NOT a symmetric encryption algorithm

(RSA)

Henry's last firewall rule must allow inbound access to a Windows Terminal Server. What port must he allow?

3389

Henry would like to create a different firewall rule that allows encrypted web traffic to reach a web server. What port is used for that communication

443

An SOC 1 report is commonly implemented for organizations that must comply with Sarbanes-Oxley (SOX) or the Gramm-Leach-Bliley Act (GLBA).

True.

SOC 2 reports are created for internal and other authorized stakeholders and are commonly implemented for service providers, hosted data centers, and managed cloud computing providers.

True. Security (confidentiality, integrity, availability) and privacy controls Management, regulators, stakeholders. This is commonly implemented for service providers, hosted data centers, and managed cloud computing providers.

Passphrases are less secure than passwords.

false

Barbara is investigating an attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place?

smurf

Which information security objective allows trusted entities to endorse information

Certification

Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key?

Diffie Hellman

Gary would like to choose an access control model in which the owner of a resource decides who may modify permissions on that resource. Which model fits that scenario?

Discretionary access control(DAC)

The four central components of access control are users, resources, action and features

False

Committee of Sponsoring Organizations (COSO) is a set of best practices for IT management.

False. Committee of Sponsoring Organizations (COSO) - This organization gives guidance to executive management and governance entities on critical aspects of organizational governance, business ethics, internal control, enterprise risk management, fraud, and financial reporting.

An auditing benchmark is the standard by which a system is compared to determine whether it is securely configured.

True

A packet filtering firewall remembers information about the status of a network communication

false

A report indicates that a system's disk is 80 percent full is a good indication that something is wrong with that system.

false

DIAMETER is a research and development project funded by the European Commission.

false

Implicit deny is when firewalls look at message addresses to determine whether a message is being sent around an unending loop

false

IP addresses are eight-byte addresses that uniquely identify every device on the network

false 32 bits

What type of firewall security feature limits the volume of traffic from individual hosts?

flood guard

Which type of authentication includes smart cards

ownership

Hilda is troubleshooting a problem with the encryption of data. At which layer of the OSI Reference Model is she working?

presentation

After audit activities are completed, auditors perform data analysis.

true

Content dependent access control requires the access control mechanism to look at the data to decide who should get to see it

true

In a known-plaintext attack (KPA) the cryptanalyst has access only to a segment of encrypted data, and has no choice as to what the data might be

False

TCP/IP is a suite of protocols that operates at both the Network and Transport layers of the OSI Reference Model.

True

A smart card is a token like a cred card that contains one or more microprocessor chips that accept store and send information through a reader

true


Conjuntos de estudio relacionados

Object Oriented Programming Interview Questions

View Set

Ch 40: Management of Patients with Gastric and Duodenal Disorders

View Set

chapter 2 biology and psychology

View Set

What side is the major county on? (Axis or Allies)

View Set

Lecture 1: Ch 5: Intro to Operant Conditioning

View Set