Security 448

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Annualized Rate Of Occurrence. If you have determined that a fire could occur once in ten years and you will lose 50% of your $500,000 asset then your ARO = A. $25,000 B. .1 C. $250,000 D. 10

.1

Match the term to the example 1. Confidentiality 2. Integrity 3. Availability A.data corruption and tampering B.service denial and data loss C.eavesdropping and data theft

1. Confidentiality: eavesdropping and data theft 2. Integrity: data corruption and tampering 3. Availability: service denial and data loss

Put the Waterfall Model stages in the correct order. Requirements Design Implementation Verification Maintenance

1. Requirements 2. Design 3. Implementation 4. Verification 5. Maintenance

Put the following items in the correct order for the flow of an incident on the ITIL service support side: Service desk Incident management Change management Release management

1. Service desk 2. Incident management 3. Change management 4. Release management

The ITIL framework is broken down into two main groups: A) 1. Prototype 2. Review B) 1. Incident Management 2. Change Management C) 1. Service support 2. Service delivery D) 1.Problem Analysis 2.Design Evaluation

1. Service support 2. Service delivery

An IPv6 address is comprised of _____ bits (answer in numeric form).

128 bits

If the network portion of an IP address is the first three octets (10.12.1.x), then the slash notation (also known as CIDR notation) to scan this network is: 10.0.0.0/___

24

Exposure Factor- Your computer that is worth $1800 was mostly destroyed. However, you think you can salvage exactly half of it. Your EF is: A. $900 B. 50% C. $450 D. .05

50%

If the network portion of an IP address is the first octet (10.x.x.x), then the slash notation (also known as CIDR notation) to scan this network is: 10.0.0.0/___

8

The question to ask when making a security decision is: A. is it worth the tradeoff B. is it worth the money C. does it have a positive return on investment D. does it make us safer

A. is it worth the tradeoff

Policy does NOT include: A. list of technologies to use b. senior management input c. a statement of enterprise goals d. a statement of enterprise beliefs

A. list of technologies to use

According to Scheier, security includes the following (select all that apply): A. model B. reality C. agenda D. feeling

A. model B. reality C. agenda D. feeling

The OWASP website A. ranks the top ten web application vulnerabilities B. ranks the top ten wireless vulnerabilities C. ranks the top ten server vulnerabilities D. ranks the top ten database vulnerabilities

A. ranks the top ten web application vulnerabilities

According to Bruce Schneier, all of the following are biases in risk perception, except one. Which one? A. real-world risks hold more value than online risks B. personified risks are perceived to be greater than anonymous risks C. we tend to exaggerate spectacular and rare risks and downplay common risks D. the unknown is perceived to be riskier than the familiar

A. real-world risks hold more value than online risks

What type of error is false accept rate? A. Type III error B. Type 1 error C. Type 11 error D. Type 0 error

C. Type 11 error

Which System Development Life Cycle is more like an assembly line in that it is not very flexible because it doesn't allow you to cycle back through previous steps. A. Extreme B. Exploratory C. Waterfall E. Iterative

C. Waterfall

A certificate authority is: A. an entity that decrypts messages for an end user B. a trusted third party that controls the sale of domain names to the rightful owner of the name C. a trusted third party that associates an identified signer with a specific public key D. a trusted third party that associates an identified end user with a specific private key

C. a trusted third party that associates an identified signer with a specific public key

Which technique to control the use of the system's resources is described as: Several programs can be running within the computer, each taking turns using the processor. A. Multicontrol B. Multiprocessing C. Multithreading D. Multitasking

D. Multitasking

The main target of Stuxnet was: A. Dyn DNS B. Microsoft Windows systems C. Equafax E. Natanz nuclear facility

E. Natanz nuclear facility

Ping uses the ____ protocol.

ICMP

Which of the following protocols does SSH encrypt? (choose all that apply) A. FTP B. SCP C. SFTP D. SMS

SCP SFTP

What protocol is an extension of SSH? A. SSH+ B. FTPS C. TFTP D. SFTP

SFTP

Which of the following identifies the stages of the three-way handshake? A. SYN, SYN/ACK, ACK B. SYN, ACK, ACK/SYN C. ACK/SYN, ACK, SYN D. ACK, SYN, ACK/SYN

SYN, SYN/ACK, ACK

What type of cipher do you think was used to create the following ciphertext: ihhgph A. Asymmetric B. Hash C. Transposition D. Substitution

Substitution

What type of cryptosystem is a Caesar cipher? A. Symmetric B. Asymmetric C. Transposition D. Encryption

Symmetric

According to the lecture TCO stands for: A. Technology commercialization office B. Tempest control officer C. Total cost of ownership D. The chosen one

Total cost of ownership

What type of cipher do you think was used to create the following ciphertext: fdemee A. Asymmetric B. Transposition C. Substitution D. Hash

Transposition

What type of cipher rearranges the characters in the plaintext to form the ciphertext? A. Asymmetric B. Substitution C. Caesar D. Transposition

Transposition

Your corporate firewall has the following rules applied to the incoming interface on the DMZ. If you need to block all web traffic from a malicious source IP address, where would you place an explicit deny statement for that malicious source IP address? a) ---- here ------ 10 Permit SRC IP any DST IP 192.168.1.4 SRC PORT any DST PORT 80 b) ---- here ------ 20 Permit SRC IP any DST IP 192.168.1.5 SRC PORT any DST PORT 25 c) ---- here ------ 30 Permit SRC IP any DST IP 192.168.1.15 SRC PORT any DST PORT 443 d) ---- here ------ 40 Deny ANY ANY e) ---- here ------ A. a B. b C. c D. d E. e

a

Quantitative A. attempts to assign independently objective numeric value to all elements of the risk analysis B. does not attempt to assign numeric value, but is scenario oriented

attempts to assign independently objective numeric value to all elements of the risk analysis

"The three golden rules to ensure computer security are: do not own a computer; do not power it on and do not use it." What part of the security triad does this quote violate? A. usability B. confidentiality C. integrity D. availability

availability

An information security policy does NOT include: A. recognition of information as an asset of the organization B. basis for data classification C. authority for information security department d. guidelines for how to implement policy

d. guidelines for how to implement policy

Qualitative A. attempts to assign independently objective numeric value to all elements of the risk analysis B. does not attempt to assign numeric value, but is scenario oriented

does not attempt to assign numeric value, but is scenario oriented

Decrypt the following ciphertext which was encrypted using a Caesar cipher with a shift of +3. mxps

jump

Access should be granted on a _______ privilege basis. A. no B. average C. most D. least

least

According to Bruce Schneier, rare risks are repeated again and again by: A. politicians B. neighbors C. newspapers D. your mom

newspapers

What does Schneier call products that make people feel secure, but don't actually do anything? A. security blanket B. security theatre C. security allusion D. Fraudulent Marketing

security theatre

Decrypt the following message which was encrypted using the vigenere cipher using the passphrase ncl: fwxzgc

summer

Place the pieces of an information system in the correct order, starting with the highest level (the part that the end-user directly interacts with is #1). application program utilities operating system computer hardware (memory and CPU)

1. application program 2. utilities 3. operating system 4. computer hardware (memory and CPU)

An IPv4 address is comprised of _____ bits (answer in numeric form).

32

TLS uses port #____ when encrypting HTTP.

443

What is a DDOS attack? A. A distributed denial of service attack is typically carried out by a botnet consisting of thousands of infected (zombie) computers which simultaneously send traffic to the targeted site. B. A drunk duck offline snafu occurs when the distracted server admin accidentally trips on the server's power cord. C. A distributed denial of service attack is typically carried out by a very powerful server which overwhelms the targeted site by sending a lot of traffic to it.

A distributed denial of service attack is typically carried out by a botnet consisting of thousands of infected (zombie) computers which simultaneously send traffic to the targeted site.

The following steps are taken to ensure that a file that the recipient received was not tampered with (it is the original file sent by the sender). A) 1. the file is hashed by the sender 2. the hash is encrypted with the sender's private key and sent to the recipient 3. the recipient hashes the file 4. the recipient decrypts the sender's hash with the sender's public key 5. the recipient compares the decrypted hash with their own hash of the file B) 1. the file is encrypted with the sender's private key and sent to the recipient 2. the recipient decrypts the file with the sender's public key C) 1. the file is hashed by the sender 2. the recipient hashes the file 3. the recipient compares the sender's hash with their own hash of the file D) 1. the file is hashed by the sender 2. the hash is encrypted with the recipient's public key and sent to the recipient 3. the recipient hashes the file 4. the recipient decrypts the sender's hash with their private key 5. the recipient compares the decrypted hash with their own hash of the file

A) 1. the file is hashed by the sender 2. the hash is encrypted with the sender's private key and sent to the recipient 3. the recipient hashes the file 4. the recipient decrypts the sender's hash with the sender's public key 5. the recipient compares the decrypted hash with their own hash of the file

According to Ralph Langner, in the lab Stuxnet behaved like A. "a lab rat that didn't like the cheese" B. "Dr. Jekyll and Mr. Hyde" C. "a monkey that stole all of the bananas" D. "a crazed caged monkey"

A. "a lab rat that didn't like the cheese"

Which of the following characters would you consider an escape character used for SQL injection (mark all that apply) A. ' (single quote) B. -- (dash, dash) C. = (equals) D. ; (semicolon)

A. ' (single quote) B. -- (dash, dash) C. = (equals) D. ; (semicolon)

Which of the following are private IP addresses? (select all that apply) A. 10.12.3.4 B. 172.16.2.1 C. 73.48.92.16 D. 192.168.42.42

A. 10.12.3.4 B. 172.16.2.1 D. 192.168.42.42

Combine the following using the XOR operation: 10010000000 01110011011 A. 11100011011 B. 11100011000 C. 11111111111 D. 10110111000

A. 11100011011

Bob needs to send Alice a message and doesn't want anyone but Alice to be able to read the contents. 1) Bob writes the message 2) Bob encrypts the message with [a]'s [b] key 3) Bob sends the encrypted message to Alice 4) Alice receives the message 5) Using [c]'s [d] key Alice decrypts the message The available answers are: Bob Alice private public

A. Alice B. public C. Alice D. private

Which statement is true regarding digital signatures? A. Authentication is assured because the sender's private key is used to encrypt the message. B. Confidentiality is assured because the receiver's private key is used to encrypt the message. C. Authentication is assured because the receiver's private key is used to encrypt the message. D. Confidentiality is assured because the sender's private key is used to encrypt the message.

A. Authentication is assured because the sender's private key is used to encrypt the message.

Bob needs to send Alice a message and wants Alice to know it is from him. Bob needs to send Alice a message and wants Alice to know it is from him. 1) Bob writes the message 2) Bob encrypts the message with [a]'s [b] key 3) Bob sends the encrypted message to Alice 4) Using [c]'s [d] key Alice decrypts the message Choose from the following answers: Bob Alice private public

A. Bob B. private C. Bob D. public

What is the central repository for all configuration items? A. CMDB B. ODBC C. SDLC D. ITIL

A. CMDB

What is considered the perfect encryption scheme and is unbreakable? A. One-time pad B. IDEA C. PKI D. RSA

A. One-time pad

What is the following an example of? "All authorized users must be allowed to do only their authorized tasks. Unauthorized users must not have access to the company systems or resources." A. Policy B. Guideline C. Standard D. Procedure

A. Policy

A username and password combination is which type of authentication? A. Single-factor B. Multi-factor C. Ownership D. Characteristic

A. Single-factor

Which of the following are true about a DDOS attack: A. Software is not installed on the site being attacked. B. The attacker is not after data stored on the site (credit card numbers, SSNs, etc) C. Involves a botnet that sends a lot of traffic to the victim site. D. Usually involves a few, very powerful servers that send a lot of traffic to the victim site.

A. Software is not installed on the site being attacked. B. The attacker is not after data stored on the site (credit card numbers, SSNs, etc) C. Involves a botnet which sends a lot of traffic to the victim site.

Which of the following is true about Symmetric multiprocessing? Select all that apply. A. The processors share memory and the I/O bus B. A single copy of the OS is in charge of all the processors C. Can have its own memory (not usually own OS) D. Data paths allow messages to be sent between the processors

A. The processors share memory and the I/O bus B. A single copy of the OS is in charge of all the processors

What type of error is false reject rate? A. Type 1 error B. Type II error C. Type 0 error D. Type 111 error

A. Type 1 error

What "acts as filters between us and reality" ? A. cognitive biases B. geolocation C. the upside down D. language barriers

A. cognitive biases

What type of error is: false acceptance+false rejection A. crossover error B. completive error C. gross error D. all error

A. crossover error

What does Schneier call products that make people feel secure, but don't actually do anything? A. security theatre B. security allusion C. security blanket D. fraudulent marketing

A. security theatre

Annualized Loss Expectancy is calculated with the following formula: A. ALE = Single Loss Expectancy x Annualized Rate Of Occurrence B. ALE = Exposure Factor x Annualized Rate Of Occurrence C. ALE = Single Loss Expectancy x Asset Value D. ALE = Exposure Factor x Asset Value

ALE = Single Loss Expectancy x Annualized Rate Of Occurrence

Which of the following is true about Massively parallel processing? Select all that apply. A. The processors share memory and the I/O bus B. Data paths allow messages to be sent between the processors C. A single copy of the OS is in charge of all the processors D. Can have its own memory (not usually own OS)

B. Data paths allow messages to be sent between the processors D. Can have its own memory (not usually own OS)

Which of the following lists the correct five levels of the Capability Maturity Model? A. Initial, Repeatable, Qualified, Managed, Optimizing B. Initial, Repeatable, Defined, Managed, Optimizing C. Initial, Non-repeatable, Defined, Managed, Optimizing D. initial, Repeatable, Defined, Managed, Custom

B. Initial, Repeatable, Defined, Managed, Optimizing

Which of the following biometric methods obtain the patterns and colors around a person's pupil? A. Eye pattern recognition B. Iris scan C. Retina pattern D. Pupil Identifier

B. Iris scan

Which technique to control the use of the system's resources is described as: Is the coordinated processing of two or more programs by a system that contains parallel processors. A. Multithreading B. Multiprocessing C. Multitasking D. Multicontrol

B. Multiprocessing

Which of the following types of authentication is the most common method and also the weakest? A. Token B. Password C. Fingerprint D. PIN

B. Password

Which algorithm did NIST choose to become the Advanced Encryption Standard (AES) replacing DES? A. Twofish B. Rijndael C. IDEA D. DEA

B. Rijndael

What vulnerability occurs when one process passes pointers to parameters to the OS at the same time another process modifies the parameters? A. Fraggle B. TOC/TOU C. Covert channel D. Back door

B. TOC/TOU

In a Kerberos system, the client first authenticates with the KDC. Then when it requests access to a particular resource what must it present? A. Ticket B. Ticket Granting Ticket(TGT) C. Privileged Attribute Certificate(PAC) D. Authenticator

B. Ticket Granting Ticket(TGT)

Goal of Stuxnet was to find: A. the security system of Iran's nuclear facility B. a computer used to program a programmable logic computer C. a programmable logic computer

B. a computer used to program a programmable logic computer

A standard: A. is a statement of enterprise beliefs B. identifies a specific product or mechanism for universal company use C. spells out the step-by-step process of how the policy will actually be implemented in the environment D. explains how to implement a security package to ensure that it is done in a consistent level of security

B. identifies a specific product or mechanism for universal company use

In the No Tech Hacking video how did they defeat physical security with junk and stuff (related to the touch bar on the door)? A. they went dumpster diving and found old key cards to unlock a secured door B. they used a hanger and wet towel to unlock a secured door C. they used a paper clip in the key hole to unlock a secured door D. they went dumpster diving to search for entry codes to unlock a secured door

B. they used a hanger and wet towel to unlock a secured door

According to the lecture BCP stands for: A. Boston cream pie B. Business continuity plan C. Bulk copy program D. Best current practice

Business Continuity Plan

In order to verify the identity of the sender and provide confidentiality you would: A) 1. encrypt first using the receiver's public key 2. encrypt again using the sender's public key B) 1. encrypt first using the sender's private key 2. encrypt again using the receiver's public key C) 1. encrypt using the receiver's public key 2. encrypt using the sender's private key

C) 1. encrypt using the receiver's public key 2. encrypt using the sender's private key

Three methods of authentication are presenting something: A) 1. you know 2. you have 3. you see B) 1. you wear 2. you have 3. you see C) 1. you know 2. you have 3. you are

C) 1. you know 2. you have 3. you are

What security risk can be associated with interrupt processing? A. A low-level process may time-out before completion B. An interrupted process may lose data integrity C. An interrupted process may assume the priority of the higher-level process D. A higher-level process may not receive sufficient CPU cycles

C. An interrupted process may assume the priority of the higher-level process

Granting of access privileges to certain files is: A. Authentication B. Identification C. Authorization D. Accountability

C. Authorization

What is the most widely accepted approach to IT service management in the world? A. Policies B. Standards C. Baselines D. Guidelines

C. Baselines

Which one of the following is NOT an effective control against SQL injection attack? A. Limiting database permissions B. escaping C. Client-side input validation D. parameterization

C. Client-side input validation

Which type of memory outputs on both the rising and falling edges of the clock cycle? A. DRAM B. EDO RAM C. DDR SDRAM D. SDRAM

C. DDR SDRAM

You would use the following software development model when detailed requirements specification cannot be formulated in advance A. Extreme programming B. Prototyping C. Exploratory programming D. Guess and Compile method

C. Exploratory programming

Which of the following is NOT true about asymmetric cryptography systems? A. Uses a variable-length key B. Provides authentication and nonrepudiation C. Faster than symmetric cryptography D. One side uses a public key and the other uses a private key

C. Faster than symmetric cryptography

A fixed-length value used as a message fingerprint is called a: A. Digital signature B. MAC C. Hash value D. Message value

C. Hash value

How long has SQL Injection been the top vulnerability? A. It used to be the top vulnerability, but that was back in 2013 B. It was always a top ten vulnerability, but it was never number one C. It has been the top vulnerability for at least the last decade D. It became the top vulnerability in the last 5 years

C. It has been the top vulnerability for at least the last decade

How did Mikko truck down the Russian punk? A. Mikko tracked down the Russian guy's IP address which he then did a reverse lookup on to figure out the region that the IP address came from. B. Mikko recognized the region that the Russian guy's accent was from. C. Mikko discovered the city that the Russian hacker was in based upon the license plate of the car that the hacker posted on social media. D. The Russian hacker had a separate social media account that Mikko linked to the hacker. The social media site listed the guy's city.

C. Mikko discovered the city that the Russian hacker was in based upon the license plate of the car that the hacker posted on social media.

What is the name of the not-for-profit worldwide charitable organization focused on improving the security of application software that we discussed in class? A. Secure Operations Business B. Learning Methods Application Occupation C. Open Web Application Security Project D. Application Security Society

C. Open Web Application Security Project

Which technology allows users to sign on to a computer or network once, and have their identification and authorization credentials allow them into all computers and systems where they are authorized? A. biometrics B. Multi-factor authentication C. Single sign-on (SSO) D. Single-factor authentication

C. Single sign-on (SSO)

What is the vulnerability associated with CPU states? A. System performance may be impacted B. The data is volatile and may be lost when powering down C. When a system crashes, there is a core dump of its internal state. If the core-dump is not secured, then unauthorized users could access it. D. The data may be read by the user.

C. When a system crashes, there is a core dump of its internal state. If the core-dump is not secured, then unauthorized users could access it.

What is the name of the"big idea" to spread out the message? A. confusion B. encryption C. diffusion D. obfuscation

C. diffusion

The Zachman Framework A. is used to control access to mitigate conflict of interest in a consulting environment B. models confidentiality aspects of a multilevel security C. includes specifications for defining and capturing an architecture D. addresses subject/program binding

C. includes specifications for defining and capturing an architecture

According to Bruce Schneier, rare risks are repeated again and again by: A. neighbors B. your mom C. newspapers D. politicians

C. newspapers

Which of the following is true about an OR statement? A. only one side of the OR statement needs to be true in order for the entire statement to be false B. both sides of the OR statement needs to be true in order for the entire statement to be false C. only one side of the OR statement needs to be true in order for the entire statement to be true D. both sides of the OR statement needs to be true in order for the entire statement to be true

C. only one side of the OR statement needs to be true in order for the entire statement to be true

"All users of Norton anti-viral software will have anti-viral signature files updated weekly. The following procedure is to be followed when updating your anti-virus files every week: ... " is an example of a: A. policy B. standard C. procedure D. baseline

C. procedure

According to Johnny Long, how do you "suck data off machines with your mind?" A. sniff traffic B. install a key logger C. shoulder surf D. what till the year 2045 when our minds will be machines

C. shoulder surf

Which type of cipher would you choose if you knew that you were only going to receive a few bytes of data at a time? A. hash function B. block cipher C. stream cipher D. caesar cipher

C. stream cipher

What "high tech" instrument did people use to break into phone systems? A. Flux Capacitor B. Sniffer C. Captain Crunch Whistle D. Black Box

Captain Crunch Whistle

What are the three parts to the Information Security Triad? A. Confidentiality, Integrity, Availability B. Containment, Integrity, Access C. Confidentiality, Integrity, Access D. Containment, Integrity, Availability

Confidentiality, Integrity, Availability

In order to list all of the rows from the employee table, what would you enter into the text box that is prompting for the employee ID? A. '100' or '1' = '1';-- B. 100' or '1' = '1' C. 100' or '1' = '1'; D. 100' or '1' = '1

D. 100' or '1' = '1

Because the CPU is the brain of a computer, it and the operating system have multiple layers of self-protection. One mechanism they use is protection rings to separate critical components through boundaries of security controls. Which of the following computer components would be placed in the outermost ring (or layer)? A. I/O drivers and utilities B. Operating system kernel C. Remaining parts of the operating system D. Applications and programs

D. Applications and programs

Random and unreadable text messages are called: A. Cleartext B. Cryptotext C. Plaintext D. Ciphertext

D. Ciphertext

Which of the following is the correct description of DES? A. DES encryption employs an asymmetric key using a block cipher and a 128-bit key for encryption B. DES encryption employs an asymmetric key using a stream cipher and a 56-bit key for encryption C. DES encryption employs a symmetric key using a block cipher and a 128-bit key for encryption D. DES encryption employs a symmetric key using a block cipher and a 56-bit key for encryption

D. DES encryption employs a symmetric key using a block cipher and a 56-bit key for encryption

Which technique to control the use of the system's resources is described as: A. Multiprocessing B. Multicontrol C. Multitasking D. Multithreading

D. Multithreading

With a kerberos system does the user's password ever get passed across the network? A. Yes, but it is encrypted with a Session Key as it sen to a resource that the user is attempting to access. The resource decrypts the password with the shared session key. B. Yes, it is sent within the Authenticator which is encrypted when it is sent to the KDC. The KDC decrypts the Authenticator by using a share secret key. C. No, the user's password is only used to access the Kerberos client software running on the user's PC. D. No, the user's password is stored in the KDC. The user's password is authenticated when the KDC uses the password to decrypt the authenticator, which was encrypted. by the user with their password.

D. No, the user's password is stored in the KDC. The user's password is authenticated when the KDC uses the password to decrypt the authenticator, which was encrypted. by the user with their password.

What type of model dictates that all software developers follow a software programming model that uses discrete phases and reviews before the next phase of development is carried out? A. Prototyping B. Extreme programming C. RAD D. Waterfall

D. Waterfall

How do you string two SQL injection queries together? A. You would end the first SQL statement with a closing quote (if needed) , then a semicolon (to denote the end of the first query), then a -- for the comment, and then the second query with its ending semicolon. B. You would end the first SQL statement with a closing quote (if needed) , then the second query, and finally a -- for the comment. C. You would end the first SQL statement with a closing quote (if needed) , then a semicolon (to denote the end of the first query), and then the second query with its ending semicolon. D. You would end the first SQL statement with a closing quote (if needed) , then a semicolon (to denote the end of the first query), then the second query with its ending semicolon, and finally a -- for the comment.

D. You would end the first SQL statement with a closing quote (if needed) , then a semicolon (to denote the end of the first query), then the second query with its ending semicolon, and finally a -- for the comment.

What is the name of the"big idea" to obscure the relationship between your real message and the encrypted message? A. diffusion B. obfuscation C. encryption D. confusion

D. confusion

In the XKCD comic strip, what did Little Bobby Tables do? A. was able to list all of the students in the Students table B. crashed the database C. did a Ferris Bueller and cleared himself of all of his absences D. dropped the Students table

D. dropped the Students table

What type of cipher will produce the exact same size ciphertext no matter how large the clear text is? A. asymmetric cipher B. block cipher C. stream cipher D. hash function

D. hash function

What does the joke "one, two, three, many" refer to? A. we are really good at abstraction B. we are really good at large numbers C. we are not very good with tropical fruit (apple would have been a better example) D. we are really good at small numbers

D. we are really good at small numbers

What is "wardriving"? A. Is the successful hijack of a smart car through the system's on-board computers. B. Driving around looking for unencrypted wireless access points. C. Driving around looking for susceptible ATMs that the attacker can attach a card skimmer to. D. The name of a virus that infects printer drivers.

Driving around looking for unencrypted wireless access points.

What is the act of an unauthorized person intercepting and reading packets that flow across a network? A. Eavesdropping/sniffing B. Replaying C. Hijacking D. None of the above

Eavesdropping/sniffing

Which of the following is the most effective countermeasure to social engineering? A. Employee education B. Antivirus software C. Intrusion detection systems D. Stringent firewall rules

Employee education

What technology solution blocks outbound access to certain websites or services? A. NAT B. UTM C. Proxy server D. DMZ

Proxy server

What technology solution blocks inbound access to internal sites, has anti-virus, and intrusion detection? A. NAT B. UTM C. DMZ D. Proxy server

UTM

Which of the following is any weakness in a system that makes it possible for a threat to cause it harm? A. Risk B. Backdoor C. Vulnerability D. Exploit

Vulnerability

What technology solution blocks attempted attacks on internal web servers? A. UTM B. NAT C. WAF D. DMZ

WAF

When you buy the insurance you are: A. absorbing the risk B. preventing the risk C. ignoring the risk D. transferring the risk

transferring the risk

The key to protecting assets from the risk of attack is to eliminate or address as many ______ as possible. A. vulnerabilities B. threats C. technologies D. security policies

vulnerabilities


Kaugnay na mga set ng pag-aaral

Chapter 1 - INSURANCE REGULATIONS

View Set

Media lab hematology and urinalysis

View Set

PROPHECY EMERGENCY DEPARTMENT RN A

View Set

SLP 150: CVA and Aphasia Quiz #6

View Set

Biology Quiz #3 - Chapters 8, 9, &10

View Set

Lecture Quiz: 13 Sensory Pathways and the Somatic Nervous System

View Set