Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
- 3rd side (hint)
Which of the following is an example of a biometric authentication?
|
(a) Smart card
(b) User name (c) Fingerprint scanner (d) Password |
(c) Fingerprint scanner
|
|
Steganography is used for:
|
(a) Hiding data within another piece of data
(b) Checking data integrity (c) Hashing (d)Data encryption |
(a) Hiding data within another piece of data
|
|
Penetration testing: (Select all that apply)
|
(a) Actively tests security controls
(b) Exploits vulnerabilities (c) Bypasses security controls (d) Passively tests security controls (e) Only identifies lack of security controls |
(a) Actively tests security controls
(b) Exploits vulnerabilities (c) Bypasses security controls |
|
Public/private key pair concept is based on:
|
(a) WEP
(b) PII (c) Asymmetric encryption (d) Symmetric encryption |
(c) Asymmetric encryption
|
|
A monitored host or network specifically designed to detect unauthorized access attempts is also known as:
|
(a) Flood guard
(b) Honeypot (c) Botnet (d) Rogue access point |
(b) Honeypot
|
|
What type of system can be compromised through phreaking?
|
(a) PBX
(b) ATX (c) PGP (d) BIOS |
(a) PBX
|
|
Which of the following acronyms refers to a lightweight consumer electronic device?
|
(a) PED
(b) KDC (c) SLED (d) CA |
(a) PED
|
|
What are the features of Elliptic Curve Cryptography (ECC)? (Select two answers)
|
(a) Suitable for small wireless devices
(b) Symmetric encryption (c) High processing power requirements (d) Asymmetric encryption Shared key |
(a) Suitable for small wireless devices
(d) Asymmetric encryption Shared key |
|
The term war driving refers to:
Scanning for unsecured wireless networks while driving in a car |
(a) Scanning for unsecured wireless networks while driving in a car
(b) Penetration testing (c) Vulnerability scanning (d) Marking unsecured wireless networks |
(a) Scanning for unsecured wireless networks while driving in a car
|
|
Which of the following prevents a computer screen from being viewed by others nearby?
|
(a) Privacy screen
(b) Multi-factor authentication (c) HIPS (d) Firewall |
(a) Privacy screen
|
|
Which of the following measures should be used in order to prevent shoulder surfing? (Select two answers)
|
(a) Cable locks
(b) Privacy filters (c) Security guards (d) Screensavers (e) Video surveillance |
(b) Privacy filters
(d) Screensavers |
|
Allowing a program through a firewall is also referred to as creating:
|
(a) Access Point
(b) Session (c) Tunnel (d) Exception |
(d) Exception
|
|
802.1X is an IEEE standard defining:
|
(a) Port-based network access control
(b) Token ring networks (c) VLAN tagging (d) Wireless networking |
(a) Port-based network access control
|
|
Which of the following protocols was designed as a secure replacement for Telnet?
|
(a) FTP
(b) ICMP (c) IPv6 (d) SSH |
(d) SSH
|
|
Which of the following provides confidentiality?
|
(a) SHA-1
(b) AES (c) RAID 0 (d) MD5 |
(b) AES
|
|
Malicious code activated by a specific event is also known as:
|
(a) Logic bomb
(b) Computer worm (c) Denial of service (d) Xmas attack |
(a) Logic bomb
|
|
Which of the following is an acronym for a risk assessment formula defining probable financial loss due to a risk over a one-year period?
|
(a) SLE
(b) ARO (c) ALE (d) UAT |
(c) ALE
|
|
Which of the following solutions is used to hide the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?
|
(a) ACL
(b) DMZ (c) NAT (d) NAC |
(c) NAT
|
|
Unsolicited messages received over an instant messaging system are also known as:
|
(a) Spoofing
(b) Spim (c) Bluejacking (d) Spam |
(b) Spim
|
|
Gaining unauthorized access to a Bluetooth device is also referred to as:
|
(a) Bluesnarfing
(b) Bluejacking (c) Vishing (d) Pharming |
(a) Bluesnarfing
|
|
RAID 0: (Select two answers)
|
(a)Requires at least two drives to implement
(b) Needs a separate disk controller for each drive (c) Requires at least three drives to implement (d) Offers fault tolerance and redundancy (e) Doesn't offer fault tolerance |
(a)Requires at least two drives to implement
(e) Doesn't offer fault tolerance |
|
A cloud computing infrastructure type wherein applications are hosted over a network (typically Internet) eliminating the need to install and run the software on the customer's own computers is called:
|
(a) IaaS
(b) Thick client (c) Virtualization (d) SaaS |
(d) SaaS
|
|
A group that consists of SNMP devices and one or more SNMP managers is called:
|
(a) SNMP community
(b) Management Information Base (MIB) (c) Network Management System (NMS) SNMP trap |
(a) SNMP community
|
|
Which of the following devices operates at Layer 3 of the OSI model?
|
(a) Switch
(b) Passive hub (c) Active hub (d) Router |
(d) Router
|
|
Using a telephone system to manipulate a user into disclosing confidential information is called:
|
(a) Tailgating
(b) Spoofing (c) Shoulder surfing (d) Vishing |
(d) Vishing
|