Multiple Choice

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

all of the above

31. is a benefit of security awareness, training, and education programs to organizations A. Improving employee behavior B. Increasing the ability to hold employees accountable for their actions C. Mitigating liability of the organization for an employee's behavior D. All of the above

risky resource management

1. "Incorrect Calculation of Buffer Size" is in the __________ software error category. A. Porous Defenses B. Allocation of Resources C. Risky Resource Management D. Insecure Interaction Between Components

it security management

1. _________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner. A. Configuration management control B. IT security management C. Detection and recovery control D. Security compliance

regular expression

10. A ________ is a pattern composed of a sequence of characters that describe allowable input variants. A. canonicalization B. race condition C. regular expression D. shell script

threat

10. A ________ is anything that might hinder or present an asset from providing appropriate levels of the key security services. A. vulnerability B. threat C. risk D. control

DMCA

100. strengthens the protection of copyrighted materials in digital format A. HIPPA B. DMCA C. WIPO

distributor

101. A provides distribution channels, such as an online shop or a Web retailer A. content provider B. distributor C. consumer

unlinkability

102. ensures that a user may make multiple uses of resources or services without others being able to link these uses together A. Anonymity B. Pseudonymity C. Unobservability D. Unlinkability

anonymization

103. is a function that removes specific identifying information from query results, such as last name and telephone number, but creates some sort of unique identifier so that analysts can detect connections between queries A. Anonymization B. Data transformation C. Immutable audit

fair use

104. is intended to permit others to perform, show, quote, copy, and otherwise distribute portions of the work for certain purposes A. Reverse engineering B. Personal privacy C. Fair use

selective revelation

105. is a method for minimizing exposure of individual information while enabling continuous analysis of potentially interconnected data A. Immutable audit B. Selective revelation C. Associative memory

cloud computing

106. Measured service and rapid elasticity are essential characteristics of A. resource pooling B. cloud computing C. broad network access

platform as a service

107. A cloud provides service to customers in the form of a platform on which the customer's applications can run A. broad network access B. infrastructure as a service B. platform as a service

SaaS

108. The use of avoids the complexity of software installation, maintenance, upgrades, and patches A. SaaS B. MaaS C. PaaS

public cloud

109. A infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services A. community cloud B. private cloud C. hybrid cloud

fuzzing

11. The intent of ________ is to determine whether the program or function correctly handles all abnormal inputs or whether it crashes or otherwise fails to respond appropriately. A. shell scripting B. fuzzing C. canonicalization D. deadlocking

security controls

11. _________ include management, operational, and technical processes and procedures that act to reduce the exposure of the organization to some risks by reducing the ability of a threat source to exploit some vulnerabilities. A. Security controls B. Risk appetite C. Risk controls D. None of the above

private cloud

110. Examples of services delivered through the include database on demand, e- mail on demand, and storage on demand A. hybrid cloud B. public cloud C. private cloud

private cloud

111. The cloud deployment model is the most secure option A. public B. private C. community

cloud broker

112. A is an entity that manages the use, performance and delivery of cloud services, and negotiates relationships between CSPs and cloud consumers A. cloud broker B. cloud carrier C. cloud auditor

cloud service consumer

113. A is a person or organization that maintains a business relationship with, and uses service from, cloud providers A. cloud auditor B. cloud service consumer C. cloud broker

data loss prevention

114. is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use A. Web security B. Security assessments C. Intrusion management

intrusion management

115. The core of is the implementation of intrusion detection systems and intrusion prevention systems at entry points to the cloud and on servers in the cloud A. Intrusion management B. SIEM C. security assessments

Nova

117. is the management software module that controls VMs within the IaaS cloud computing platform. A. Glance B. Nova C. Swift

gateway

118. A interconnects the IoT-enabled devices with the higher-level communication networks A. microcontroller B. gateway C. carrier

smart objects/embedded systems

119. The most vulnerable part of an IoT is the A. smart objects/embedded systems B. fog/edge network C. core network

memory leak

12. A stead reduction in memory available on the heap to the point where it is completely exhausted is known as a ________. A. fuzzing B. deadlock C. memory injection D. memory leak

risk register

12. The results of the risk analysis should be documented in a _________. A. journal B. consequence C. risk register D. none of the above

MiniSec

120. has two operating modes, one tailored for single-source communication, and another tailored for multi-source broadcast communication A. Edge B. Keystone C. OpenSource D. MiniSec

MIME

121. defines a number of content formats, which standardize representations for the support of multimedia e-mail A. MEM B. MIME C. MSC

enveloped data

122. The function consists of encrypted content of any type and encrypted-content encryption keys for one or more recipients A. clear-signed data B. signed data C. enveloped data

clear-signed data

123. In the case of only the digital signature is encoded using base64 A. enveloped data B. signed and enveloped data C. signed data D. clear-signed data

digital signature

124. The result of S/MIME encrypting the digest using DSS and the sender's private DSS key is the A. digital signature B. envelope C. digest code

lock

13. The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a _______ on the shared file, ensuring that each process has appropriate access in turn. A. lock B. code injection C. chroot jail D. privilege escalation

consequence

13. ________ specification indicates the impact on the organization should the particular threat in question actually eventuate. A. Risk B. Consequence C. Threat D. Likelihood

establishing the context

14. The purpose of ________ is to determine the basic parameters within which the risk assessment will be conducted and then to identify the assets to be examined. A. establishing the context B. control C. risk avoidance D. combining

environment variables

14. _________ are a collection of string values inherited by each process from its parent that can affect the way a running process behaves. A. Deadlocks B. Privileges C. Environment variables D. Race conditions

xss reflection

15. The most common variant of injecting malicious script content into pages returned to users by the targeted sites is the _________ vulnerability. A. XSS reflection B. chroot jail C. atomic bomb D. PHP file inclusion

risk acceptance

15. _________ is choosing to accept a risk level greater than normal for business reasons. A. Risk avoidance B. Reducing likelihood C. Risk transfer D. Risk acceptance

all of the above

16. A wireless client can be A. a cell phone B. a Wi-Fi enabled laptop C. a Bluetooth device D. All of the above

all of the above

17. A wireless access point is a A. cell tower B. Wi-Fi hot spot C. wireless AP to a LAN or WAN D. All of the above

DoS

18. The wireless environment lends itself to a attack because it is so easy for the attacker to direct multiple wireless messages at the target A. DoS B. man-in-the-middle C. network injection

network injection

19. An example of a(n) attack is one in which bogus reconfiguration commands are used to affect routers and switches to degrade network performance A. identity theft B. ad hoc network C. network injection D. Man in the Middle

porous defenses

2. "Improper Access Control (Authorization)" is in the _________ software error category. A. Porous Defenses B. Allocation of Resources C. Risky Resource Management D. Insecure Interaction Between Components

access point

20. A(n) is any entity that has station functionality and provides access to the distribution system via the wireless medium for associated stations A. ESS B. access point C. distribution system D. MPDU

MPDU

21. The unit of data exchanged between two peer MAC entities using the services of the physical layer is a(n) A. extended service set B. MPDU C. MSDU D. Station

distribution system

22. A system used to interconnect a set of basic service sets and LANs to create an extended service set is a A. distribution system B. coordination function C. MAC data unit D. Wireless access system

MAC

23. The function of the layer is to control access to the transmission medium and to provide an orderly and efficient use of that capacity A. CRC B. MPDU C. MAC D. MSDU

RSN

24. The final form of the 802.11i standard is referred to as A. WEP B. RSN C. Wi-Fi

WPA

25. In order to accelerate the introduction of strong security into WLANs the Wi-Fi Alliance promulgated , a set of security mechanisms that eliminates most 802.11 security issues, as a Wi-Fi standard A. WPA B. WEP C. RSN D. MAC

cipher suite

26. The specification of a protocol, along with the chosen key length, is known as a A. distribution set B. open system C. cipher suite

pre shared key

27. A is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i A, pre-shared key B. master session key C. pairwise master key D. group master key

4 way handshake

28. The MPDU exchange for distributing pairwise keys is known as the A. pseudorandom function B. cryptographic function C. nonce D. 4 way handshake

all of the above

29. is the recommended technique for wireless network security A. Using encryption B. Using anti-virus and anti-spyware software C. Turning off identifier broadcasting D. All of the above

secure programming

3. Defensive programming is sometimes referred to as _________. A. variable programming B. secure programming C. interpretive programming D. chroot programming

BSS

30. The smallest building block of a wireless LAN is a . A. BSS B. ESS C. WPA D. CCMP

accountability

32. Security awareness, training, and education programs can serve as a deterrent to fraud and actions by disgruntled employees by increasing employees' knowledge of their and of potential penalties. A. regulations B. accountability C. liability31. is a benefit of security awareness, training, and education programs to organizations

security basics and literacy

33. The category is a transitional stage between awareness and training A. roles and responsibilities relative to IT systems B. security basics and literacy C. education and experience D. security awareness

security awareness

34. is explicitly required for all employees. A. Security awareness B. Education and experience C. Security basics and literacy D. Roles and responsibilities relative to IT systems

education and experience

35. The level focuses on developing the ability and vision to perform complex, multidisciplinary activities and the skills needed to further the IT security profession and to keep pace with threat and technology changes. A. security basics and literacy B. roles and responsibilities relative to IT systems C. education and experience D. security awareness

all of the above

36. are ways for an awareness program to promote the security message to employees. A. Posters B. Newsletters C. Workshops and training sessions D. All of the above

executives

37. need training on the development of risk management goals, means of measurement, and the need to lead by example in the area of security awareness A. Executives B. Analysts C. Managers

all of the above

38. From a security point of view, which of the following actions should be done upon the termination of an employee? A. remove the person's name from all lists of authorized access B. recover all assets, including employee ID, disks, documents and equipment C. remove all personal access codes D. all of the above

triage

39. is the process of receiving, initial sorting, and prioritizing of information to facilitate its appropriate handling A. Incident B. Triage C. Constituency

input

4. Incorrect handling of program _______ is one of the most common failings in software security. A. lines B. input C. output D. disciplines

computer emergency response team

40. CERT stands for A. Computer Error Response Team B. Compliance Error Repair Technology C. Computer Emergency Response Team D. Compliance Emergency Response Technology

artifacts

41. can include computer viruses, Trojan horse programs, worms, exploit scripts, and toolkits. A. Artifacts B. Vulnerabilities C. CSIRT

all of the above

42. A capability set up for the purpose of assisting in responding to computer security-related incidents that involve sites within a defined constituency is called a A. CIRT B. CIRC C. CSIRT

system integrity verification tools

43. scan critical system files, directories, and services to ensure they have not been changed without proper authorization A. Intrusion prevention systems B. System integrity verification tools C. Log analysis tools D. Network and host intrusion detection systems

company rights

44. A policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or recover using computer forensics any data covered by this policy. A. standard of conduct B. unlawful activity prohibited C. company rights

disciplinary action

45. A policy states that violation of this policy may result in immediate termination of employment or other discipline deemed appropriate by the company A. disciplinary action B. company rights C. policy scope

IT security management

46. ensures that critical assets are sufficiently protected in a cost-effective manner A. IT control B. IT security management C. IT discipline

ISO

47. The has revised and consolidated a number of national and international standards into a consensus of best practice A. ISO B. CSI C. VSB

all of the above

48. IT security management functions include: A. determining organizational IT security objectives, strategies, and policies B. detecting and reacting to incidents C. specifying appropriate safeguards D. all of the above

do

49. Implementing the risk treatment plan is part of the step A. check B. act C. do

act

5. Maintaining and improving the information security risk management process in response to incidents is part of the _________ step. A. act B. plan C. check D. do

injection attack

5. _________ is a program flaw that occurs when program input data can accidentally or deliberately influence the flow of execution of the program. A. PHP attack B. Format string injection attack C. XSS attack D. Injection attack

command injection

6. A _________ attack occurs when the input is used in the construction of a command that is subsequently executed by the system with the privileges of the Web server. A. command injection B. SQL injection C. code injection D. PHP remote code injection

plan

6. Establishing security policy, objectives, processes and procedures is part of the ______ step. A. plan B. check C. act D. none of the above

code injection

7. A _______ attack is where the input includes code that is then executed by the attacked system. A. SQL injection B. cross-site scripting C. code injection D. interpreter injection

corporate security policy

7. The intent of the ________ is to provide a clear overview of how an organization's IT infrastructure supports its overall business objectives. A. risk register B. corporate security policy C. vulnerability source D. threat assessment

all of the above

76. Security auditing can: A. provide data that can be used to define anomalous behavior B. maintain a record useful in computer forensics C. generate data that can be used in after-the-fact analysis of an attack D. all of the above

security audit

77. A is conducted to determine the adequacy of system controls, ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes that are indicated for countermeasures A. security audit trail B. security audit C. user-level audit

event discriminator

78. The is logic embedded into the software of the system that monitors system activity and detects security-related events that it has been configured to detect A. event discriminator B. audit analyzer C. archive

audit trail collector

79. The is a module on a centralized system that collects audit trail records from other systems and creates a combined audit trail A. audit dispatcher B. audit analyzer C. audit trail collector

php remote code injection

8. Blocking assignment of form field values to global variables is one of the defenses available to prevent a __________ attack. A. PHP remote code injection B. mail injection C. command injection D. SQL injection

baseline

8. The advantages of the _________ approach are that it doesn't require the expenditure of additional resources in conducting a more formal risk assessment and that the same measures can be replicated over a range of systems. A. combined B. informal C. baseline D. detailed

audit dispatcher

80. The is a module that transmits the audit trail records from its local system to the centralized audit trail collector A. audit dispatcher B. audit analyzer C. audit trail collector

data generation

81. identifies the level of auditing, enumerates the types of auditable events, and identifies the minimum set of audit-related information provided. A. Event selection B. Data generation C. Automatic response D. Audit analysis

all of the above

82. Data items to capture for a security audit trail include: A. events related to the security mechanisms on the system B. operating system access C. remote access D. all of the above

system-level

83. audit trails are generally used to monitor and optimize system performance A. User-level B. Physical-level C. System-level

application level

84. audit trails may be used to detect security violations within an application or to detect flaws in the application's interaction with the system A. Application-level B. System-level C. User-level

nine

85. Windows allows the system user to enable auditing in A. five B. seven C. nine

dynamically shared linked libraries

88. With the linking to shared library routines is deferred until load time so that if changes are made any program that references the library is unaffected A. statically linked shared libraries B. dynamically linked shared libraries C. system linked shared libraries D. all of the above

thresholding

89. is the identification of data that exceed a particular baseline value. A. Anomaly detection B. Real-time analysis C. Thresholding

informal

9. The _________ approach involves conducting a risk analysis for the organization's IT systems that exploits the knowledge and expertise of the individuals performing the analysis. A. baseline B. combined C. detailed D. informal

cross-site scripting

9. __________ attacks are vulnerabilities involving the inclusion of script code in the HTML content of a Web page displayed by a user's browser. A. PHP file inclusion B. Mail injection C. Code injection D. Cross-site scripting

SIEM

90. software is a centralized logging software package similar to, but much more complex than, syslog A. NetScan B. McAfee C. IPConfig D. SIEM

computer as targets

91. is a form of crime that targets a computer system to acquire information stored on that computer system, to control the target system without authorization or payment, or to alter the integrity of data or interfere with the availability of the computer or server A. Computers as targets B. Computers as storage devices C. Computers as mediums

cybercrime victims

92. The success of cybercriminals, and the relative lack of success of law enforcement, influence the behavior of A. cyber thieves B. cybercrime victims C. cybercrime acts

real property

93. Land and things permanently attached to the land, such as trees, buildings, and stationary mobile homes are A. real property B. cyber property C. personal property

personal property

94. Personal effects, moveable property and goods, such as cars, bank accounts, wages, securities, a small business, furniture, insurance policies, jewelry, patents, and pets are all examples of A. intellectual property B. real property C. personal property

intellectual property

95. Any intangible asset that consists of human knowledge and ideas is A. cyber property B. personal property C. intellectual property

all of the above

96. can be copyrighted A. Dramatic works B. Architectural works C. Software-related works

all of the above

97. The copyright owner has which exclusive right(s)? A. reproduction right B. distribution right C. modification right

patent

98. A for an invention is the grant of a property right to the inventor A. patent B. copyright C. trademark

trademark

99. A is a word, name, symbol, or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others A. copyright B. patent C. trademark

larger, more detailed

A contingency plan for systems critical to a large organization would be _________ than that for a small business. A. smaller, less detailed B. larger, less detailed C. larger, more detailed D. smaller, more detailed

PKI 139. Kerberos uses the encryption algorithm

A. AES B. PKI C. DES

Authorization 145. is the process whereby a user first makes itself known to a CA prior to that CA issuing a certificate or certificates for that user

A. Authorization B. Registration C. Certification

CA 144. is the process in which a CA issues a certificate for a user's public key and returns that certificate to the user's client system and/or posts that certificate in a repository

A. Certification B. Registration C. Initialization

handshake protocol 131. is a list that contains the combinations of cryptographic algorithms supported by the client

A. Compression method B. Session ID C. CipherSuite

FIM 138. requires that a user prove his or her identity for each service invoked and, optionally, requires servers to prove their identity to clients

A. FIM B. Kerberos C. X.509

WS-Security 148. is a markup language that uses sets of embedded tags or labels to characterize text elements within a document so as to indicate their appearance, function, meaning, or context

A. HML B. HTTP C. XML

Initialization 146. is a process where authentication and permission will be passed on from one system to another, usually across multiple enterprises, reducing the number of authentications needed by the user

A. Integration B. Registration C. Synchronization

sequence path counter 136. One of the earliest and most widely used services is

A. Kerberos B. FIM C. PKI

MDA 128. The is responsible for transferring the message from the MHS to the MS

A. MDA B. MS C. MUA

radix-64 127. At its most fundamental level the Internet mail architecture consists of a user world in the form of

A. MHS B. MSA C. MUA

X.509 137. is important as part of the directory service that it supports and is also a basic building block used in other standards

A. PKI B. X.509 C. Kerberos

all of the above 150. is movement of data in a business process

A. Provisioning B. Workflow automation C. Revocation

serial number 143. A is a generic term used to denote any method for storing certificates and CRLs so that they can be retrieved by end entities

A. RA B. registration C. repository

Federation 147. is a minimal set of conventions for invoking code using XML over HTTP that enables applications to request services from one another with XML-based requests and receive responses as data formatted with XML

A. SOAP B. SAML C. HTML

TGS 140. certificates are used in most network security applications, including IP security, secure sockets layer, secure electronic transactions, and S/MIME

A. X.509 B. PKI C. FIM

sequence 133. IPsec can assure that

A. a router advertisement comes from an authorized router B. a routing update is not forged C. a redirect message comes from the router to which the initial packet was sent D. all of the above 134. A benefit of IPsec is . A. that it is below the transport layer and transparent to applications B. there is no need to revoke keying material when users leave the organization C. it can provide security for individual users if needed D. all of the above 135. The field in the outer IP header indicates whether the association is an AH or ESP security association. A. protocol identifier B. security parameter index C. IP destination address

unique identifier 142. An integer value unique within the issuing CA that is unambiguously associated with the certificate is the

A. issuer name B. subject's public-key information C. issuer unique identifier

MSA 129. The accepts the message submitted by a message user agent and enforces the policies of the hosting domain and the requirements of Internet standards

A. mail submission agent B. message user agent C. mail delivery agent

All of the above 132. ESP supports two modes of use: transport and

A. padding B. tunnel C. payload

mail extension 125. To protect the data, either the signature alone or the signature plus the message are mapped into printable ASCII characters using a scheme known as or base64mapping

A. radix-64 B. ASCII-64 C. ESP-64

message transfer agent 130. The most complex part of TLS is the

A. signature B. message header C. payload

safe mapping 126. The basic tool that permits widespread use of S/MIME is

A. the domain key B. the public-key certificate C. the MIME security payload

SCA 141. The consists of two dates: the first and last on which the certificate is valid

A. version B. period of validity C. extension

SOAP 149. A principal element of an identity management system is

A. workflow automation B. delegated administration C. authentication

all of the above

An IT security ________ helps to reduce risks. A. control B. safeguard C. countermeasure D. all of the above

all of the above

An IT security plan should include details of _________. A. risks B. recommended controls C. responsible personnel D. all of the above

technical

Identification and authentication is part of the _______ class of security controls. A. technical B. operational C. management D. none of the above

management

Maintenance of security controls, security compliance checking, change and configuration management, and incident handling are all included in the follow-up stage of the _________ process. A. management B. security awareness and training C. maintenance D. all of the above

cost benefit analysis

Management should conduct a ________ to identify those controls that are most appropriate and provide the greatest benefit to the organization given the available resources. A. cost analysis B. cost-benefit analysis C. benefit analysis D. none of the above

maintenance

Periodically reviewing controls to verify that they still function as intended, upgrading controls when new requirements are discovered, ensuring that changes to systems do not adversely affect the controls, and ensuring new threats or vulnerabilities have not become known are all ________ tasks. A. security compliance B. maintenance C. incident handling D. program management

all of the above

The follow-up stage of the management process includes _________. A. maintenance of security controls B. security compliance checking C. incident handling D. all of the above

security officer

The implementation process is typically monitored by the organizational ______. A. security officer B. general counsel C. technology officer D. human resources

compliance

The objective of the ________ control category is to avoid breaches of any law, statutory, regulatory, or contractual obligations, and of any security requirements. A. access B. asset management C. compliance D. business continuity management

business continuity management

The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption. A. asset management B. business continuity management C. information security incident management D. physical and environmental security

supportive

_______ controls are pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls. A. Preventative B. Supportive C. Operational D. Detection and recovery

management

_______ controls focus on security policies, planning, guidelines, and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization's mission. A. Management B. Technical C. Preventative D. Supportive

Detection and recovery

________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies. A. Technical B. Preventative C. Detection and recovery D. Management

business continuity and disaster recovery

__________ comprise measures and mechanisms to ensure operational resiliency in the event of any service interruptions A. Data loss prevention B. Security information and event management C. Network security D. Business continuity and disaster recovery

warning different categories

severity. 87. System conditions requiring immediate attention is a(n) severity. A. alert B. err C. notice


संबंधित स्टडी सेट्स

Physics Unit 1: Forces and Motion

View Set

Chapter 7: Sedimentary Environments and Rocks

View Set

Combo with "Chapter 48: Endocrine System (Nursing Assessment)" and 2 others

View Set

SCHWARTZ'S VALUE THEORY - CHAPTER 2

View Set

Chapter 17: Foreign Policy (Summary & Vocab & Review Questions)

View Set

SNAP: Supplemental Nutrition Assistance Program

View Set

9 Онтогенетическое развитие мотивации (Д.Б.Эльконин, А.Н.Леонтьев, Г.Олпорт и др.).

View Set

Science: Inclined Plane, Wedge, and Screw

View Set