infosex 2
What type of application attack occurs when data goes beyond the memory areas allocated to the application?
buffer overflow
What technology should you implement to ensure that an individual cannot later claim that he or she did not sign a given document?
digital signature
What kind of integrity does a database have when all its rows have a unique identifier called a primary key?
entity integrity
A user has a large amount of data that needs to be kept confidential. Which algorithm would best meet this requirement?
3DES
Which algorithm will Windows use by default when a user intends to encrypt files and folders in an NTFS volume?
AES
An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
Availability
What vulnerability occurs when data is written beyond the memory areas allocated to an application?
Buffer overflow
An organization's IT department reports that their web server is receiving an abnormally high number of web page requests from different locations simultaneously. What type of security attack is occurring?
Ddos
A security specialist is asked for advice on a security measure to prevent unauthorized hosts from accessing the home network of employees. Which measure would be most effective?
Implement a firewall.
Which of the following firewalls filters traffic based on source and destination IP addresses?
Network layer firewall
Which of the following firewalls filters web content requests such as URLs and domain names?
Proxy server
You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select?
SHA-256
Which protocol would be used to provide security for employees that access systems remotely from home?
SSH
What is a feature of a cryptographic hash function?
The hash function is a one-way mathematical function.
Passwords, passphrases, and PINs are examples of which security term?
authentication
What is the most difficult part of designing a cryptosystem?
key management
Which methods can be used to implement multifactor authentication?
passwords and fingerprints
What technique creates different hashes for the same password?
salting
What is a nontechnical method that a cybercriminal would use to gather sensitive information from an organization?
social engineering
Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network?
worm