Security + 250 Questions
Passive tags have ranges from about 1/3 inch to ____ feet. a. 12 c. 19 b. 15 d. 25
19
There are almost ____ different Microsoft Windows file extensions that could contain a virus. a. 50 c. 70 b. 60 d. 80
70
Approximately ____ percent of households in the United States use the Internet for managing their finances. a. 60 c. 80 b. 70 d. 90
80
____ is the probability that a risk will occur in a particular year. a. SLE c. ARO b. ALE d. EF
ARO
The default root directory of the Microsoft Internet Information Services (IIS) Web server is ____. a. /var/www c. /var/html b. C:\Inetpub\ wwwroot d. /etc/var/www
C:\Inetpub\ wwwroot
Using video cameras to transmit a signal to a specific and limited set of receivers is called ____. a. CCTV c. IPTV b. ICTV d. ITV
CCTV
____ is a system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected. a. IDS c. LLP b. ADP d. DLP
DLP
When TCP/IP was developed, the host table concept was expanded to a hierarchical name system for matching computer names and numbers known as the ____. a. HTTP c. URNS b. NSDB d. DNS
DNS
The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry. a. DNS spooking c. DNS bonding b. DNS poisoning d. DNS blacklisting
DNS poisoning
____ substitutes DNS addresses so that the computer is automatically redirected to another device. a. DNS poisoning c. DNS marking b. Phishing d. DNS overloading
DNS poisoning
____ is the proportion of an asset's value that is likely to be destroyed by a particular risk. a. SLE c. EF b. ARO d. ER
EF
The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information. a. Gramm-Leach-Bliley c. California Database Security Breach b. Sarbanes-Oxley d. USA Patriot
Gramm-Leach-Bliley Security Breach
The ____ is part of an HTTP packet that is composed of fields that contain the different characteristics of the data being transmitted. a. HTTP header c. XML header b. HTML header d. SSL header
HTTP header
ID badges that can be detected by a proximity reader are often fitted with tiny radio ____ tags. a. wave c. AFID b. pulse d. RFID
RFID
Released in 1995, one of the first tools that was widely used for penetration testing was ____. a. GOPHER c. SATAN b. SAINT d. NESSUS
SATAN
The ____ is the expected monetary loss every time a risk occurs. a. SLE c. ALE b. ARO d. SRE
SLE
____ is a language used to view and manipulate data that is stored in a relational database. a. C c. SQL b. DQL d. ISL
SQL
A(n) ____ encrypts all data that is transmitted between the remote device and the network. a. IKE tunnel c. endpoint b. VPN d. router
VPN
____ is for the transport and storage of data, with the focus on what the data is. a. XML c. SGML b. HTML d. SML
XML
____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user. a. Adware c. Spam b. Keylogger d. Trojan
adware
In information security, a loss can be ____. a. theft of information b. a delay in transmitting information that results in a financial penalty c. the loss of good will or a reputation d. all of the above
all of the above
The ____ for software is the code that can be executed by unauthorized users. a. vulnerability surface c. input surface b. risk profile d. attack surface
attack surface
____ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter. a. Encryption c. Authorization b. Authentication d. Accounting
authentication
A ____ outlines the major security considerations for a system and becomes the starting point for solid security. a. profile c. control b. threat d. baseline
baseline
A ____ outlines the major security considerations for a system and becomes the starting point for solid security. a. reference c. profile b. baseline d. minimum
baseline
A ____ virus infects the Master Boot Record of a hard disk drive. a. file infector c. resident b. companion d. boot
boot
In information security, an example of a threat agent can be ____. a. a force of nature such as a tornado that could destroy computer equipment b. a virus that attacks a computer network c. an unsecured computer network d. both a and b
both a and b
A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object. a. U-lock c. shield lock b. safe lock d. cable lock
cable lock
A(n) ____ indicates that no process is listening at this port. a. open port c. closed address b. open address d. closed port
closed port
While the code for a program is being written, it is being analyzed by a ____. a. black box c. white box b. code review d. scanner
code review
A(n) ____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program. a. macro c. boot b. metamorphic d. companion
companion
____ ensures that only authorized parties can view information. a. Security c. Integrity b. Availability d. Confidentiality
confidentiality
____ is defined as a security analysis of the transaction within its approved context. a. Content aggregation c. Content delivery b. Content inspection d. Content management
content inspection
Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information is sometimes known as ____. a. spam c. cybercrime b. phishing d. cyberterrorism
cybercrime
____ are a loose-knit network of attackers, identity thieves, and financial fraudsters. a. Cybercriminals c. Computer spies b. Cyberterrorists d. Hackers
cybercriminals
Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire. a. identity c. plan b. data d. record
data
A client-side attack that results in a user's computer becoming compromised just by viewing a Web page and not even clicking any content is known as a ____. a. buffer overflow c. denial of service b. drive-by-download d. stack underflow
drive-by-download
A(n) ____ refers to an undocumented, yet benign, hidden feature, that launches by entering a set of special commands, key combinations, or mouse clicks. a. Trojan horse c. bug b. virus d. Easter egg
easter egg
Securing a restricted area by erecting a barrier is called ____. a. blocking c. fencing b. boundary placement d. moating
fencing
A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers. a. IPS c. firewall b. scanner d. honeypot
firewall
____ uses "speckling" and different colors so that no two spam e-mails appear to be the same. a. GIF layering c. Word splitting b. Geometric variance d. Layer variance
geometric variance
____ is an image spam that is divided into multiple images. a. Word splitting c. Layer variance b. Geometric variance d. GIF layering
gif layering
In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer. a. heuristic detection c. hybrid detection b. pattern detection d. combination detection
heuristic detection
A ____ is a network set up with intentional vulnerabilities. a. honeynet c. honeycomb b. honeypot d. honey hole
honeynet
A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, yet they are actually imitations of real data files. a. port scanner c. honeypot b. write blocker d. honeycomb
honeypot
A ____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment. a. switch c. firewall b. router d. hub
hub
A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks. a. rootkit c. program b. macro d. process
macro
An information security ____ position focuses on the administration and management of plans, policies, and people. a. manager c. auditor b. engineer d. inspector
manager
A ____ is designed to separate a nonsecured area from a secured area. a. lockout c. closet b. mantrap d. pit
mantrap
____ is a means by which an organization can transfer the risk to a third party who can demonstrate a higher capability at managing or reducing risks. a. Insourcing c. Outcasting b. Outsourcing d. Inhousing
outsourcing
A ____ virus infects program executable files. a. macro c. companion b. program d. boot sector
program
A(n) ____ is hardware or software that captures packets to decode and analyze its contents. a. application analyzer c. threat profiler b. protocol analyzer d. system analyzer
protocol analyzer
The signal from an ID badge is detected as the owner moves near a ____, which receives the signal. a. proximity reader c. barcode scanner b. mantrap d. magnetic scanner
proximity reader
A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user. a. proxy server c. VPN server b. DNS server d. telnet server
proxy server
A ____ attack is similar to a passive man-in-the-middle attack. a. replay c. denial b. hijacking d. buffer overflow
replay
Viruses and worms are said to be self-____. a. duplicating c. copying b. updating d. replicating
replicating
A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system. a. companion c. resident b. file infector d. boot
resident
A ____ is an independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it. a. bollard c. roller barrier b. fence d. top hat
roller barrier
Users who access a Web server are usually restricted to the ____ directory. a. top c. root b. base d. tap
root
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms. a. rootkit c. wrapper b. backdoor d. shield
rootkit
A ____ is a network device that can forward packets across computer networks. a. switch c. bridge b. router d. firewall
router
The position of ____ is generally an entry-level position for a person who has the necessary technical skills. a. security technician c. CISO b. security administrator d. security manager
security technician
In Microsoft Windows, a ____ is a collection of security configuration settings. a. security baseline c. security summary b. security reference d. security template
security template
A ____ is software that is a cumulative package of all security updates plus additional features. a. feature pack c. service pack b. roll-up d. patch
service pack
Layer 5 of the OSI model is the ____ layer. a. Network c. Session b. Data Link d. Presentation
session
____ is an attack in which an attacker attempts to impersonate the user by using his session token. a. Session replay c. Session hijacking b. Session spoofing d. Session blocking
session hijacking
Examining network traffic, activity, transactions, or behavior and looking for well-known patterns is known as ____-based monitoring a. application c. packet b. protocol d. signature
signature
____ is when an attacker tricks users into giving out information or performing a compromising action. a. Phreaking c. Social engineering b. Hacking d. Reverse engineering
social engineering
What is another name for unsolicited e-mail messages? a. spam c. trash b. spawn d. scam
spam
An anti-climb collar is a ____ that extends horizontally for up to 3 feet (1 meter) from the pole to prevent anyone from climbing. a. flat collar c. slippery collar b. spiked collar d. sharp collar
spiked collar
In a(n) ____ infection, a virus injects itself into the program's executable code instead of at the end of the file. a. stealth c. Swiss cheese b. appender d. split
swiss cheese
HTML is a markup language that uses specific ____ embedded in brackets. a. blocks c. taps b. marks d. tags
tags
____ use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated. a. Lockout sensors c. Tailgate sensors b. Engineering sensors d. Proximity sensors
tailgate sensors
The end product of a penetration test is the penetration ____. a. test profile c. test system b. test report d. test view
test report
The goal of ____ is to better understand who the attackers are, why they attack, and what types of attacks might occur. a. threat mitigation c. risk modeling b. threat profiling d. threat modeling
threat modeling
A ____ is a program advertised as performing one activity but actually does something else. a. script c. Trojan b. virus d. worm
trojan
A computer ____ is malicious computer code that reproduces itself on the same computer. a. virus c. adware b. worm d. spyware
virus
Unlike other malware, a ____ is heavily dependent upon the user for its survival. a. Trojan c. rootkit b. worm d. virus
virus
The two types of malware that have the primary objective of spreading are ____. a. viruses and worms c. Trojans and worms b. rootkits and worms d. rootkits and Trojans
viruses and worms
A ____ tester has an in-depth knowledge of the network and systems being tested, including network diagrams, IP addresses, and even the source code of custom applications. a. white box c. replay b. black box d. system
white box
What is the maximum fine for those who wrongfully disclose individually identifiable health information with the intent to sell it? a. $100,000 c. $500,000 b. $250,000 d. $1,000,000
$250,000
The expression ____ up one directory level. a. ;/traverses c. %20/traverses b. ./traverses d. ../ traverses
../traverses
For a Web server's Linux system, the default root directory is typically ____. a. /var/www c. /var/root b. C:\inetpub\wwwroot d. /home/root
/var/www c.
In MD5, the length of a message is padded to ____ bits. a. 32 c. 128 b. 64 d. 512
512
____ involves horizontally separating words, although it is still readable by the human eye. a. Word splitting c. Geometric variance b. GIF layering d. Layer variance
word splitting
____ switches are connected directly to the devices on a network. a. Workgroup c. Core b. Distribution d. Intermediate
workgroup
The SSID can generally be any alphanumeric string from 2 to ___ characters. a. 23 c. 32 b. 28 d. 34
32
According to the Federal Bureau of Investigation (FBI), almost ____ percent of crimes committed today leave behind digital evidence that can be retrieved through computer forensics. a. 65 c. 85 b. 75 d. 95
85
____ is using a single authentication credential that is shared across multiple networks. a. Access management c. Identity management b. Authorization management d. Risk management
identity management
____ is the planning, coordination, communications, and planning functions that are needed in order to resolve an incident in an efficient manner. a. Incident reporting c. Incident planning b. Incident management d. Incident handling
incident handling
____ can be defined as the "framework" and functions required to enable incident response and incident handling within an organization. a. Incident reporting c. Incident handling b. Incident management d. Incident planning
incident management
____ may be defined as the components required to identify, analyze, and contain that incident. a. Vulnerability response c. Risk response b. Incident response d. Threat response
incident response
The term ____ is frequently used to describe the tasks of securing information that is in a digital format. a. network security c. physical security b. information security d. logical security
information security
____ ensures that information is correct and that no unauthorized person or malicious software has altered that data. a. Availability c. Integrity b. Confidentiality d. Identity
integrity
One of the most famous ancient cryptographers was ____. a. Albert Einstein c. Julius Caesar b. Isaac Newton d. Caesar Augustus
julius caesar
____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users. a. Aurora c. CHAP b. Kerberos d. TACACS
kerberos
____ learners learn through a lab environment or other hands-on approaches. a. Visual c. Kinesthetic b. Auditory d. Spatial
kinesthetic
NTRUEncrypt uses ____ cryptography that relies on a set of points in space. a. matrix-based c. linear b. lattice-based d. quantum
lattice-based
____ is a technology that can help to evenly distribute work across a network. a. Stateful packet filtering c. DNS caching b. Load balancing d. DNS poisoning
load balancing
____ can be prewired for electrical power as well as wired network connections. a. Locking cabinets c. Locking drawers b. Fences d. Desks
locking cabinets
Broadcast storms can be prevented with ____. a. spanning tree c. 802.11x b. Dijkstra's algorithm d. loop protection
loop protection
The single most expensive malicious attack was the 2000 ____, which cost an estimated $8.7 billion. a. Nimda c. Love Bug b. Slammer d. Code Red
love bug
____ are values that are attributed to a system of beliefs that help the individual distinguish right from wrong. a. Morals c. Standards b. Ethics d. Morays
morals
The most popular attack toolkit, which has almost half of the attacker toolkit market is ____. a. SpyEye c. ZeuS b. NeoSploit d. MPack
mpack
Layer 3 of the OSI model is the ____ layer. a. Network c. Session b. Data Link d. Presentation
network
Routers operate at the ____ Layer. a. Transport c. Presentation b. Application d. Network
network
IP is the protocol that functions primarily at the Open Systems Interconnection (OSI) ____. a. Transport Layer c. Data link Layer b. Network Layer d. Presentation Layer
network layer
Due to the limitations of online guessing, most password attacks today use ____. a. offline cracking c. hash replay b. online cracking d. token replay
offline cracking
The action that is taken by the subject over the object is called a(n) ____. a. authorization c. control b. access d. operation
operation
____ accounts are user accounts that remain active after an employee has left an organization. a. Active c. Orphaned b. Stale d. Fragmented
orphaned
A ____ is a secret combination of letters, numbers, and/or characters that only the user should know. a. token c. biometric detail b. password d. challenge
password
____ certificates are frequently used to secure e-mail transmissions and typically only require the user's name and e-mail address in order to receive this certificate. a. Private digital c. Public digital b. Personal digital d. Server digital
personal digital
____ is text that has no formatting (such as bolding or underlining) applied. a. Plaintext c. Simpletext b. Plain text d. Simple text
plain text
A ____ is a document that outlines specific requirements or rules that must be met. a. procedure c. guideline b. standard d. policy
policy
A ____ is a number divisible only by itself and 1. a. prime number c. compound number b. prime decimal d. neutral number
prime number
A(n) ____ policy outlines how the organization uses personal information it collects. a. VPN c. encryption b. network d. privacy
privacy
____ IP addresses are IP addresses that are not assigned to any specific user or organization. a. Public c. Public domain b. Private d. Private domain
private
Symmetric encryption is also called ____ cryptography. a. private key c. symmetric key b. public key d. shared key
private key
A(n) ____ can also capture transmissions that contain passwords. a. application analyzer c. function analyzer b. system analyzer d. protocol analyzer
protocol analyzer
The ____ provides recommended baseline security requirements for the use and operation of CA, RA, and other PKI components. a. DP c. LP b. CP d. AP
CP
In order to allow untrusted outside users access to resources such as Web servers, most networks employ a ____. a. bastion c. DMZ b. choke d. reduction point
DMZ
The ____ is a database, organized as a hierarchy or tree, of the name of each site on the Internet and its corresponding IP number. a. WINS c. TACACS+ b. NIS d. DNS
DNS
A ____ can create entries in a log for all queries that are received. a. network log c. DNS log b. DHCP log d. proxy log
DNS log
A(n) ____ packet contains a field that indicates the function of the packet and an identifier field used to match requests and responses. a. ICMP c. EAP b. TKIP d. RADIUS
EAP
____ is a framework for transporting authentication protocols instead of the authentication protocol itself. a. PEAP c. SSL b. TKIP d. EAP
EAP
____ was first proposed in the mid-1980s and it uses sloping curves. a. FCC c. ECC b. RSA d. IKE
ECC
____ is an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server. a. TACACS c. Kerberos b. RADIUS d. FTP
TACACS
The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____. a. UDP c. TCP/IP b. ASN.1 d. BER
TCP/IP
A user accessing a computer system must present credentials or ____ when logging on to the system. a. access c. token b. authorize d. identification
identification
____ data is the most difficult type of data to capture. a. Volatile c. Non-volatile b. Static d. Persistent
volatile
A security weakness is known as a(n) ____. a. threat c. risk b. vulnerability d. opportunity
vulnerability
A ____ in effect takes a snapshot of the current security of the organization. a. threat analysis c. risk assessment b. vulnerability appraisal d. threat assessment
vulnerability appraisal
A ____ has all of the equipment installed, but does not have active Internet or telecommunications facilities, and does not have current backups of data. a. cold site c. spare site b. hot site d. warm site
warm site
A(n) ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site. a. application gateway c. Web security gateway b. security proxy d. firewall
web security gateway
The SQL injection statement ____ discovers the name of a table. a. whatever%20 AND 1=(SELECT COUNT(*) FROM tabname); -- b. whatever' AND 1=(SELECT COUNT(*) FROM tabname); -- c. whatever; AND 1=(SELECT COUNT(*) FROM tabname); -- d. whatever%; AND 1=(SELECT COUNT(*) FROM tabname); --
whatever' AND 1= (SELECT COUNT(*) FROM tabname); --
The SQL injection statement ____ determines the names of different fields in a database. a. whatever AND email IS NULL; -- c. whatever" AND email IS NULL; -- b. whatever; AND email IS NULL; -- d. whatever' AND email IS NULL; --
whatever' AND email IS NULL; --
The SQL injection statement ____ finds specific users. a. whatever' OR full_name = '%Mia%' b. whatever' OR full_name IS '%Mia%' c. whatever' OR full_name LIKE '%Mia%' d. whatever' OR full_name equals '%Mia%'
whatever' OR full_name LIKE '%Mia%'
The SQL injection statement ____ erases the database table. a. whatever'; DROP TABLE members; -- b. whatever'; DELETE TABLE members; -- c. whatever'; UPDATE TABLE members; -- d. whatever'; RENAME TABLE members; --
whatever'; DROP TABLE MEMBERS; --
____ is a relatively recent cryptographic hash function that has received international recognition and adoption by standards organizations, including the International Organization for Standardization (ISO). a. Twofish c. Whirlpool b. Blowfish d. Rijndal
whirlpool
____ allow a single access point to service different types of users. a. Wireless VPNs c. Wireless multimedia protocols b. Wireless encryption standards d. Wireless VLANs
wireless vlans
When DNS servers exchange information among themselves it is known as a ____. a. resource request c. zone transfer b. zone disarticulation d. zone removal
zone transfer
A(n) ____ is the end of the tunnel between VPN devices. a. endpoint c. server b. client d. proxy
endpoint
Key ____ refers to a process in which keys are managed by a third party, such as a trusted CA. a. escrow c. renewal b. destruction d. management
escrow
A(n) ____ is a set of permissions that are attached to an object. a. ACE c. entity b. DAC d. ACL
ACL
____ is the encryption protocol standard for WPA2. a. AES-CCMP c. AES-TKIP b. AES-CTR d. AES-SCMP
AES-TKIP
A(n) ____ acts as the "base station" for the wireless network. a. AP c. WMM b. endpoint d. ad-hoc peer
AP
DNS poisoning can be prevented by using the latest editions of the DNS software known as ____. a. BIND c. WINS b. DHCP d. finger
BIND
A(n) ____ serves as the trusted third-party agency that is responsible for issuing the digital certificates. a. RA c. CA b. DA d. PA
CA
The ____ model is the least restrictive. a. RBAC c. CAC b. MAC d. DAC
DAC
Entries in the DIB are arranged in a tree structure called the ____. a. DAP c. EAP b. PEAP d. DIT
DIT
The X.500 standard defines a protocol for a client application to access an X.500 directory called ____. a. DIB c. DIT b. DAP d. LDAP
LDAP
____ attacks may allow an attacker to construct LDAP statements based on user input statements. a. SQL injection c. LDAP injection b. Kerberos injection d. RADIUS injection
LDAP injection
The most restrictive access control model is ____. a. Mandatory Access Control c. Discretionary Access Control b. Role Based Access Control d. Rule Based Access Control
MAC
____ takes plaintext of any length and creates a hash 128 bits long. a. RSA c. MD5 b. SHA1 d. MD2
MD2
____ is a technique that allows private IP addresses to be used on the public Internet. a. PAT c. NAPT b. PNAT d. NAT
NAT
____ permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site. a. OpenAuth c. SAML b. OAuth d. Kerberos
Oauth
____ networks are typically used for connecting devices on an ad hoc basis for file sharing of audio, video, and data, or real-time data transmission such as telephony traffic. a. Peer c. P2P b. Client-server d. Share
P2P
____ is typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP). a. PAT c. PAN b. NAT d. PNAT
PAT
____ is considered a more flexible EAP scheme because it creates an encrypted channel between the client and the authentication server. a. TKIP c. PEAP b. LEAP d. ICMP
PEAP
The primary function of a(n) ____ is to verify the identity of the individual. a. RA c. DA b. CA d. PA
RA
____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network. a. RADIUS c. FTP b. ICMP d. Telnet
RADIUS
____ pertains only to the last sector of a file. a. Disk slack c. ROM slack b. RAM slack d. Edge slack
RAM slack
The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several products. a. AES c. Twofish b. RSA d. Blowfish
RSA
TLS is an extension of ____. a. Telnet c. SSL b. HTTP d. FTP
SSL
The ____ is essentially a chip on the motherboard of the computer that provides cryptographic services. a. TPM c. reference monitor b. SCM d. ODS
TPM
It is possible to segment a network by physical devices grouped into logical units through a(n) ____. a. VLAN c. IP address b. subnets d. MAC address
VLAN
____ are generally considered to be the most important information security policies. a. Acceptable use policies c. Data loss policies b. Encryption policies d. VPN policies
acceptable use policies
A(n) ____ model is a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications. a. accounting c. access control b. user control d. authorization control
access control
____ indicates when an account is no longer active. a. Password expiration c. Last login b. Account expiration d. Account last used
account expiration
Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves. a. active c. hybrid b. passive d. neutral
active
A(n) ____ approach is the art of helping an adult learn. a. andragogical c. deontological b. pedagogical d. metagogical
andragogical
When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP. a. broadcast SSID c. disassociation request b. association request d. connect request
association request
The basis for a digital signature rests on the ability of ____ keys to work in both directions. a. symmetric c. unique b. shared d. asymmetric
asymmetric
____ encryption uses two keys instead of only one and these keys are mathematically related. a. Symmetric c. Shared b. Asymmetric d. Public key
asymmetric
In a(n) ____ cluster, a standby server exists only to take over for another server in the event of its failure. a. symmetric network c. asymmetric network b. symmetric server d. asymmetric server
asymmetric server
____ learners tend to sit in the middle of the class and learn best through lectures and discussions. a. Visual c. Kinesthetic b. Auditory d. Spatial
auditory
During RADIUS authentication the AP, serving as the authenticator that will accept or reject the wireless device, creates a data packet from this information called the ____. a. accounting request c. verification request b. access request d. authentication request
authentication request
EAP request packets are issued by the ____. a. supplicant c. authentication server b. authenticator d. proxy
authenticator
A(n) ____ backup is an evidence-grade backup because its accuracy meets evidence standards. a. baseline c. logical image b. mirror image d. thin image
baseline
The algorithm ____ is a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits. a. RSA c. Blowfish b. AES d. 3DES
blowfish
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices. a. Bluesnarfing c. Bluecracking b. Bluejacking d. Bluetalking
bluejacking
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers. a. Bluejacking c. Bluesnarfing b. Bluecracking d. Bluetalking
bluesnarfing
With the ____ model, there is one CA that acts as a "facilitator" to interconnect all other CAs. a. bridge trust c. third-party trust b. distributed trust d. transitive trust
bridge trust
____ attack is where every possible combination of letters, numbers, and characters is used to create encrypted passwords. a. Space division c. Known ciphertext b. Brute force d. Known plaintext
brute force
____ is designed to ensure that an organization can continue to function in the event of a natural or man-made disaster. a. Business continuity planning and testing b. Disaster planning c. Business management planning and testing d. Enterprise disaster planning
business continuity planning and testing
Microsoft is Windows ____ is a feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy. a. CAPI c. CardSpace b. MAPI d. CryptoAPI
cardspace
To create a rainbow table, each ____ begins with an initial password that is encrypted. a. link c. pass b. chain d. block
chain
The ____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence. a. chain of value c. chain of property b. chain of use d. chain of custody
chain of custody
Because the impact of changes can potentially affect all users, and uncoordinated changes can result in security vulnerabilities, many organizations create a(n) ____ to oversee the changes. a. change management team c. security control team b. incident response team d. compliance team
change management team
The set of letters, symbols, and characters that make up the password are known as a ____ set. a. result c. character b. problem d. search
character
A(n) ____ policy is designed to produce a standardized framework for classifying information assets. a. VPN c. privacy b. acceptable use d. classification of information
classification of information
In the ____ cloud computing model, the customer has the highest level of control. a. Cloud Application as a Service c. Cloud Software as a Service b. Cloud Infrastructure as a Service d. Cloud System as a Service
cloud infrastructure as a service
In the ____ model, the cloud computing vendor provides access to the vendor's software applications running on a cloud infrastructure. a. Cloud Application as a Service c. Cloud Software as a Service b. Cloud Infrastructure as a Service d. Cloud System as a Service
cloud software as a service
It is predicted that ____ could become a key element in authentication in the future. a. cognitive biometrics c. reactive biometrics b. standard biometrics d. affective biometrics
cognitive biometrics
____ is related to the perception, thought process, and understanding of the user. a. Standard biometrics c. Cognitive biometrics b. Reactive biometrics d. Affective biometrics
cognitive biometrics
SNMP agents are protected with a password known as a(n) ____ in order to prevent unauthorized users from taking control over a device. a. entity c. MIB b. community string d. OID
community string
If a user typically accesses his bank's Web site from his home computer on nights and weekends, then this information can be used to establish a ____ of typical access. a. usage map c. beachhead b. computer footprint d. system
computer footprint
The ____ response team serves as first responders whenever digital evidence needs to be preserved. a. incident c. risk b. computer forensics d. emergency
computer forensics
____ uses technology to search for computer evidence of a crime, can attempt to retrieve information—even if it has been altered or erased—that can be used in the pursuit of the attacker or criminal. a. Computer forensics c. Vulnerability testing b. Penetration testing d. Risk management
computer forensics
The ____ model is the basis for digital certificates issued to Internet users. a. third-party trust c. managed trust b. related trust d. distributed trust
distributed trust
____ could contain remnants of previously deleted files or data from the format pattern associated with disk storage space that has yet to be used by the computer. a. RAM slack c. Drive file slack b. Edge slack d. Sector slack
drive file slack
____ is the time it takes for a key to be pressed and then released. a. Dwell time c. Sync time b. Lead time d. Show time
dwell time
____ can be defined as the study of what a group of people understand to be good and right behavior and how people make those judgments. a. Values c. Ethics b. Morals d. Standards
ethics
An ____ is an AP that is set up by an attacker. a. active twin c. internal replica b. authorized twin d. evil twin
evil twin
At the ____ stage of the certificate life cycle, the certificate can no longer be used. a. creation c. revocation b. suspension d. expiration
expiration
A ____ is a metallic enclosure that prevents the entry or escape of an electromagnetic field. a. bollard c. Faraday cage b. mantrap d. Newton cage
faraday cage
Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers. a. federated identity management c. central identity management b. liberated identity management d. distributed identity management
federated identity management
____ can be used to determine whether new IP addresses are attempting to probe the network. a. DNS logs c. DHCP logs b. Firewall logs d. Proxy logs
firewall logs
A ____ is a feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack. a. flood guard c. link guard b. protocol guard d. frame guard
flood guard
In the UAC dialog boxes, the color ____ indicates the lowest risk. a. red c. yellow b. gray d. green
gray
A ____ is a collection of suggestions that should be implemented. a. security policy c. guideline b. baseline d. security procedure
guideline
The most basic type of cryptographic algorithm is a ____ algorithm. a. hash c. digest b. key d. block
hash
____ can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it. a. Blocking c. Encrypting b. Hashing d. Cloning
hashing
The weakness of passwords centers on ____. a. human memory c. handshake technology b. encryption technology d. human reliability
human memory
The ____ attack will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters such as @, $, !, or %. a. brute force c. network replay b. hash replay d. hybrid
hybrid
Server virtualization typically relies on the ____, which is software that runs on a physical computer to manage one or more virtual machine operating systems. a. kernel c. hypercard b. supervisor d. hypervisor
hypervisor
____ involves public-key cryptography standards, trust models, and key management. a. Public key infrastructure c. Private key infrastructure b. Network key infrastructure d. Shared key infrastructure
public key infrastructure
____ attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys as well as to detect eavesdropping. a. Reactive cryptography c. Analog cryptography b. Symmetric cryptography d. Quantum cryptography
quantum crytography
Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password, today attackers usually prefer ____. a. rainbow tables c. offline cracking b. online cracking d. cascade tables
rainbow tables
____ provides remote users with the same access and functionality as local users through a VPN or dial-up connection. a. Extranet c. Intranet b. Remote access d. Virtual access
remote access
At the ____ stage of the certificate life cycle, the certificate is no longer valid. a. creation c. revocation b. suspension d. expiration
revocation
At the heart of information security is the concept of ____. a. threat c. risk b. mitigation d. management
risk
A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks. a. random c. rogue b. sanctioned d. legitimate
rogue
A user under Role Based Access Control can be assigned only one ____. a. role c. label b. group d. access list
role
____ is considered a more "real world" access control than the other models because the access is based on a user's job function within an organization. a. Role Based Access Control c. Discretionary Access Control b. Rule Based Access Control d. Mandatory Access Control
role based access control
A ____ forwards packets across computer networks. a. bridge c. switch b. router d. hub
router
____ is often used for managing user access to one or more systems. a. Role Based Access Control c. Rule Based Access Control b. Mandatory Access Control d. Discretionary Access Control
rule based access control
A group of piconets in which connections exist between different piconets is called a ____. a. broadnet c. boundnet b. honeynet d. scatternet
scatternet
A ____ is a written document that states how an organization plans to protect the company's information technology assets. a. security policy c. security procedure b. guideline d. standard
security policy
A policy that addresses security as it relates to human resources is known as a(n) ____ policy. a. VPN c. security-related human resource b. acceptable use d. technical
security related human resource
____ requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals. a. Separation of duties c. Mandatory vacation b. Job rotation d. Role reversal
separation of duties
A ____ is a service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service. a. service level agreement c. recovery time objective b. recovery point objective d. service point agreement
service level agreement
A ____ is a component or entity in a system which, if it no longer functions, will disable the entire system. a. recovery site c. single point of failure b. recovery point d. cascade point of failure
single point of failure
The Web sites that facilitate linking individuals with common interests like hobbies, religion, politics, or school contacts are called ____ sites. a. social networking c. social management b. social engineering d. social control
social networking
____ accepts spoken words for input as if they had been typed on the keyboard. a. Text recognition c. Linguistic recognition b. Speech differentiation d. Speech recognition
speech recognition
____ can use fingerprints or other unique characteristics of a person's face, hands, or eyes (irises and retinas) to authenticate a user. a. Cognitive biometrics c. Standard biometrics b. Reactive biometrics d. Affective biometrics
standard biometrics
A user or a process functioning on behalf of the user that attempts to access an object is known as the ____. a. subject c. entity b. reference monitor d. label
subject
____ can protect the confidentiality of an e-mail message by ensuring that no one has read it. a. Public encryption c. Asymmetric encryption b. Standard encryption d. Symmetric encryption
symmetric encryption
Each operation in a computing environment starts with a ____. a. system call c. hardware instruction b. unit call d. system exception
system call
A ____ is a snapshot of the current state of the computer that contains all current settings and data. a. system standard c. system image b. system view d. system baseline
system image
A ____ trust refers to a situation in which two individuals trust each other because each trusts a third party. a. web of c. third-party b. mutual d. distributed
third-party
TCP is the main ____ protocol that is responsible for establishing connections and the reliable data transport between devices. a. Application Layer c. Network Layer b. Presentation Layer d. Transport Layer
transport layer
A ____ cipher rearranges letters without changing them. a. substitution c. loop b. block d. transposition
transposition
An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____. a. reference monitor c. system monitor b. transaction monitor d. trusted OS
trusted OS
A(n) ____ is a device that maintains power to equipment in the event of an interruption in the primary electrical power source. a. uninterruptible power supply c. uninterruptible system supply b. redundant power supply d. replica power supply
uninterruptible power supply
____ are a person's fundamental beliefs and principles used to define what is good, right, and just. a. Morals c. Ethics b. Values d. Standards
values
____ is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring the electromagnetic fields. a. Newton phreaking c. Van Zek hacking b. Van Eck phreaking d. EMF phreaking
van eck phreaking
____ is a means of managing and presenting computer resources by function without regard to their physical layout or location. a. Portability c. Availability b. Virtualization d. Migration assistance
virtualization
____ learners learn through taking notes, being at the front of the class, and watching presentations. a. Kinesthetic c. Spatial b. Auditory d. Visual
visual
A ____ allows scattered users to be logically grouped together even though they may be attached to different switches. a. subnet c. DMZ b. broadcast domain d. VLAN
vlan