FIS Exam 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which Intstitute of Electrical and Electronics Engineers (IEEE) standard covers wireless LANs?

802.11

Which information security objective allows trusted entities to endorse information?

Certification

Which type of cipher works by rearranging the characters in a message?

Transposition

The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.

True

Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use?

Virtual LAN (VLAN)

Val would like to limit the websites that her users visit to those on an approved list of pre-cleared sites. What type of approach is Val advocating?

Whitelisting

What tool might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations?

Whois

If someone sends you his public key and you import it into Kleopatra, will he be able to decrypt the encrypted messages you send him?

change the trust level

When the key is successfully created, which of the following options sends a copy of your private key to your computer?

make a backup of your key pair

When the key is successfully created, which of the following options lets you store your certificate on a public Internet server?

send certificate by Email

What protocol is responsible for assigning IP addresses to hosts on most networks?

Dynamic Host Configuration Protocol (DHCP)

What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature

Hash

Yolanda would like to prevent attackers from using her network as a relay point for a smurf attack. What protocol should she block?

Internet Control Message Protocol (ICMP)

What is the certificate management component of GPG4Win?

Kleopatra

What federal agency is charged with the mission of promoting "U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life?"

National Institute of Standards and Technology (NIST)

When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve?

Nonrepudiation

Which approach to cryptography provides the strongest theoretical protection?

Quantum cryptography

What tool might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations?

Remote Access Tool (RAT)

What type of publication is the primary working product of the Internet Engineering Task Force (IETF)?

Request for comment (RFC)

Which of the following allows valid SQL commands to run within a web form?

SQL Injection

The CEO of Kelly's company recently fell victim to an attack. The attackers sent the CEO an email informing him that his company was being sued and he needed to view a subpoena at a court website. When visiting the website, malicious code was downloaded onto the CEO's computer. What type of attack too place?

Spear phishing

What type of network device normally connects directly to endpoints and uses MAC-based filtering to limit traffic flows?

Switch

Which type of virus targets computer hardware and software startup functions?

System infector

Which of the following statements is true regarding asymmetrical encryption?

The receiver obtains the needed key from the sender or through a trusted third party, such as a certificate server

Web application developers and software developers are responsible for:

The secure coding and testing of their application.

Which of the following statements is true regarding symmetric cryptography?

The sender and receiver use the same key to encrypt and decrypt a given message

Which of the following becomes possible when a web form allows HTML or JavaScript code as valid input?

Cross-site scripting (XSS)


Ensembles d'études connexes

Med Surg 2 - Test 1 Burns, Med Surg : Chapter 25 Burns, Med Surg burns test #1, Med Surg-Burn Quiz, Lewis: MED-SURG: Chapter 25: Burns, Med Surg - Burns CH 28

View Set