Final Exam 5320

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which protocol enables the secure transfer of data from a remote PC to a server by creating a VPN across a TCP\IP network? Answers PPPP PPTP PTPN PPTN

PPTP

Which port is used by HTTPS? Answers TCP port 465 TCP port 443 TCP port 80 TCP port 21

TCP port 443

What is WAP? Answers A technique used by laptop computers for wireless communication A method of encryption for wired or wireless communications A piece of hardware that implements 802.11g A lightweight protocol designed for mobile devices

A lightweight protocol designed for mobile devices

How does an IPS differ from an IDS? Answers An IPS is passive and an IDS is active. An IPS uses heuristics and an IDS is signature-based. An IPS will block, reject, or redirect unwanted traffic; an IDS will only send an alert. An IDS will block, reject, or redirect unwanted traffic; an IPS will only send an alert.

An IPS will block, reject, or redirect unwanted traffic; an IDS will only send an alert.

____________________ is a standardized schema for the communication of observed data from the operational domain.

Cyber Observable eXpression (CybOX)

Which attack uses a password-cracking program that employs a list of dictionary words to try to guess a password? Answers Dictionary attack Brute-force attack Hybrid attack Lister crack

Dictionary attack

In a(n) ____________________ backup, only the files that have changed since the last full backup was completed are backed up.

Differential

Which access control type would you use to allow a file or resource owner the ability to change the permissions on that file or resource? Answers Mandatory access control Discretionary access control Role-based access control Rule-based access control

Discretionary access control

What is the first rule of incident response investigation? Answers Know your audience. Do no harm. Trust your instincts. Document everything.

Do no harm.

____________________ consists of the documents, verbal statements, and material objects that are admissible in a court of law.

Evidence

Which protocol is designed to operate both ways, sending and receiving, and can enable remote file operations over a TCP IP connection? Answers Telnet SSH SNMP FTP

FTP

___________________ is the posting of location information into a data stream, signifying where the device was when the stream was created.

Geo-tagging

Which protocol is used for the transfer of hyperlinked data over the Internet, from web servers to browsers? Answers SSMTP HTTP SPOP3 HSTS

HTTP

Which term describes a computer language invented by Sun Microsystems as an alternative to Microsoft's development languages? Answers JavaScript Java Applet Authenticode

Java

The cryptographic standard proposed for 3G networks is known as __________. Answers EVDO MISTY1 HSPA KASUMI

KASUMI

Which term is a mechanism where traffic is directed to identical servers based on availability? Answers Backout planning Load balancing Clustering Mutual aid agreement

Load balancing

What term refers to a piece of code that sits dormant for a period of time until some event invokes its malicious payload? Answers Trojan Logic bomb Trigger virus Logic worm

Logic bomb

Which access control type would you use to grant permissions based on the sensitivity of the information contained in the objects? Answers Mandatory access control Discretionary access control Role-based access control Rule-based access control

Mandatory access control

Which type of alternative site generally use trailers, often rely on generators for their power but also factor in the requirement for environmental controls immediately? Answers Shared alternate site Mobile backup site Incremental site Reciprocal site

Mobile backup site

Which term refers to the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions? Answers Aggregation Big data analytics Network security monitoring (NSM) Security information and event management (SIEM)

Network security monitoring (NSM)

Which term refers to a hardware device that can be placed inline on a network connection and that will copy traffic passing through the tap to a second set of interfaces on the tap? Answers Wireshark Port mirroring Network tap SPAN

Network tap

Which RAID configuration, known as dedicated parity drive, stripes data across several disks but in larger stripes than in RAID 3 and uses a single drive for parity-based error checking? Answers RAID 2 RAID 4 RAID 5 RAID 6

RAID 4

Which strategy has the goal of defining the requirements for business continuity? Answers Business continuity plan (BCP) Recovery time objective (RTO) Disaster recovery plan (DRP) Recovery point objective (RPO)

Recovery time objective (RTO)

Which term refers to the examination of machines to determine what operating systems, services, and vulnerabilities exist? Answers

Scanning Enumeration Footprinting Pilfering: Scanning

__________ systems are a combination of hardware and software designed to classify and analyze security data from numerous sources. Answers Port scanning Honeypot Network security monitoring (NSM) Security information and event management (SIEM)

Security information and event management (SIEM)

Which account is used to run processes that do not require human intervention to start\stop\administer? Answers Shared Guest Service Privileged

Service

Which term is the use of packet sniffing to steal a session cookie? Answers Side-jacking Cache poisoning Code signing Inlining

Side-jacking

Which term refers to a critical operation in the organization upon which many other operations rely and which itself relies on a single item that, if lost, would halt this critical operation? Answers High availability clustering Load balancing Infrastructure as a Service (IaaS) Single point of failure

Single point of failure

____________________ is a form of authentication that involves the transferring of credentials between systems.

Single sign-on (SSO)

What is wireless networking? Answers The transmission of packetized data by means of fiber optic cable The transmission of packetized data via the Internet The transmission of packetized data without direct physical links The transmission of packetized data by means of private bands

The transmission of packetized data without direct physical links

events for the intrusion detection system (IDS) to examine To collect information in a central place, in a common format, to facilitate analysis and decision making

To collect information in a central place, in a common format, to facilitate analysis and decision making

The term ____________________ is the targeting of specific steps of a multistep process to a cyber incident, with the expressed purpose of disrupting the attack.

cyber kill chain

A honeypot is sometimes called a(n) __________. Answers antivirus packet SPAN digital sandbox firewall

digital sandbox

Clusters that are marked by the operating system as usable when needed are referred to as __________. Answers free space slack space open space unused space

free space

A(n) ____________________ is a connection to a Windows interprocess communications share (IPC$).

null session

If the characteristics of an incident include a large number of packets destined for different services on a machine, a(n) ____________________ is occurring.

port scan

A(n) ____________________ is calculated by measuring system time with an external clock such as a Network Time Protocol (NTP) server.

record time offset

A(n) ____________________ is a 32-bit number established by the host that is incremented for each packet sent.

sequence number

Making data look like it has come from a different source is called __________. Answers sniffing a man-in-the-middle attack a replay attack spoofing

spoofing

Which term refers to a unique alphanumeric identifier for a user of a computer system? Answers Password Username Group policy object Token

Username

____________________ started with people using chalk on sidewalks to mark some of the wireless networks they found.

War-chalking

Which alternative site is designed to be operational within a few days? Answers Hot site Warm site Cold site Reciprocal site

Warm site

____________________ is the name given to a broad collection of application programming interfaces (APIs), protocols, and programs developed by Microsoft to download and execute code automatically over an Internet-based channel.

ActiveX

In the case of an FTP server, which account allows unlimited public access to the files and is commonly used when you want to have unlimited distribution? Answers Root Anonymous Administrator Public

Anonymous

Correct Which term refers to the ability to distribute the processing load over two or more systems? Answers High availability clustering Load balancing Infrastructure as a Service (IaaS) Single point of failure

Load balancing

__________ relies on lies and misrepresentation, which an attacker uses to trick an authorized user into providing information or access the attacker would not normally be entitled to. Answers Social engineering User exploitation War-driving Indirect attack

Social engineering

Question 7 ____________________ is the use of all resources to make determinations.

Strategic intelligence

Which term describes a proactive plan for personnel substitutions in the event that the primary person is not available to fulfill their assigned duties? Answers Risk assessment Succession planning Business continuity planning Business impact analysis

Succession planning

A(n) ____________________ has the ability to copy network traffic passing through one or more ports on a switch or one or more VLANs on a switch and forward that copied traffic to a port designated for traffic capture and analysis.

Switched Port Analyzer (SPAN)

events for the IDS to examine? Answers Traffic collector Signature database Expert knowledge database User interface and reporting

Traffic collector

Which term describes a collection of technologies that is designed to make Web sites more useful for users? Answers ActiveX Java Web 2.0 Common Gateway Interface (CGI)

Web 2.0

Which term refers to a specific technique of using an HTTP client to handle authentication on a wireless network? Answers Captive portal Walled-off Walled-on Public Wi-Fi

Captive portal

What is one security issue associated with WTLS? Answers The specifications do not allow connections without high security. WTLS cannot cope with small amounts of memory. WTLS cannot cope with limited processor capacity. Clients with low memory or CPU capabilities cannot support encryption.

Clients with low memory or CPU capabilities cannot support encryption.

____________________ was the original method for having a Web server execute a program outside the Web server process, yet on the same server.

Common Gateway Interface (CGI)

Which term implies the concept of "don't keep what you don't need"? Answers Hardening Least common mechanism Least privilege Data minimization

Data minimization

What type of evidence is used to aid a jury and may be in the form of a model, experiment, chart, and so on, to indicate that an event occurred? Answers Direct evidence Real evidence Documentary evidence Demonstrative evidence

Demonstrative evidence

0 out of 1.25 points Physical memory storage devices can be divided into a series of containers; each of these containers is called a(n) ____________________.

Partition

Which access control type allows a company to restrict employee logon hours? Answers Mandatory access control Discretionary access control Role-based access control Rule-based access control

Rule-based access control

____________________ is the use of terrestrial transmitters and receivers and satellites in orbit to transfer the signals.

SATCOM

Johnny receives a "new version" of the game Solitaire in an e-mail. After running the program, a backdoor is installed on his computer without his knowledge. What kind of an attack is this? Answers Logic bomb Hoax Trojan Worm

Trojan

Which ports are used by Remote Authentication Dial-In User Service (RADIUS) for authentication and accounting? Answers TCP port 1812 for authentication and TCP port 1813 for accounting TCP port 1812 for accounting and TCP port 1813 for authentication UDP port 1812 for authentication and UDP port 1813 for accounting UDP port 1812 for accounting and UDP port 1813 for authentication

UDP port 1812 for authentication and UDP port 1813 for accounting

Which port is used to establish the Layer 2 Tunneling Protocol (L2TP)? Answers UDP port 1701 TCP port 1701 TCP port 1107 TCP port 1217

UPD port 1701

How is quarantine accomplished? Answers With the erection of firewalls that restrict communication between machines By rebooting the infected machine as many times as needed By encrypting the infected data on the network's hard drive With periodic patches of the infected systems

With the erection of firewalls that restrict communication between machines

When analyzing computer storage components, a system specially designed for forensic examination, known as a forensic____________________, can be used.

Workstation

A(n) ____________________ is an 802.11 management frame for the network and contains several different fields, such as the time stamp and beacon interval, but most importantly the SSID.

beacon frame

____________________ is a system that uses digital signatures and allows Windows users to determine who produced a specific piece of code and whether or not the code has been altered.

Authenticode

The term ____________________ is used to refer to programs that attackers install after gaining unauthorized access to a system, ensuring that they can continue to have unrestricted access to the system, even if their initial access method is discovered and blocked.

Backdoor

Which attack technique uses Bluetooth to establish a serial connection to a device that allows access to the full AT command set? Answers Bluejacking Bluesnarfing Bluebugging Bluetooth DOS

Bluebugging

What is an advantage of detecting indicators of compromise (IOCs)? Answers Detecting IOCs is a quick way to jumpstart a response element. Detecting IOCs allows law enforcement to identify the adversary's exact location. Detecting IOCs allows an organization to safely identify the necessary patches to apply. Detecting IOCs is a quick way to perform a safe penetration test.

Detecting IOCs is a quick way to jumpstart a response element.

Which term refers to a key measure used to prioritize actions throughout the incident response process? Answers Information criticality Information scalability Footprinting Steganography

Information criticality

Which of the following has the least volatile data? Answers CPU storage RAM Hard disk Kernel table

Hard disk

Evidence offered by a witness that is not based on the personal knowledge of the witness, but is being offered to prove the truth of the matter asserted, falls under which rule of evidence? Answers Best evidence rule Exclusionary rule Hearsay rule Relevant evidence rule

Hearsay rule

____________________ refers to the ability to maintain availability of data and operational processing (services) despite a disrupting event.

High availability

Which term defines a collection of two or more honeypots? Answers Antivirus software SPAN Protocol analyzer Honeynet

Honeynet

A(n) ____________________ is an artificial environment where attackers can be contained and observed, without putting real systems at risk.

Honeypot

What name is given to a logical storage unit that is subsequently used by an operating system? Answers Cluster Partition Register Segment

Partition

Bob gets an e-mail addressed from his bank, asking for his user ID and password. He then notices that the e-mail has poor grammar and incorrect spelling. He calls up his bank to ask if they sent the e-mail, and they promptly tell him they did not and would not ask for that kind of information. What is this type of attack called? Answers Phishing Pharming Spear pharming Spishing

Phishing

What should an incident response team do when they are notified of a potential incident? Answers The team should immediately escalate the problem to senior management. The team should shut down the infected system. The team should confirm the existence, scope, and magnitude of the event and then respond accordingly. The team should immediately backup the data on the infected system.

The team should confirm the existence, scope, and magnitude of the event and then respond accordingly.

What is the primary vulnerability associated with many methods of remote access? Answers Weak encryption Too complicated for users to understand The passing of critical data in cleartext Incompatibility with firewalls

The passing of critical data in cleartext

The process of attempting to break a cryptographic system is called __________. Answers encrypting cipher texting cryptography cryptanalysis

cryptanalysis


Set pelajaran terkait

Pekerjaan di Indonesia yang paling populer

View Set

Microeconomics: QUIZ #7 Behind the Supply Curve: INPUTS & COSTS

View Set

IS - Chapter 3: The Subject of A

View Set

Chapter 33: Management of Patients with Nonmalignant Hematologic Disorders

View Set

Biochem: Chp 6 - Allosteric enzymes

View Set

CM-003 Posttest - (5.01) Channels of Distribution

View Set