Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
55 Cards in this Set
- Front
- Back
Spyware, adware and DDOS agents are three types of: |
Trojans |
|
With application level firewalls, any access that has not been disabled is permitted. |
False |
|
A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console. |
True |
|
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. |
risk assessment |
|
Which of the following is not true about one-time passwords? |
They create a packet level firewall on the system |
|
Researchers estimate that only one or two new viruses are developed every week. |
False |
|
A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. |
threat |
|
The key principle in preventing disruption, destruction and disaster is ___________. |
redundancy |
|
A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network. |
firewall |
|
An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset. |
True |
|
Which of the following type of media is least susceptible to eavesdropping? |
fiber optics |
|
Which of the following is not a type of intrusion prevention system? |
data link-based |
|
The most common authentication protocol used today is Kerberos. |
True |
|
Crackers are casual hackers with a limited knowledge of computer security. |
False |
|
__________ provide authentication which can legally prove who sent a message over a network. |
Digital signatures |
|
To snare intruders, many organizations now use _________ techniques. |
entrapment |
|
The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. |
WLANs |
|
The best solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network. |
True |
|
Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities? |
unlocked wiring closet for network devices |
|
The use of hacking techniques to bring attention to a larger political or social goal is referred to as |
hacktivism |
|
Network cables are the easiest target for eavesdropping. |
False |
|
A brute force attack against an encryption system: |
tries to gain access by trying every possible key |
|
Controls are mechanisms that reduce or eliminate threats to network security. |
True |
|
IP Security Protocol: |
sits between IP at the network layer and TCP/UDP at the transport layer |
|
An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user. |
False |
|
A recent study by CSO Magazine and the Computer Security Institute stated that the average loss suffered by businesses because of computer security breaches was approximately $350,000. |
True |
|
_________ controls stop a person from acting. |
preventive |
|
Which of the following are usually the first choice for eavesdropping? |
Wireless LANs |
|
DoS attackers generally use fake source IP addresses, making it harder to identify the DoS messages. |
True |
|
A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network. |
NAT firewall |
|
Which of the following is not considered one of the five most common business impacts? |
Social |
|
_______________ describes how an asset can be compromised by one specific threat. |
Threat scenarios |
|
In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: |
increased because this commitment to data communications has changed the potential vulnerability of the organization's assets |
|
We can calculate the relative ___________, by multiplying the impact score by the likelihood. |
risk score |
|
Confidentiality is not a threat to business continuity. |
False |
|
A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks. |
application level firewall |
|
Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN. |
False |
|
________ controls fix a trespass into the network. |
corrective |
|
Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity. |
True |
|
A fundamental technique to determine if an intrusion is in progress in a stable network is: |
anomaly detection |
|
A security hole is a bug that permits intrusion to a computer. |
True |
|
Developing _______ helps develop a secure network. |
controls |
|
Macro viruses can spread when an infected file is opened. |
True |
|
A tornado that eliminates a network control center would be an example of a natural __________ |
disaster |
|
Asymmetric encryption uses the same key to encrypt and decrypt an message.. |
False |
|
A(n) ____________, is an information system that is critical to the survival of an organization. |
mission critical application |
|
A packet-level firewall examines the source and destination address of every network packet that passes though the firewall |
True |
|
Integrity is not a primary goal of security. |
False |
|
DES: |
is a commonly used symmetric encryption algorithm that was developed in the mid-1970s |
|
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters. |
True |
|
A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization. |
True |
|
A symmetric encryption system has two parts: the key and the ____________. |
algorithm |
|
Fault-intolerant servers contain many redundant components to prevent failure. |
False |
|
A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet. |
True |
|
Which of the following is not a type of intruder who attempts to gain intrusion to computer networks? |
Delphi team member |