MIS 4800
Which term refers to a set of wireless technologies that enables smartphones and other devices to establish radio communication over a short proximity?
Near field communication (NFC)
Which type of attack occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time?
Replay
Which term refers to the possibility of suffering harm or loss?
Risk
Which device forms the backbone of the Internet, moving traffic from network to network, inspecting packets from every communication as they move traffic in optimal paths?
Router
What is the correct sequence of the three-way handshake?
SYN, SYN/ACK, ACK
A _________________ is a critical operation upon which many other operations rely and which itself relies on a single item that, if lost, would halt this critical operation.
Single point of failure
Which term describes a point-in-time saving of the state of a virtual machine?
Snapshot
Which device forms the basis for connections in most Ethernet-based LANs?
Switch
A session key is a(n) __________ key used for encrypting messages during a communication session.
Symmetric
Which encryption method is based on the idea of using the same key for encryption and decryption of data?
Symmetric encryption
Which security device is a passive signal-copying mechanism installed between two points on the network?
TAP
Which statement describes the main difference between TCP and UDP packets?
TCP packets are connection oriented, whereas UPD packets are connectionless.
What term does the U.S. Department of Defense use to describe both a program in the military to control electronic emanations from electrical equipment and the actual process or controlling the emanations?
TEMPEST
The best algorithms are always public algorithms that have been published for peer review by other cryptographic and mathematical experts.
True
The impact of an event is a measure of the actual loss when a threat exploits a vulnerability.
True
The presence of risks in a system is an absolute—they cannot be removed or eliminated.
True
The primary defense against a majority of physical attacks are walls, fences, gates, and doors.
True
The purpose of change management is to ensure proper procedures are followed when modifications to the IT infrastructure are made.
True
What is a logical implementation of a LAN that allows computers connected to different physical networks to act and communicate as if they were on the same physical network?
VLAN
Certificates are used to (check all that apply):
Verify the sender of an email Verify the legitimacy of a website
Which term is used to describe the hosting of a desktop environment on a central server?
Virtual desktop infrastructure (VDI)
Which tool is used to provide a secure communication channel between users across public networks such as the Internet?
Virtual private network (VPN)
What is a drawback to water-based fire suppression systems?
Water-based systems are destructive to electrical equipment.
A certificate revocation list (CRL) is
a list of serial numbers of certificates that have been revoked.
A(n) ____________________ is a trusted authority that certifies individuals' identities and creates electronic documents indicating that individuals are who they say they are.
certificate authority
When material, called plaintext, needs to be protected from unauthorized interception or alteration, it is encrypted into __________.
ciphertext
Keeping all attackers out of a system all of the time is an obtainable goal of an organization.
false
Since developers create and enhance programs, they should be able to install these programs on the production system.
false
In a ________________ backup all files and software are stored on the media.
full
Which type of alternative site ( backup site) is the most ready for a company to restore service from?
hot site
Transport encryption is used to protect data that is __________.
in motion
Common uses of hashing algorithms are to store computer passwords and to ensure message __________.
integrity
A __________ is a special piece of data used in both the encryption and decryption processes.
key
________________ is the target time that is set for resuming operations after an incident.
recovery time objective (RTO)
A(n) ____________________ is the PKI component that accepts a request for a digital certificate and performs the necessary steps of registering and authenticating the person requesting the certificate.
registration authority
Which term refers to a risk that remains after implementing controls?
residual risk
What is a foundation for change management?
separation of duties
__________ relies on lies and misrepresentation, which an attacker uses to trick an authorized user into providing information or access the attacker would not normally be entitled to.
social engineering
. Making data look like it has come from a different source is called __________.
spoofing
This is a common form of testing a disaster recovery plan that has little to no impact on the company but also doesn't completely test the plan.
tabletop exercise
Most e-mail is sent in plaintext, providing no privacy in its default form.
true
Which of the following is an example of a MAC address?
00:07:e9:c8:ff:00
Which of the following is a valid IP address?
12.12.12.12
How many bits are in an IPv6 address?
128
__________ is essentially noting which domains and source addresses have a reputation for sending spam, and rejecting messages coming from those domains and source addresses.
Blacklisting
Which term refers to any media used to boot a computer into an operating system (OS) that is not the native OS on its hard drive?
Bootdisk
Which type of attack occurs when a password-cracking program attempts all possible password combinations?
Brute-force
Which term generally refers to the standard of care a business is expected to exercise in preparation for a business transaction?
Due Dilligence
A public cloud system is one where several organizations with a common interest share a cloud environment for the specific purposes of the shared endeavor.
False
Currently, all instant messaging programs natively support encryption.
False
Keys and certificates should not have expiration dates.
False
Systems that are categorized as optional should be restored first after an emergency.
False
Targeted attacks are easier and take less time and effort than attacks on targets of opportunity.
False
The biggest danger to any organization comes from external attacks more than internal attacks.
False
Which term describes a network device—hardware, software, or a combination thereof—whose purpose is to enforce a security policy across its connections by allowing or denying traffic to pass into or out of the network?
Firewall
What is a good way to reduce the chance of a successful social engineering attack?
Implement a strong security education and awareness training program.
What is a firewall condition in which any traffic not specifically permitted by a previous rule in the rule set is denied?
Implicit deny
Which term refers to a process by which the user escalates their privilege level, bypassing the operating system's controls and limitations?
Jailbreaking
In terms of physical security, which term refers to protecting important assets by using multiple perimeters?
Layered access
Which term refers to the ability to distribute the processing load over two or more systems?
Load balancing
What term refers to a piece of code that sits dormant for a period of time until some event invokes its malicious payload?
Logic bomb
The term __________ refers to software that has been designed for some nefarious purpose.
Malware
Which term refers to a type of an attack where an attacker spoofs addresses and imposes their packets in the middle of an existing connection?
Man-in-the-middle attack
Which action is an example of transferring risk?
Management purchases insurance for the occurrence of the risk.
How do most advanced persistent threats (APTs) begin?
Most APTs begin through a phishing or spear phishing attack.
What is one benefit of Network Address Translation (NAT)?
NAT compensates for the lack of available IP address space.
Phishing is the most common form of social engineering attack related to computer security.
True
Businesses should have a ___________________ that outlines what employees can do with company resources, such as computer systems, e-mail, Internet access, and networks.
Acceptable use policy
Policies and procedures are examples of _______________ controls.
Administrative
Which poor security practice is one of the most common and most dangerous?
Choosing poor passwords
Which term refers to technology employed to detect and prevent transfers of data across an enterprise?
Data loss prevention (DLP)
Warning signs and guards are examples of ______________ controls.
Deterrent
What type of attack is based on the automated download of malware that takes advantage of a browsers' ability to download the different files that compose a web page?
Drive-by download
Which term means that the message sender cannot later deny that they sent the message?
Nonrepudiation
What is a paradox of social engineering attacks?
People are not only the biggest problem and security risk but also the best tool in defending against an attack.
Which statement describes why social engineering is successful?
People have a basic desire to be helpful.
What step can be taken to evaluate the effectiveness of the security measures in place at an organization?
Perform a vulnerability assessment
___________________ distributes data over multiple hard drives to provide speed, redundancy or both.
RAID
Why is wireless problematic from a security standpoint?
There is no control over the physical layer of traffic.
What is the primary objective of change management?
To enable beneficial changes to be made, with minimum disruption to IT services
A DMZ acts as a buffer zone between the Internet, where no controls exist, and the inner, secure network, where an organization has security policies in place.
True
A digital certificate binds an individual's identity to a public key
True
A key security methodology is to attempt to avoid a single point of failure in critical functions within an organization.
True
A wildcard certificate is good for more than one website in a domain.
True
Application whitelisting can improve security by preventing unapproved applications from being installed and run on the device.
True
Asymmetric encryption is more commonly known as public key cryptography
True
Digital certificates can be used to verify an individual's identity through e-mail.
True
Firewalls can act as flood guards, detecting and mitigating specific types of DoS/DDoS attacks.
True
IPv6 complexity increases operational challenges for correct deployment.
True
It is important to consider the legal implications of where you store your backups.
True
It is important to secure certificates because they can be used to fake your identity or in a cybersecurity attack.
True
One company can trust another company's certificate authority server.
True
