CPSC140 Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Qualitative

Beth is conducting a risk assessment. She is trying to determine the impact a security incident will have on the reputation of her company. What type of risk assessment is best suited to this type of analysis?

Decryption

Betty receives a ciphertext message from her colleague Tim. What type of function does Betty need to use to read the plaintext message?

Formatting

Bob is preparing to dispose of magnetic media and wishes to destroy the data stored on it. Which method is NOT a good approach for destroying data?

Fibre Channel over Ethernet (FCoE)

David would like to connect a fibre channel storage device to systems over a standard data network. What protocol can he use?

Warm site

Dawn is selecting an alternative processing facility for her organization's primary data center. She would like to have a facility that balances cost and switchover time. What would be the best option in this situation?

Authentication

During what phase of a remote access connection does the end user prove his or her claim of identity?

WiFi

Gary is configuring a smartphone and is selecting a wireless connectivity method. Which approach will provide him with the highest speed wireless connectivity?

Integrity

Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve?

Secure Sockets Layer (SSL)

Gina is preparing to monitor network activity using packet sniffing. Which technology is most likely to interfere with this effort if used on the network?

25

Henry is creating a firewall rule that will allow inbound mail to the organization. What TCP port must he allow through the firewall?

Presentation

Hilda is troubleshooting a problem with the encryption of data. At which layer of the OSI Reference Model is she working?

20%

Kim is the risk manager for a large organization. She is evaluating whether the organization should purchase a fire suppression system. She consulted a variety of subject matter experts and determined that there is a 1 percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $2 million in damage to the facility, which has a $10 million value. Given this scenario, what is the exposure factor?

Authentication

Passwords are used for the purpose of ___________.

transfer

Purchasing an insurance policy is an example of the ____________ risk management strategy.

FALSE

Regarding security controls, the four most common permission levels are poor, permissive, prudent, and paranoid.

Audit

Ricky is reviewing security logs to independently assess security controls. Which security review process is Ricky engaging in?

FALSE

Risk refers to the amount of harm a threat exploiting a vulnerability can cause.

Passive wiretap

Tony is working with a law enforcement agency to place a wiretap pursuant to a legitimate court order. The wiretap will monitor communications without making any modifications. What type of wiretap is Tony placing?

Virtual LAN (VLAN)

Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use?

pipelining

enable the CPU to work on multiple instructions in parallel during the fetch execute cycle

Firewalls

not designed to combat malware

Service level agreement (SLA)

Biyu is making arrangements to use a third-party service provider for security services. She wants to document a requirement for timely notification of security breaches. What type of agreement is most likely to contain formal requirements of this type?

80

Bob is using a port scanner to identify open ports on a server in his environment. He is scanning a web server that uses Hypertext Transfer Protocol (HTTP). Which port should Bob expect to be open to support this service?

Payment Card Industry Data Security Standard (PCI DSS)

Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity and includes provisions that Gwen should implement before accepting credit card transactions?

Parallel test

Holly would like to run an annual major disaster recovery test that is as thorough and realistic as possible. She also wants to ensure that there is no disruption of activity at the primary site. What option is best in this scenario?

26^10

How many different passwords are possible if we must use exactly 10 lowercase letters?

Access to a higher level of expertise

Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?

22

Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a protocol that uses secure, encrypted connections?

Rootkit

What are malicious software programs designed to be hidden from normal methods of detection.

Virus

What do we call a software/malware that attaches itself to or copies itself into another program on a computer?

Worm

What do we call a software/malware that is a self-contained program that replicates and sends copies of itself to other computers without any user input or action?

operating system

What, or who, determines where the instructions of a program will be placed in RAM when it is about to be run?

FALSE

A packet-filtering firewall remembers information about the status of a network communication.

FALSE

A remediation liaison makes sure all personnel are aware of and comply with an organization's policies.

Incident

Adam's company recently suffered an attack where hackers exploited an SQL injection issue on their web server and stole sensitive information from a database. What term describes this activity?

Recovery Time Objective (RTO)

Alan is developing a business impact assessment for his organization. He is working with business units to determine the maximum allowable time to recover a particular function. What value is Alan determining?

Alice's public key

Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?

Mantraps

Brian needs to design a control that prevents piggybacking, only allowing one person to enter a facility at a time. What type of control would best meet this need?

FALSE

Cryptographic key distribution is typically done by phone.

half of its bits

If you change a single bit of a file then you only expect ______of its hash value to change.

SQL injection

In what type of attack does the attacker send unauthorized commands directly to a database?

Security Information and Event Management (SIEM)

Isaac is responsible for performing log reviews for his organization in an attempt to identify security issues. He has a massive amount of data to review. What type of tool would best assist him with this work?

Authorization

Janet is identifying the set of privileges that should be assigned to a new employee in her organization. Which phase of the access control process is she performing?

Collaboration

Jody would like to find a solution that allows real-time document sharing and editing between teams. Which technology would best suit her needs?

Software as a Service (SaaS)

Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system, hosted at the vendor's site, using a web browser. Which service delivery model is Kaira's company using?

hardware

RAM is:

Phishing

Roger's organization received a mass email message that attempted to trick users into revealing their passwords by pretending to be a help desk representative. What category of social engineering is this an example of?

Bring Your Own Device (BYOD)

Ron is the IT director at a medium-sized company and is constantly bombarded by requests from users who want to select customized mobile devices. He decides to allow users to purchase their own devices. Which type of policy should Ron implement to include the requirements and security controls for this arrangement?

Hub

Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues?

13

The Children's Online Privacy Protection Act (COPPA) restricts the collection of information online from children. What is the cutoff age for COPPA regulation?

FALSE

The Transport Layer of the OSI Reference Model creates, maintains, and disconnects communications that take place between processes over the network.

Preventive

Violet deploys an intrusion prevention system (IPS) on her network as a security control. What type of control has Violet deployed?

Unencrypted email

What is NOT an effective key distribution method for plaintext encryption keys?

System configurations

What is NOT generally a section in an audit report?

Request, impact assessment, approval, build/test, implement, monitor

What is the correct order of steps in the change control process?

255

What is the maximum value for any octet in an IPv4 IP address?

Place the operating system in RAM

What is the purpose of the boot process?

Factoring large primes

What mathematical problem forms the basis of most modern cryptographic algorithms?

Dynamic Host Configuration Protocol (DHCP)

What protocol is responsible for assigning IP addresses to hosts on most networks?

Wired Equivalent Privacy (WEP)

What standard is NOT secure and should never be used on modern wireless networks?

Maximum Tolerable Downtime (MTD)

What term describes the longest period of time that a business can survive without a particular critical system?

Residual risk

What term describes the risk that exists after an organization has performed all planned countermeasures and controls?

Hash

What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature?

Trojan Horse

What type of malicious software masquerades as legitimate software to entice the user to run it?

Wide Area Network (WAN)

What type of network connects systems over the largest geographic area?

Switch

What type of network device normally connects directly to endpoints and uses MAC-based filtering to limit traffic flows?

System integrity monitoring

What type of security monitoring tool would be most likely to identify an unauthorized change to a computer system?

Nonrepudiation

When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve?

/etc/shadow

Where are hashed passwords stored on a linux system?

Interoperability

Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to communicate in a standard fashion?

Checklist

Which audit data collection method helps ensure that the information-gathering process covers all relevant areas?

Federal Information Security Management Act (FISMA)

Which compliance obligation includes security requirements that apply specifically to federal government agencies in the United States?

RAM

Which data source comes first in the order of volatility when conducting a forensic investigation?

Guideline

Which element of the security policy framework offers suggestions rather than mandatory actions?

Policy

Which element of the security policy framework requires approval from upper management and applies to the entire organization?

Risk = Threat x Vulnerability

Which formula is typically used to describe the components of information security risks?

Resumes of system administrators

Which item is an auditor least likely to review during a system controls audit?

Password Protection

Which mitigation plan is most appropriate to limit the risk of unauthorized access to workstations?

Intrusion Prevention System (IPS)

Which network device is capable of blocking network connections that are identified as potentially malicious?

Health Insurance Portability and Accountability Act (HIPAA)

Which one of the following governs the use of Internet of Things (IoT) by health care providers, such as physicians and hospitals?

E-commerce

Which one of the following is NOT an area of critical infrastructure where the Internet of Things (IoT) is likely to spur economic development in less developed countries?

Access control lists

Which one of the following is the best example of an authorization control?

Personal Information Protection and Electronic Documents Act (PIPEDA)

Which regulatory standard would NOT require audits of companies in the United States?

Applying strong encryption

Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would jeopardize confidentiality?

Deidentification

Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data in aggregate?

Vulnerability

Which term describes a weakness in the design or software of a system that can be exploited?

Threat

Which term describes an action that can damage or compromise an asset?

Zero-day attack

Which type of attack against a web application uses a newly discovered vulnerability that is not patchable?

FALSE

With adequate security controls and defenses, an organization can often reduce its risk to zero.

White-hat hacker

Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission from the clients to perform this testing as part of a paid contract. What type of person is Yuri?

Salting

used to hinder a rainbow table attack

Diffie-Hellman

Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key?

Bob's public key

Alice would like to send a message to Bob securely and wishes to encrypt the contents of the message. What key does she use to encrypt this message?

Black-box test

Fran is conducting a security test of a new application. She does not have any access to the source code or other details of the application she is testing. What type of test is Fran conducting?

Separation of duties

Karen is designing a process for issuing checks and decides that one group of users will have the authority to create new payees in the system while a separate group of users will have the authority to issue checks to those payees. The intent of this control is to prevent fraud. Which principle is Karen enforcing?

Spim

Users throughout Alison's organization have been receiving unwanted commercial messages over the organization's instant messaging program. What type of attack is taking place?

OSI Reference Model

Application, Presentation, Session, Transport, Network, Data Link, Physical

Evil twin

Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcasting the security set identifier (SSID) of an open network owned by the coffee shop in his lobby. Which type of attack is likely taking place?

Address Resolution Protocol (ARP) poisioning

Brian notices an attack taking place on his network. When he digs deeper, he realizes that the attacker has a physical presence on the local network and is forging Media Access Control (MAC) addresses. Which type of attack is most likely taking place?

Does the firewall properly block unsolicited network connection attempts?

Curtis is conducting an audit of an identity management system. Which question is NOT likely to be in the scope of his audit?

Hashing

sha512 is used for:

software

the operating system is:


संबंधित स्टडी सेट्स

Français 3 Unité 2.5 Le monde du travail #2

View Set

Ethos, Pathos, Logos & Persuasive techniques

View Set

Questions to ask during an interview

View Set

AP Classroom Bio Psych Progress Check

View Set