MIS 4800

Ace your homework & exams now with Quizwiz!

Which term refers to a set of wireless technologies that enables smartphones and other devices to establish radio communication over a short proximity?

Near field communication (NFC)

Which type of attack occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time?

Replay

Which term refers to the possibility of suffering harm or loss?

Risk

Which device forms the backbone of the Internet, moving traffic from network to network, inspecting packets from every communication as they move traffic in optimal paths?

Router

What is the correct sequence of the three-way handshake?

SYN, SYN/ACK, ACK

A _________________ is a critical operation upon which many other operations rely and which itself relies on a single item that, if lost, would halt this critical operation.

Single point of failure

Which term describes a point-in-time saving of the state of a virtual machine?

Snapshot

Which device forms the basis for connections in most Ethernet-based LANs?

Switch

A session key is a(n) __________ key used for encrypting messages during a communication session.

Symmetric

Which encryption method is based on the idea of using the same key for encryption and decryption of data?

Symmetric encryption

Which security device is a passive signal-copying mechanism installed between two points on the network?

TAP

Which statement describes the main difference between TCP and UDP packets?

TCP packets are connection oriented, whereas UPD packets are connectionless.

What term does the U.S. Department of Defense use to describe both a program in the military to control electronic emanations from electrical equipment and the actual process or controlling the emanations?

TEMPEST

The best algorithms are always public algorithms that have been published for peer review by other cryptographic and mathematical experts.

True

The impact of an event is a measure of the actual loss when a threat exploits a vulnerability.

True

The presence of risks in a system is an absolute—they cannot be removed or eliminated.

True

The primary defense against a majority of physical attacks are walls, fences, gates, and doors.

True

The purpose of change management is to ensure proper procedures are followed when modifications to the IT infrastructure are made.

True

What is a logical implementation of a LAN that allows computers connected to different physical networks to act and communicate as if they were on the same physical network?

VLAN

Certificates are used to (check all that apply):

Verify the sender of an email Verify the legitimacy of a website

Which term is used to describe the hosting of a desktop environment on a central server?

Virtual desktop infrastructure (VDI)

Which tool is used to provide a secure communication channel between users across public networks such as the Internet?

Virtual private network (VPN)

What is a drawback to water-based fire suppression systems?

Water-based systems are destructive to electrical equipment.

A certificate revocation list (CRL) is

a list of serial numbers of certificates that have been revoked.

A(n) ____________________ is a trusted authority that certifies individuals' identities and creates electronic documents indicating that individuals are who they say they are.

certificate authority

When material, called plaintext, needs to be protected from unauthorized interception or alteration, it is encrypted into __________.

ciphertext

Keeping all attackers out of a system all of the time is an obtainable goal of an organization.

false

Since developers create and enhance programs, they should be able to install these programs on the production system.

false

In a ________________ backup all files and software are stored on the media.

full

Which type of alternative site ( backup site) is the most ready for a company to restore service from?

hot site

Transport encryption is used to protect data that is __________.

in motion

Common uses of hashing algorithms are to store computer passwords and to ensure message __________.

integrity

A __________ is a special piece of data used in both the encryption and decryption processes.

key

________________ is the target time that is set for resuming operations after an incident.

recovery time objective (RTO)

A(n) ____________________ is the PKI component that accepts a request for a digital certificate and performs the necessary steps of registering and authenticating the person requesting the certificate.

registration authority

Which term refers to a risk that remains after implementing controls?

residual risk

What is a foundation for change management?

separation of duties

__________ relies on lies and misrepresentation, which an attacker uses to trick an authorized user into providing information or access the attacker would not normally be entitled to.

social engineering

. Making data look like it has come from a different source is called __________.

spoofing

This is a common form of testing a disaster recovery plan that has little to no impact on the company but also doesn't completely test the plan.

tabletop exercise

Most e-mail is sent in plaintext, providing no privacy in its default form.

true

Which of the following is an example of a MAC address?

00:07:e9:c8:ff:00

Which of the following is a valid IP address?

12.12.12.12

How many bits are in an IPv6 address?

128

__________ is essentially noting which domains and source addresses have a reputation for sending spam, and rejecting messages coming from those domains and source addresses.

Blacklisting

Which term refers to any media used to boot a computer into an operating system (OS) that is not the native OS on its hard drive?

Bootdisk

Which type of attack occurs when a password-cracking program attempts all possible password combinations?

Brute-force

Which term generally refers to the standard of care a business is expected to exercise in preparation for a business transaction?

Due Dilligence

A public cloud system is one where several organizations with a common interest share a cloud environment for the specific purposes of the shared endeavor.

False

Currently, all instant messaging programs natively support encryption.

False

Keys and certificates should not have expiration dates.

False

Systems that are categorized as optional should be restored first after an emergency.

False

Targeted attacks are easier and take less time and effort than attacks on targets of opportunity.

False

The biggest danger to any organization comes from external attacks more than internal attacks.

False

Which term describes a network device—hardware, software, or a combination thereof—whose purpose is to enforce a security policy across its connections by allowing or denying traffic to pass into or out of the network?

Firewall

What is a good way to reduce the chance of a successful social engineering attack?

Implement a strong security education and awareness training program.

What is a firewall condition in which any traffic not specifically permitted by a previous rule in the rule set is denied?

Implicit deny

Which term refers to a process by which the user escalates their privilege level, bypassing the operating system's controls and limitations?

Jailbreaking

In terms of physical security, which term refers to protecting important assets by using multiple perimeters?

Layered access

Which term refers to the ability to distribute the processing load over two or more systems?

Load balancing

What term refers to a piece of code that sits dormant for a period of time until some event invokes its malicious payload?

Logic bomb

The term __________ refers to software that has been designed for some nefarious purpose.

Malware

Which term refers to a type of an attack where an attacker spoofs addresses and imposes their packets in the middle of an existing connection?

Man-in-the-middle attack

Which action is an example of transferring risk?

Management purchases insurance for the occurrence of the risk.

How do most advanced persistent threats (APTs) begin?

Most APTs begin through a phishing or spear phishing attack.

What is one benefit of Network Address Translation (NAT)?

NAT compensates for the lack of available IP address space.

Phishing is the most common form of social engineering attack related to computer security.

True

Businesses should have a ___________________ that outlines what employees can do with company resources, such as computer systems, e-mail, Internet access, and networks.

Acceptable use policy

Policies and procedures are examples of _______________ controls.

Administrative

Which poor security practice is one of the most common and most dangerous?

Choosing poor passwords

Which term refers to technology employed to detect and prevent transfers of data across an enterprise?

Data loss prevention (DLP)

Warning signs and guards are examples of ______________ controls.

Deterrent

What type of attack is based on the automated download of malware that takes advantage of a browsers' ability to download the different files that compose a web page?

Drive-by download

Which term means that the message sender cannot later deny that they sent the message?

Nonrepudiation

What is a paradox of social engineering attacks?

People are not only the biggest problem and security risk but also the best tool in defending against an attack.

Which statement describes why social engineering is successful?

People have a basic desire to be helpful.

What step can be taken to evaluate the effectiveness of the security measures in place at an organization?

Perform a vulnerability assessment

___________________ distributes data over multiple hard drives to provide speed, redundancy or both.

RAID

Why is wireless problematic from a security standpoint?

There is no control over the physical layer of traffic.

What is the primary objective of change management?

To enable beneficial changes to be made, with minimum disruption to IT services

A DMZ acts as a buffer zone between the Internet, where no controls exist, and the inner, secure network, where an organization has security policies in place.

True

A digital certificate binds an individual's identity to a public key

True

A key security methodology is to attempt to avoid a single point of failure in critical functions within an organization.

True

A wildcard certificate is good for more than one website in a domain.

True

Application whitelisting can improve security by preventing unapproved applications from being installed and run on the device.

True

Asymmetric encryption is more commonly known as public key cryptography

True

Digital certificates can be used to verify an individual's identity through e-mail.

True

Firewalls can act as flood guards, detecting and mitigating specific types of DoS/DDoS attacks.

True

IPv6 complexity increases operational challenges for correct deployment.

True

It is important to consider the legal implications of where you store your backups.

True

It is important to secure certificates because they can be used to fake your identity or in a cybersecurity attack.

True

One company can trust another company's certificate authority server.

True


Related study sets

Pediatrics Exam 3 (Chapters 27-29)

View Set

Buisness Law and Ethics, end of course test.

View Set

Chapter 35 APUSH Multiple Choice Test

View Set