Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
- 3rd side (hint)
SHA and MD5 are: |
(a) Encryption algorithms
(b) Hash functions (c) Virus signatures (d) Trust models |
(b) Hash functions
|
|
Which of the following provide the means for checking data integrity? (Select two answers)
|
(a) WEP
(b) RC4 (c) WPA2 (d) SHA-1 (e) MD5 |
(d) SHA-1
(e) MD5 |
|
Packet sniffer is a common term for:
|
(a) Router
(b) Multilayer switch (c) Port scanner (d) Protocol Analyzer |
(d) Protocol Analyzer
|
|
A set of rules enforced in a network that restrict the use to which the network may be put is also known as:
|
(a) FAQ
(b) AUP (c) UAT (d) OEM |
(b) AUP
|
|
Which of the following protocols periodically reauthenticates a client?
|
(a) CHAP
(b) PAP (C)SHA (d) MD5 |
(a) CHAP
|
|
A piece of hardware and associated software/firmware that usually attaches to the inside of a PC or server and provides at least the minimum of cryptographic functions is called:
|
(a) PKI
(b) OUI (c) HSM (d) BIOS |
(c) HSM
|
|
An IPv6 address consists of:
|
(a) 48 bits
(b) 64 bits (c) 32 bits (d) 128 bits |
(d) 128 bits
|
|
Which of the following terms refers to an access control method based on user identity?
|
(a) MAC
(b) RBAC (c) HMAC (d) DAC |
(d) DAC
|
|
Coding errors and security vulnerabilities in software that has already been released can be rectified through:
|
(a) Fuzzing
(b) Virtualization (c) Patch management (d) Application hardening |
(c) Patch management
|
|
Which of the following is a stream cipher?
|
(a) RC4
(b) 3DES (c) DES (d) AES |
(a) RC4
|
|
Advanced Encryption Standard (AES): (Select all that apply)
|
(a) Uses block cipher algorithm
(b) Is an asymmetric encryption algorithm (c) Requires multiple passes to encrypt data (d) Is a symmetric encryption algorithm (e) Uses 128-, 192-, and 256-bit keys |
(a) Uses block cipher algorithm
(d) Is a symmetric encryption algorithm (e) Uses 128-, 192-, and 256-bit keys |
|
Which of the following allows for encrypting e-mail messages?
|
(a) PGP
(b) SMTP (c) OVAL (d) PPP |
(a) PGP
|
|
Which of the following actions can be taken by an IDS? (Select two answers)
|
(a) Sending an alert
(b) Closing down connection (c) Terminating process (d) Logging (e) Reconfiguring firewall |
(a) Sending an alert
(d) Logging |
|
Which of the following ports are used by the File Transfer Protocol (FTP)? (Select two answers)
|
(a) 23
(b) 21 (c) 22 (d) 25 (e) 20 |
(b) 21
(e) 20 |
|
Which of the following measures fall(s) into the category of detective security controls? (Select all that apply)
|
(a) Security guard
(b) IDS (c) Video surveillance (d) IPS |
(b) IDS
(c) Video surveillance |
|
An access control model in which access to resources is granted or denied depending on Access Control List (ACL) entries is also known as:
|
(a) Mandatory Access Control
(b) Rule-Based Access Control (c) Lattice-Based Access Control (d) Role-Based Access Control |
(b) Rule-Based Access Control
|
|
Which of the following provide availability? (Select all that apply)
|
(a) Hot site
(b) Encryption (c) RAID 5 (d) RAID 1 (e) RAID 0 |
(a) Hot site
(c) RAID 5 (d) RAID 1 |
|
Which of the following terms refers to software or hardware based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of a corporate network?
|
(a) UAT
(b) LTO (c) EULA (d) DLP |
(d) DLP
|
|
Which of the following port numbers is used by Kerberos?
|
(a) 23
(b) 22 (c) 80 (d) 88 |
(d) 88
|
|
Which of the following attacks uses multiple compromised computer systems against its target?
|
(a) Logic bomb
(b) DoS (c) DDoS (d) Botnet |
(c) DDoS
|
|
A lightly protected subnet placed on the outside of the company's firewall consisting of publicly available servers is also referred to as:
|
(a) Access Point (AP)
(b) DMZ (c) VLAN (d) VPN |
(b) DMZ
|
|
Which of the following terms refers to a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain, regardless of their physical location?
|
(a) DMZ
(b) VLAN (c) SNMP community (d) MAC filtering |
(b) VLAN
|
|
In which of the cloud computing infrastructure types clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment?
|
(a) IaaS
(b) RAS (c) PaaS (d) SaaS |
(a) IaaS
|
|
WPA2 standard is also known as:
|
(a) 802.3
(b) 802.1X (c) 802.11i (d) 802.11 |
(c) 802.11i
|
|
One of the measures used in securing an Ethernet switch includes disabling unused ports.
|
(a) True
(b) False |
(a) True
|