CIS2337 - Final (Ch. 12-23, 25) Study Quiz ?'s

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What does a host-based IDS monitor? activity on a specific host activity on the network itself a honeynet a digital sandbox

activity on a specific host

Which component of an HIDS must decide what activity is "okay" and what activity is "bad"? traffic collector analysis engine signature database examination collector

analysis engine

Which testing technique requires that the testers have no knowledge of the internal workings of the software being tested? black box testing gray box testing white box testing red box testing

black box testing

What is Point-to-point (P2P) connection?

communications with one endpoint on each end

Which term refers to a unique alphanumeric identifier for a user of a computer system? password username group policy object token

username

Which protection ring has the highest privilege level and acts directly with the physical hardware? 0 1 2 3

0

WiFi uses which frequency spectrum?

2.4 GHz and 5 GHz

WiFi series refers to:

802.11 standard

If the root CA's private key were compromised, what would happen? Entities within the hierarchical trust model and end users would be unaffected. Entities within the hierarchical trust model would also be compromised, but users would be unaffected. All entities within the hierarchical trust model would be drastically affected. Only the root CA would be affected.

All entities within the hierarchical trust model would be drastically affected.

BIOS stands for: Biological input output standard Basic input output system Basic integrated operating system Basic information operating system

Basic input output system

The _______________ is a list of known vulnerabilities in software systems. Authority Revocation List (ARL) Common Vulnerabilities and Exposures (CVE) enumeration Certificate Revocation List (CRL) Filesystem Access Control List (FACL)

Common Vulnerabilities and Exposures (CVE) enumeration

Backups can prevent a security event from occurring. True False

False

From a forensics perspective, Linux systems have the same artifacts as Windows systems. True False

False

TCP is a connectionless protocol. True False

False

TPM is: Hardware security solution on the motherboard Hardening system self-encrypting drives full drive encryption

Hardware security solution on the motherboard

What is an advantage of a host-based IDS? It can reduce false-positive rates. Its signatures are broader. It can examine data before it is decrypted. It is inexpensive to maintain in the enterprise.

It can reduce false-positive rates.

Which action is an example of transferring risk? Management purchases insurance for the occurrence of an attack. Management applies controls that reduce the impact of an attack. Management decides to accept responsibility for the risk if it does happen. Management decides against deploying a module that increases risk.

Management purchases insurance for the occurrence of an attack.

Which type of attack can be used to execute arbitrary commands in a database? DB manipulation DB injection SQL injection XML injection

SQL injection

The _______________ is a set of tools that can be used to target attacks at the people using systems; it has applets that can be used to create phishing e-mails, Java attack code, and other social engineering-type attacks. WireShark Toolkit Metasploit Suite Social-Engineering Toolkit Burp Suite

Social-Engineering Toolkit

Which cloud computing service model involves the offering of software to end users from within the cloud? Platform as a Service (PaaS) Software as a Service (SaaS) Infrastructure as a Service (IaaS) Security as a Service (SaaS)

Software as a Service (SaaS)

Which statement describes the main difference between TCP and UDP? UDP is a more widely used protocol. TCP packets are smaller and thus more efficient to use. TCP is connection oriented, whereas UDP is connectionless. UDP is considered to be more reliable because it performs error checking.

TCP is connection oriented, whereas UDP is connectionless.

What is an advantage of a network-based IDS? This type of IDS can examine data after it has been decrypted. This type of IDS coverage requires fewer systems. This type of IDS can be very application specific. This type of IDS can determine whether or not an alarm may impact a specific system.

This type of IDS coverage requires fewer systems.

A physical hard disk drive will persist data longer than a cache. True False

True

NIDSs are typically deployed so that they can monitor traffic in and out of an organization's major links. True False

True

Which document outlines what the loss of any critical functions will mean to the organization? business continuity plan (BCP) disaster recovery plan (DRP) business impact analysis (BIA) succession plan

business impact analysis (BIA)

What is a method of establishing the authenticity of specific objects, such as an individual's public key or downloaded software? tokens multifactor authentication mutual authentication certificates

certificates

(same) Which term refers to ensuring proper procedures are followed when modifying the IT infrastructure? qualitative risk assessment quantitative risk assessment configuration management change management

change management

Which term refers to ensuring proper procedures are followed when modifying the IT infrastructure? qualitative risk assessment quantitative risk assessment configuration management change management

change management

Which cloud system is defined as one where several organizations with a common interest share a cloud environment for the specific purposes of the shared endeavor? private hybrid community public

community

Evidence that is both legally qualified and reliable is known as __________. sufficient evidence competent evidence relevant evidence real evidence

competent evidence

Which process involves implementing security tools and policies to ensure your container is running as intended? container security log aggregation secret management edge computing

container security

SYN flooding is an example of a __________. viral attack denial-of-service attack logic bomb trojan horse

denial-of-service attack

Business records, printouts, and manuals are which type of evidence? direct evidence real evidence documentary evidence demonstrative evidence

documentary evidence

Which type of computing brings processing closer to the edge of the network, which optimizes web applications and IoT devices? implicit edge recovery hybrid

edge

The movement to an account that enables root or higher-level privilege is known as: escalation of privilege encryption layered tunneling hashing

escalation of privilege

Which rule applies to evidence obtained in violation of the Fourth Amendment of the Constitution? best evidence rule exclusionary rule hearsay rule evidentary rule

exclusionary rule

Backups can prevent a security event from occurring. True False

false

Cryptography is the universal solution to all security problems. True False

false

During penetration testing, zero-day vulnerabilities will be established. True False

false

Least privilege refers to removing all controls from a system. True False

false

Service pack is the term for a small software update designed to address a specific problem, such as a buffer overflow in an application that exposes the system to attacks. True False

false

Tail is a utility designed to return the first lines of a file. True False

false

If you test something and it comes back negative, but it was in fact positive, then the result is a false positive. True False

false (false negative)

Clusters on a hard disk that are marked by the operating system as usable when needed are referred to as __________. free space slack space open space unused space

free space

Which backup technique requires a large amount of space and is considered to have a simple restoration process? delta differential incremental full

full

A(n) _______________ is a low-level program that allows multiple operating systems to run concurrently on a single host computer. cipher hypervisor subnet escrow

hypervisor

SSID (service set identifier )is:

name of the wireless network

Tangible objects that prove or disprove facts are what type of evidence? direct evidence real evidence documentary evidence demonstrative evidence

real evidence

Which term is used to describe the target time that is set for resuming operations after an incident? business continuity plan (BCP) recovery time objective (RTO) disaster recovery plan (DRP) recovery point objective (RPO)

recovery time objective (RTO)

Which term is used to describe the target time that is set for resuming operations after an incident? \ business continuity plan (BCP) recovery time objective (RTO) disaster recovery plan (DRP) recovery point objective (RPO)

recovery time objective (RTO)

What is malware? Always being cautious about executing programs Relies on lies and misrepresentation, which an attacker uses to trick an authorized user into providing information A network sniffer refers to software that has been designed for some nefarious purpose

refers to software that has been designed for some nefarious purpose

Which term refers to the possibility of suffering harm or loss? Risk Hazard Threat vector Threat actor

risk

Evidence that is convincing or measures up without question is known as __________. sufficient evidence competent evidence relevant evidence real evidence

sufficient evidence

Which component of an HIDS pulls in the information that the other components, such as the analysis engine, need to examine? traffic collector signature database expert knowledge database user interface and reporting

traffic collector

A computer system is attacked for one of two general reasons: it is specifically targeted by the attacker or it is a target of opportunity. True False

true

A qualitative risk assessment relies on judgment and experience. True False

true

All input validation that is essential for business reasons or for security should be performed on the server side of the client-server relationship, where it is free from outside influence and change. True False

true

Both ipconfig and ifconfig are command-line tools to manipulate the network interfaces on a system. True False

true

Rainbow tables include precomputed tables or hash values associated with passwords True False

true

Shimming attack is the process of putting a layer of code between the driver and the OS True False

true

The goal of the delta backup is to back up as little information as possible each time you perform a backup. True False

true

The presence of risks in a system is an absolute—they cannot be removed or eliminated. True False

true

WEP stands for Wired Equivalent Privacy (T/F)

true

Which term refers to characteristics of resources that can be exploited by a threat to cause harm? vulnerabilities preventive controls tangible impacts threat vectors

vulnerabilities

Which testing technique is performed by testers who have detailed knowledge of the application and can thus test the internal structures within an application for bugs, vulnerabilities, and so on? blacklisting penetration testing auditing white box testing

white box testing

Which term is used to define vulnerabilities that are newly discovered and not yet addressed by a patch? exposure factor least privileged intangible asset zero day

zero day

What is operating system? Basic software that handles things such as input, output, display, memory management, and all the other highly detailed tasks Process used to maintain systems in an up-to-date fashion Prevents their use by unauthorized users, improves system throughput, and increases security Configuring extra security measures

Basic software that handles things such as input, output, display, memory management, and all the other highly detailed tasks


Set pelajaran terkait

ATI wellness, Health promotion, and disease prevention test

View Set

AIS Chapters 5,6 and 7 (12,13 and 14)

View Set

Public Speaking Chapter 6: Analyzing the Audience

View Set

test 3: science of climate change

View Set