Info. Assurance Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When the 172.30.0.10 IP host responded to the ICMP echo-requests, how many ICMP echo-reply packets were sent back to the vWorkstation?

4

Which of the following is true regarding comments in the Certificate Creation Wizard?

A comment will be visible to the receiver.

To complete the creation of a key, what do you need to enter in the pinentry dialog box?

A passphrase, or password

When malware slows performance, which of the following tenets of information system security is impacted?

Availability

In the lab, which document recommended that you 1) configure local backups of Active Directory on the existing virtual server using Windows Server Backup, 2) configure the organization's web servers to host content from a single Network File Share (NFS) share, 3) back up that NFS share daily using Windows, and 4) copy these backups to an offsite facility?

Business Continuity plan

Which of the following clearly defines responsibilities and support structures (e.g., facilities, personnel, equipment, software, data files, vital records, etc.) to carry on the business after an event?

Business continuity plan

Which of the following determines the impact to an organization in the event that key processes and technology are not available?

Business impact analysis

In Kleopatra, each new certificate is created with no expiration (valid until) date, but you can set an expiration date in the:

Certificate Details screen.

What must you do to any certificate imported into Kleopatra before you can use it to decrypt messages?

Change the trust level

How can you verify that the integrity of encrypted files is maintained during the transmission to another user's computer?

Compare the decrypted file's contents with the contents of the original file.

When malware grants unauthorized access to the compromised machine and network, which of the following tenets of information system security is impacted?

Confidentiality

Which of the following becomes possible when a web form allows HTML or JavaScript code as valid input?

Cross-Site Scripting (XSS)

Which of the following is a tool left intentionally vulnerable to aid security professionals in learning about web security?

Damn Vulnerable Web Application

Which of the following documents specific procedures to return a given system or subsystem to production in the event of failure or compromise?

Disaster recovery plan

In Wireshark, which of the following enable you to find only the traffic you wish to analyze?

Display filters

The __________ on the Wireshark toolbar is used to filter all packets and only show those packets that meet certain criteria.

Filter box

Which of the following refers to the middle pane of the Wireshark window that is used to display the packet structure and contents of fields within the packet?

Frame detail

Which of the following refers to the bottom pane of the Wireshark window where all of the information in the packet is displayed in hexadecimal on the left and in decimal, in characters when possible, on the left?

Hex pane

When is the company under additional compliance laws and standards to ensure the confidentiality of customer data?

If e-commerce or privacy data is entered into the web application

When malware is able to steal and modify data, which of the following tenets of information system security is impacted?

Integrity

Which of the following helps secure the perimeter of a network?

Intrusion prevention systems

In the Host Name (or IP address) box of the PuTTY Configuration dialog box, you typed in 172.16.8.5, which is the:

Ip address for the LanSwitch 1

Which of the following statements is true regarding the hybrid approach to encryption?

It provides the same full C-I-A protection as asymmetrical encryption with nearly the same speed as symmetrical encryption.

What is the certificate management component of GPG4Win?

Kleopatra

When the key is successfully created, which of the following options sends a copy of your private key to your computer?

Make a Backup Of Your Key Pair

Signs of __________ include degraded system performance, unusual services and network traffic, altered or removed system logs, missing or inactive anti-virus, and any number of application anomalies.

Malware

__________ consists of unwanted programs like Trojans and viruses.

Malware

Which of the following is a security countermeasure that could be used to protect your production SQL databases against injection attacks?

Monitor your SQL databases for unauthorized or abnormal SQL injections.

Which of the following is used to make remote folders appear as part of the local file system on Linux and even Windows systems?

NFS

The __________ instructs Linux which folders to share with NFS and what NFS features should be enabled.

NFS share command

The data captured in Wireshark can be imported to __________ where it cleanly parses and displays the data for analysis by the administrator.

NetWitness Investigator

Which of the following provides security practitioners with a deep packet inspection tool used for examining everything from the data link layer up to the application layer?

NetWitness Investigator

If someone sends you his public key and you import it into Kleopatra, will he be able to decrypt the encrypted messages you send him?

No because you must provide your public key to any user wanting to decrypt any message encrypted by you.

Which of the following should be performed on a regular schedule and whenever the web application and service is modified?

Penetration Testing

How can you ensure the confidentiality, integrity, and availability (CIA) of the web application and service?

Penetration testing

Which type of attack is triggered by the victim?

Persistent cross-site scripting attack

Which of the following could be used to join a Debian Linux workstation to an Active Directory domain?

PowerBroker Identity Services Open

How do you encrypt a text message using the keys you created in the lab?

Right-click the file and select Sign and Encrypt from the context menu.

Which of the following determines the probability of a risk (such as an earthquake or a power outage) to occur and the impact that occurrence would have on operations?

Risk Analysis

Which of the following involves a review of controls that could mitigate each risk and weighs the cost, both in terms of time and money, of implementing those controls against the likelihood of the risk itself?

Risk assessment

Which of the following allows valid SQL commands to run within a web form?

SQL Injection

Which Web application attack is more likely to extract privacy data elements out of a database?

SQL Injections

Which of the following statements is true when using SSH to remotely access a Cisco router?

SSh encrypts the data transmission between the SSH client and the SSH host to maintain confidentiality

Which of the following drives the creation of standards within an organization?

Security policy

When the key is successfully created, which of the following options creates a new e-mail and automatically attaches your public key certificate?

Send Certificate By EMail

In the lab, what did you do before attempting the script tests that exposed the vulnerabilities?

Set the security level of DVWA to low

Which of the following statements is true regarding asymmetrical encryption?

The receiver obtains the needed key from the sender or through a trusted third party, such as a certificate server.

Which of the following statements is true regarding symmetric cryptography?

The sender and receiver use the same key to encrypt and decrypt a given message.

Which of the following statements is true regarding SQL Injection attacks?

Their likelihood can be reduced through regular testing.

Which of the following statements is true regarding cross-site scripting (XSS) attacks?

They are one of the most common web attacks.

Why do hackers often send zipped and encrypted files and attachments?

They cannot be opened by antivirus software and so they will often reach the recipient.

Which of the following Web forms can be exploited to output passwords, credit card information, and other data?

Those that are poorly designed

A __________ will masquerade as a seemingly useful program while actually compromising system security and possibly acting as a "back door," allowing additional hack tools and access to the system.v

Trojan

When the key is successfully created, which of the following options lets you store your certificate on a public Internet server?

Upload Certificate To Directory Service

The ___________ is a quarantine area where all removed files, virus infected or suspicious, are stored until you take action on them.

Virus Vault

The main purpose of the __________ is to keep any deleted file for a certain period of time, so that you can make sure you do not need the file any more.

Virus Vault

In the lab, you used Windows Server Backup to make a daily backup of __________, which contains all of the users, groups, distribution lists, and organizational units used in the Domain.

Windows Essentials

The __________ is a personal firewall that filters incoming and outgoing traffic by blocking unauthorized traffic to the local computer.

Windows Firewall with Advanced Security

In the lab, you installed the __________ feature on a remote Domain Controller.

Windows server Backup

Which of the following is a freeware tool providing basic packet capture and protocol decoding capabilities?

Wireshark

Which of the following tools is used to capture data packets over time (continuously or overnight)?

Wireshark

If you and another person want to encrypt messages, what should you provide that person with?

Your public key

What do others need to decrypt files that you have encrypted with your private key?

Your public key

Each time a key pair is created, Kleopatra generates:

a unique 40-character fingerprint.

NetWitness categorizes and organizes traffic so that:

anomalous patterns become more apparent

In the lab, you created a text file to schedule a daily backup. This type of file is called a __________.

batch file

In the lab, Wireshark continued to capture data in the background until the:

capture process was manually stopped later in the lab

Keys are also referred to as:

certificates.

Changes in laws, regulations, and organizational priorities mean that security policies tend to:

change over time

What was the terminal password for LanSwitch1 and LanSwitch2?

cisco

Service Type, Source IP Address, Destination IP Address, Action Event, User Account, and Password are all examples of the:

collection categories that Netwitness Investigator recognizes

Hackers use __________ to execute arbitrary scripts through the web browser.

cross-site scripting (XSS)

To ensure you have coverage on the most recent malware and malicious software, it is recommended that you update your anti-virus signature files __________ prior to performing a system scan.

daily

The main principle of __________ is to build layers of redundant and complementary security tools, policies, controls, and practices around the organization's information and assets.

defense in depth

The primary assumption of __________ is that no one single tool or practice will completely deter a resolved attacker.

defense in depth

Database developers and administrators are responsible for:

ensuring regular backups of the database are performed.

Which of the following refers to the top pane of the Wireshark window that contains all of the packets that Wireshark has captured, in time order and provides a summary of the contents of the packet in a format close to English?

frame summary

Unless stringent security is mandated by policy, the security practitioner must always balance security with:

functionality and user adoption.

What file extension does Kleopatra add to an encrypted file?

gpg

Often hackers will use __________ to make the scripts even harder to detect.

hexadecimal character strings

Some of the more important __________ include anti-virus (and anti-malware), host-based firewall, system hardening (removing unwanted services), change control, and log management.

host-based security measures

No security program is complete without:

host-based security measures.

The __________ creates a symbolic link so that remote Z: drive can be accessed as a local folder called www on the C: drive.

mklink command

The mount -o mtype=hard 172.30.0.200:/var/www * command is used to:

mount the NFS share onto a Windows drive.

In the lab, once the installation process was complete and you returned to the Server Manager, an amber caution symbol indicated that there was:

no backup currently scheduled

In a __________ attack, the attacker attempts to use scripting commands in the URL itself, or through a device, such as a web form, to gain administrator, or some other elevated level of user privileges in an attempt to force the victim's server to display the desired data on-screen.

non-persistent cross-site scripting

Cryptography takes human readable information and makes it unreadable "cipher text" which can only be read if:

one possesses the correct key.

Before analyzing packets in NetWitness Investigator, you must first create a collection and then import a(n):

packet capture file

No production web application, whether it resides inside or outside of the firewall, should be implemented without:

penetration testing and security hardening.

Web application firewalls, security information and event management systems, access controls, network security monitoring, and change controls help to keep the "soft center" from becoming an easy target when the __________ fails.

perimeter

In a __________ attack, data that can modify how applications or services operate is downloaded (stored) onto the targeted server.

persistent cross-site scripting

Wireshark is a popular tool for capturing network traffic in __________ mode.

promiscuous

Users often complain that __________ make their systems "slow" and hard to use.

security measures

Wireshark's ability to capture traffic is greatly hampered by __________ because only packets destined to and from an attached system are forwarded.

switched networks

In the lab, on the Specify Backup Time page, you selected a scheduled backup time that corresponded to:

the current time.

Web application developers and software developers are responsible for:

the secure coding and testing of their application.

Each element of __________ has a specific requirement for security professionals.

the security framework

Which of the following uses the TFTP (Trivial File Transfer Protocol) to send (put) or receive (get) files between computers?

the tfpd64 application

A standard __________ is a program that will spread from one computer to another in any variety of means, taking advantage of application or OS vulnerabilities to propagate further and will generally try to stay undetected.

virus

In the lab, you created a text file to use __________ to create a backup copy of the new www folder and scheduled that backup command to recur every day.

xcopy


Set pelajaran terkait

AP Psychology - Human Development

View Set

Ch. 49 Mythical Impressions: Program Music at the End of the Nineteenth Century

View Set

PSY 100GENERAL PSYCHOLOGY Unit 2

View Set

Ch 2.-The Resolution of Private Disputes

View Set