CISS 120 Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In the Perl programming language, comment lines begin with the which of the following character(s)? Select one: a. % b. // c. # d. $

#

Which of the following is an alternative term used when referring to Application Security? Select one: a. SecAPP b. Apps c. AppSec d. SQLSec

AppSec

d. Perl and Python

C and C

What type of Windows Server is the most likely server to be targeted by a computer hacker? Select one: a. File Server b. DNS Server c. DHCP Server d. Domain Controller

Domain Controller

Technology is restricted to a single room or line of sight because this light spectrum cannot penetrate walls

Infrared (IR)

An embedded OS certified to run multiple levels of classification on the same CPU without leakage between levels

MILS

Which of the following EAP methods uses TLS to authenticate the server to the client, but not the client to the server? Select one: a. PPP b. EAP c. EAP-TLS d. PEAP

PEAP

A structure consisting of programs, protocols, and security policies for encrypting data and uses public key cryptography to protect data transmitted over the Internet

PKI

The name used to identify a WLAN

SSID

A cryptographic firmware boot-check processor installed on many new computer systems

Trusted Platform Module

What wireless hacking tool can perform scans for wireless access points and can set up fake APs to social-engineer users or confuse attackers using airbase-ng? Select one: a. WiFi Scan b. WiFi Pineapple c. Fake AP d. AP Pineapple

WiFi Pineapple

An independent WLAN without an AP

ad-hoc network

Ubuntu and Debian Linux use what command to update and manage their RPM packages? Select one: a. yum b. get c. dir d. apt-get

apt-get

Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm

birthday attacks

In the C programming language, which of the following show where a block of code begins and ends? Select one: a. braces Correct b. parenthesis c. brackets d. dashes

braces

What type of useful tools can a security tester find available in both Firefox and Chrome Web browsers? Select one: a. security tools b. scan tools c. developer tools d. SQL tools

developer tools

A small program developed specifically for use with embedded systems

embedded operating system

Software residing on a chip

firmware

A sequence of random bits generated from a range of allowable values

key

In object-oriented programming, a function contained in a class is called which of the following? Select one: a. variable function b. label function c. test function d. member function

member function

What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT) file system? Select one: a. no ACL support b. no SUS support c. no SMTP support d. no Linux support

no ACL support

Operate on plaintext one bit at a time

stream cipher

Which type of symmetric algorithm operates on plaintext one bit at a time? Select one: a. open ciphers b. plain ciphers c. stream ciphers d. block ciphers

stream ciphers

What standard specifically defines the process of authenticating and authorizing users on a network? Select one: a. 802.11 b. 802.1 c. 802.1X d. WEP

802.1X

A standard that addresses the issue of authentication

802.1x

Encryption algorithm used for the Data Encryption Standard

DEA

Data packets are spread simultaneously over multiple frequencies instead of hopping to other frequencies

DSSS

The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of which OSI model layer? Select one: a. Network Link layer b. Data Link layer c. transport layer d. session layer

Data Link layer

An enhancement to PPP, that was designed to allow a company to select its authentication method

EAP

What specific type of spread spectrum modulation allows data to hop to other frequencies to avoid interference that might occur over a frequency band? Select one: a. HSSS b. DSSS c. FHSS d. OFSS

FHSS

What configuration mode allows a Cisco administrator to configure router settings that affect the overall operations of the router? Select one: a. Security configuration mode b. Admin configuration mode c. Global configuration mode d. Interface configuration mode

Global configuration mode

Which of the following is a utility that is a wireless network detector, sniffer, and an intrusion detection system? Select one: a. Kismet b. Clonezilla c. Vistumbler d. Firefox

Kismet

What application is considered the original password-cracking program and is now used by many government agencies to test for password strength? Select one: a. John the Ripper b. Hydra (THC) c. Pwdump3v2 d. L0phtcrack

L0phtcrack

Which of the following is a common Linux rootkit? Select one: a. Back Orifice b. Kill Trojans c. Packet Storm Security d. Linux Rootkit 5

Linux Rootkit 5

A device that performs more than one function, such as printing and faxing is called which of the following? Select one: a. MILS b. ASA c. RTOS d. MFD

MFD

Visual Basic Script (VBScript) is a scripting language developed by which of the following companies? Select one: a. Sun Microsystems b. Symantec c. Macromedia d. Microsoft

Microsoft

Which of the following resources is an excellent starting point for security professionals when investigating VBScript vulnerabilities? Select one: a. CVE Web site b. CERT c. Microsoft Security Bulletin d. Macromedia security

Microsoft Security Bulletin

Which type of wireless technology uses microwave radio waves to transmit data? Select one: a. Wideband b. Narrowband c. Infrared d. Mediumband

Narrowband

What encryption algorithm can be used for both encryption and digital signing, uses a one-way function, and is still widely used in e-commerce? Select one: a. ECC b. RSA c. DES d. AES

RSA

An open-source embedded OS used in space systems because it supports processors designed specifically to operate in space

RTEMS

What type of attack is being performed when an attacker intercepts the initial communications between a Web server and a Web browser while forcing a vulnerable server to insecurely renegotiate the encryption being used down to a weaker cipher? Select one: a. Cross Server attack b. SSL/TLS downgrade attack c. Hydra attack d. TCP/IP attack

SSL/TLS downgrade attack

Which type of Cisco access lists can restrict IP traffic entering or leaving a router's interface based only on the source IP address? Select one: a. Standard IP Correct b. Extended IP c. IP restrict d. ACL IP

Standard IP

What type of packet filtering records session-specific information about a network connection, including the ports a client uses? Select one: a. Stateful b. Stateless c. Static d. Dynamic

Stateful

What type of firewall inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection firewall does? Select one: a. DMZ firewall b. stateless firewall c. upper-layer firewall d. application-aware firewall Correct

application-aware firewall

Uses two keys: one to encrypt data and one to decrypt data

asymmetric algorithm

Any computer system that is not a general-purpose PC or server

embedded system

In HTML, each tag has a matching closing tag that is written with which of the following characters? Select one: a. forward slash (/) b. backward slash (\) c. bang (!) d. ampersand (&) Feedback

forward slash (/)

Defines how data is placed on a carrier signal

modulation

The use of random data alongside plaintext as an input to a hashing function so that the output is unique

salt

What type of encryption is currently used to secure WPA2? Select one: a. Radius b. TKIP c. WEP d. AES

AES

Which of the following protocols is an enhancement to PPP, and was designed to allow a company to select its authentication method? Select one: a. EAP b. WEP c. WPA d. 802.1X

EAP

Data hops to other frequencies to avoid interference that might occur over a frequency band

FHSS

Connecting to an MS SQL Server database with Microsoft's Object Linking and Embedding Database (OLE DB) requires using which of the following providers? Select one: a. ADSDSOOBJECT b. MySQLProv c. SQLOLEDB d. SNAOLEDB

SQLOLEDB

A digital document that verifies the two parties exchanging data over the Internet are really who they claim to be

certificate

Which of the following is a computer placed on the network perimeter with the main goal of distracting hackers from attacking legitimate network resources? Select one: a. IDS b. router c. honeypot d. firewall

honeypot

Which of the following is a range of allowable values that is used to generate an encryption key? Select one: a. algorithm area b. key range c. keyspace d. keyarea Feedback

keyspace

What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms? Select one: a. chosen-ciphertext b. chosen-plaintext c. known plaintext d. ciphertext-only

known plaintext

Devices on an organization's network performing more than one function, such as printers, scanners, and copiers

multifunction devices

A technology that uses microwave radio band frequencies to transmit data

narrowband

Which of the following cross-site scripting vulnerabilities types relies on social engineering to trick a user into visiting a maliciously crafted link or URL? Select one: a. reflected b. injected c. unvalidated d. Stored

reflected

Data is spread across a large-frequency bandwidth instead of traveling across just one frequency band

spread spectrum

Uses a single key to encrypt and decrypt data

symmetric algorithm

Which frequency band is used by commercial AM radio stations? Select one: a. extremely low frequency (ELF) b. very low frequency (VLF) c. medium frequency (MF) d. high frequency (HF)

(MF)

In 802.11, which of the following is an addressable unit? Select one: a. host b. Data Terminal Equipment (DTE) c. station (STA) d. wireless NIC (WNIC)

(STA)

Which IDS system uses a baseline of normal activity and then sends an alert if the activity deviates significantly from this baseline? Select one: a. System-based IDS b. Anomaly-based IDS c. Host-based IDS d. Network-based IDS

Anomaly-based IDS

What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date? Select one: a. BIOS-based rootkit b. embedded browser c. unclassified kernel d. patch

BIOS-based rootkit

Adobe System's ColdFusion uses its proprietary tags, which are written in which of the following languages? Select one: a. XML b. DHTML c. PHP d. CFML

CFML

An OS microkernel extension developed for Linux

RTLinux

A specialized embedded OS used in devices such as programmable thermostats, appliance controls, and even spacecraft

RTOS

Systems used for equipment monitoring in large industries, such as public works and utilities, power generators and dams

SCADA

What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security tools? Select one: a. IOS b. DMZ c. IDS d. SIEM

SIEM

Which of the following application tests analyzes an application's source code for vulnerabilities, and is therefore only possible when the source code of an application is available? Select one: a. Static Application Security Testing b. Fast Application Security Testing c. Dynamic Application Security Testing d. Executable Application Security Testing

Static Application Security Testing

Which of the following cross-site scripting vulnerabilities types is especially harmful because it can be delivered to subsequent users of the application? Select one: a. reflected b. injected c. unvalidated d. Stored

Stored

A certificate contains a unique serial number and must follow which standard that describes the creating of a certificate? Select one: a. NIST b. IEEE 802 c. PKI d. X.509

X.509

SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following? Select one: a. firewall b. air gap c. router d. Vlan

air gap

What type of firewall inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection firewall does? Select one: a. DMZ firewall b. stateless firewall c. upper-layer firewall d. application-aware firewall

application-aware firewall

Which of the following refers to the flow a user is expected to follow in an application to accomplish a goal? Select one: a. error handling b. delay logic c. client flow d. business logic

business logic

What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt? Select one: a. chosen-ciphertext b. chosen-plaintext c. known plaintext d. ciphertext-only

chosen-plaintext

Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted text called which if the following? Select one: a. ciphertext b. cleartext c. maskedtext d. subtext

ciphertext

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data? Select one: a. chosen-ciphertext b. chosen-plaintext c. known plaintext d. ciphertext-only

ciphertext-only

Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device? Select one: a. firmware b. testware c. middleware d. fireware

firmware

Used for verification, takes a variable-length input and converts it to a fixed-length output string

hashing algorithm

Red Hat and Fedora Linux use what command to update and manage their RPM packages? Select one: a. yum b. get c. dir d. apt-get

yum


Kaugnay na mga set ng pag-aaral

patho ch 45 Disorders of Kidney and Urinary Tract Structure and Function

View Set

The Golden Touch/ King Midas vocabulary

View Set