ITC 563 Midterm

Ace your homework & exams now with Quizwiz!

Which type of access control scheme uses predefined rules that makes it the most flexible scheme? a. ABAC b. DAC c. MAC d. NAC

ABAC

Which of the following is NOT part of the AAA framework? a. Authentication b. Access c. Authorization d. Accounting

Access

Which of the following best describes bash? a. Bash is a command language interpreter. b. Bash is a network assessment tool. c. Bash is computer hardware. d. Bash is a physical security measure.

Bash is a command language interpreter.

Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to agree to an acceptable use policy (AUP) before continuing. What type of AP has he encountered? a. Authenticated portal. b. Captive portal. c. Control portal. d. Rogue portal.

Captive portal

Which of the following ensures that only authorized parties can view protected information? a. Authorization b. Confidentiality c. Availability d. Integrity

Confidentiality

In an interview, Tom was asked to give a brief on how containers perform virtualization. How should Tom reply? a. Containers use hardware hypervisors for virtualization. b. Containers use OS components for virtualization. c. Containers use dedicated physical storage for virtualization. d. Containers use Type I hypervisors for virtualization.

Containers use OS components for virtualization.

What is a disadvantage of biometric readers? a. Speed b. Cost c. Weight d. Standards

Cost

Stronger boot security is not an improvement of UEFI over BIOS. True False

False

Which type of malware relies on LOLBins? a. PUP b. File-based virus c. Fileless virus d. Bot

Fileless virus

Which of the following of the CIA Triad ensures that the information is correct, and no unauthorized person has altered it? a. Confidentiality b. Integrity c. Availability d. Assurance

Integrity

IT Management has just learned that some employees have tried to install their own wireless router in the employee lounge. Why is installing this rogue AP a security vulnerability? a. It uses the weaker IEEE 80211i protocol. b. It allows an attacker to bypass network security configurations. c. It conflicts with other network firewalls and can cause them to become disabled. d. It requires the use of vulnerable wireless probes on all mobile devices.

It allows an attacker to bypass network security configurations.

An IOC occurs when what metric exceeds its normal bounds? a. IRR b. LRG c. EXR d. KRI

KRI

Which access control scheme is the most restrictive? a. Role-Based Access Control. b. DAC. c. Rule-Based Access Control. d. MAC.

MAC

Which of these creates a format of the candidate password to significantly reduce the time needed to crack a password? a. Rainbow b. Mask c. Overlay d. Pass the hash

Mask

Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable? a. Push-button method. b. Piconet method. c. PIN method. d. Click-to-connect method.

PIN method

What is data called that is to be encrypted by inputting it into a cryptographic algorithm? a. Plaintext b. Byte-text c. Cleartext d. Ciphertext

Plaintext

Linnea has requested to be placed on the penetration testing team that scans for vulnerabilities to exploit them. Which team does she want to be placed on? a. Blue Team b. Purple Team c. White Team d. Red Team

Red Team

What term refers to changing the design of existing code? a. Library manipulation b. Shimming c. Refactoring d. Design driver manipulation

Refactoring

What is a jump box used for? a. Switching from a public IP to a private IP. b. Restricting access to a demilitarized zone. c. Bypassing a firewall by generating a log entry. d. Deceiving threat actors by intentionally creating vulnerable devices.

Restricting access to a demilitarized zone.

Which of the following is NOT a symmetric cryptographic algorithm? a. DES b. SHA c. Blowfish d. 3DES

SHA

Tilde is working on a contract with the external penetration testing consultants. She does not want any executives to receive spear-phishing emails. Which rule of engagement would cover this limitation? a. Scope b. Targets c. Exploitation d. Limitations and exclusion

Scope

Which of the following is true regarding the relationship between security and convenience? a. Security and convenience are inversely proportional b. Security and convenience have no relationship c. Security is less important than convenience d. Security and convenience are equal in importance

Security and convenience are inversely proportional

Which of the following is an authentication credential used to access multiple accounts or applications? a. Single sign-on b. Credentialization c. Identification authentication d. Federal login

Single sign-on

In an interview, Max was asked to tell one difference between a software firewall and a virtual firewall. How should Max answer? a. Software firewalls are locally installed on a device, whereas virtual firewalls run in the cloud. b. Virtual firewalls are cost-free, whereas software firewalls are paid services. c. Software firewalls can protect all the endpoints in a network, whereas virtual firewalls can protect only one device. d. Virtual firewalls are used on almost all devices, whereas software firewalls are mostly used by enterprises.

Software firewalls are locally installed on a device, whereas virtual firewalls run in the cloud.

Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of the information? a. CISA b. FOIA c. TLP d. PCII

TLP

How do NACs ensure that a device is safe to connect to a secure network? a. The NAC encrypts all of the data on an unknown device before connecting it to the secured network. b. The NAC issues a health certificate, only allowing healthy devices to connect to the secured network. c. The NAC ensures the safety of the device by deleting all suspicious files. d. The NAC moves suspicious data on an unknown device onto an external storage device.

The NAC issues a health certificate, only allowing healthy devices to connect to the secured network.

Rule-Based Access Control dynamically assigns roles to subjects based on rules. True False

True

TAXII is an application protocol for exchanging cyberthreat intelligence over HTTPS. True False

True

To spy on citizens is one objective of state-sponsored attack. True False

True

White hat hackers will probe a system for weaknesses and then privately provide that information back to the organization. True False

True

Which type of hypervisor runs directly on the computer's hardware? a. Type I b. Type II c. Type III d. Type IV

Type I

Which of the following is known as a network virus? a. TAR b. Worm c. Remote Exploitation Virus (REV) d. C&C

Worm

A source computer's ability to reach a specified destination computer can be tested using which of the following? a. ifconfig. b. ping. c. curl. d. ipconfig.

ping

Which of the following best describes a network address translation? a. A Network Address Translation (NAT) enables a private IP network to connect to the internet. b. A Network Address Translation (NAT) blocks specific websites or attacks that attempt to exploit known vulnerabilities in specific client software. c. A Network Address Translation (NAT) can detect applications using deep packet inspection by examining the packet payloads and determining if they are carrying any malware. d. A Network Address Translation (NAT) is a device that combines several security functions like packet filtering, anti-spam, anti-phishing, anti-spyware, encryption, intrusion protection, and web filtering.

A Network Address Translation (NAT) enables a private IP network to connect to the internet.

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? a. Alice's private key b. Alice's public key c. Bob's public key d. Bob's private key

Alice's public key

Which type of monitoring methodology looks for statistical deviations from a baseline? a. Behavioral monitoring. b. Signature-based monitoring. c. Anomaly monitoring. d. Heuristic monitoring.

Anomaly monitoring.

What enforces the location in which an app can function by tracking the location of the mobile device? a. Location Resource Management b. Geofencing c. GPS tagging d. Graphical Management Tracking (GMT)

Geofencing

Which of the following best describes east-west traffic? a. Movement of data from one server to another within a data center. b. Movement of data from an unsecured endpoint to a server outside a data center. c. Movement of data from a router to an enterprise switch. d. Movement of data from one unsecured endpoint to another.

Movement of data from one server to another within a data center.

Maria's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called? a. Rooting b. Sideloading c. Jailbreaking d. Ducking

Rooting

Luke is researching hash algorithms. Which algorithm would produce the longest and most secure digest? a. SHA-256 b. MD5 c. SHA3-512 d. SHA6-6

SHA3-512


Related study sets

MKT-488-001 Test #3 JSU (Dr. Lee)

View Set

What was the Industrial Revolution?

View Set

Insurance Property and Causality

View Set

4th Amendment Reasonable Expectation of Privacy

View Set

ATI CAPSTONE MATERNAL-NEWBORN POST ASSESSMENT

View Set