Filters
Question type

Study Flashcards

The most common input-related vulnerability is


A) Buffer overflow attack
B) Hardening
C) War dialing
D) Encryption

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Explain social engineering.

Correct Answer

verifed

verified

Social engineering attacks use deception...

View Answer

Encryption has a remarkably long and varied history.Spies have been using it to convey secret messages ever since there were secret messages to convey.One powerful method of encryption uses random digits.Two documents are prepared with the same random sequence of numbers.The spy is sent out with one and the spy master retains the other.The digits are used as follows.Suppose that the word to be encrypted is SPY and the random digits are 352.Then S becomes V (three letters after S) ,P becomes U (five letters after P) ,and Y becomes A (two letters after Y,restarting at A after Z) .The spy would encrypt a message and then destroy the document used to encrypt it.This is an early example of


A) a hashing algorithm.
B) asymmetric key encryption.
C) symmetric key encryption.
D) public key encryption.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

A special purpose hardware device or software running on a general purpose computer which filters information that is allowed to enter and leave the organization's information system.


A) Demilitarized zone
B) Intrusion detection system
C) Intrusion prevention system
D) Firewall

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Asymmetric key encryption combined with the information provided by a certificate authority allows unique identification of


A) the user of encrypted data.
B) the provider of encrypted data.
C) both the user and the provider of encrypted data.
D) either the user or the provider of encrypted data.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

A process that takes plaintext of any length and transforms it into a short code.


A) Asymmetric encryption
B) Encryption
C) Hashing
D) Symmetric encryption

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is the most effective method of protecting against social engineering attacks on a computer system?


A) stateful packet filtering.
B) employee training.
C) a firewall.
D) a demilitarized zone.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

This determines which packets are allowed entry and which are dropped..


A) Access control list
B) Deep packet inspection
C) Stateful packet filtering
D) Static packet filtering

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

The final layer of preventive controls.


A) Authentication
B) Authorization
C) Encryption
D) Intrusion detection

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security.


A) Training
B) Controlling physical access
C) Controlling remote access
D) Host and application hardening

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.


A) Access control list
B) Internet protocol
C) Packet switching protocol
D) Transmission control protocol

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following is not a requirement of effective passwords?


A) Passwords should be changed at regular intervals.
B) Passwords should be no more than 8 characters in length.
C) Passwords should contain a mixture of upper and lowercase letters,numbers and characters.
D) Passwords should not be words found in dictionaries.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Information technology managers are often in a bind when a new exploit is discovered in the wild.They can respond by updating the affected software or hardware with new code provided by the manufacturer,which runs the risk that a flaw in the update will break the system.Or they can wait until the new code has been extensively tested,but that runs the risk that they will be compromised by the exploit during the testing period.Dealing with these issues is referred to as


A) change management.
B) hardening.
C) patch management.
D) defense in depth

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The process of turning off unnecessary features in the system is known as


A) Deep packet inspection
B) Hardening
C) Intrusion detection
D) War dialing

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following describes one weakness of encryption?


A) Encrypted packets cannot be examined by a firewall.
B) Encryption protects the confidentiality of information while in storage.
C) Encryption protects the privacy of information during transmission.
D) Encryption provides for both authentication and non-repudiation.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

The process of transforming normal text into cipher text


A) Encryption
B) Decryption
C) Filtering
D) Hardening

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What is a penetration test?

Correct Answer

verifed

verified

An authorized attempt by eithe...

View Answer

In 2007,a major U.S.financial institution hired a security firm to attempt to compromise its computer network.A week later,the firm reported that it had successfully entered the system without apparent detection and presented an analysis of the vulnerabilities that had been found.This is an example of a


A) preventive control.
B) detective control.
C) corrective control.
D) standard control.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The trust services framework identifies four essential criteria for successfully implementing each of the principles that contribute to systems reliability.Which of the following is not one of those four essential criteria?


A) Developing and documenting policies
B) Effectively communicating policies to all outsiders
C) Designing and employing appropriate control procedures to implement policies
D) Monitoring the system and taking corrective action to maintain compliance with policies

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

These systems use the same key to encrypt and to decrypt.


A) Asymmetric encryption
B) Hashing encryption
C) Public key encryption
D) Symmetric encryption

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Showing 41 - 60 of 82

Related Exams

Show Answer