OCTAVE is a: |
. risk-assessment process |
A security analyst is performing a security assessment. The analyst should not: |
take actions to mitigate a serious risk |
A rational security decision, such as locking your vehicle when not in use, is an example of: |
reasoned paranoia |
Supervisory control and data acquisition (SCADA) devices are most often associated with: |
utilities |
An attempt by a threat agent to exploit assets without permission is referred to as: |
an attack |
A person skilled in attacking computer systems, who uses those skills as a security expert to help protect systems, is a: |
white-hat hacker |
When disclosing a security vulnerability in a system or software, the manufacturer should avoid |
including enough detail to allow an attacker to exploit the vulnerability |
One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is to |
report the status of individual computer users |
A type of security control that takes measures to help restore a system is referred to as: |
corrective |
The primary element on a computer motherboard that runs programs and makes the computer work is |
the central processing unit (CPU) |
The directory access right that allows a user to search for a name in a file’s path but not examine the directory as a whole is called |
seek |
An interpreter is a program that interprets the text of a program one word at a time, and performs the actions specified in the text. The following are examples of interpreters except: |
Java |
The type of computer-based access control that involves a process that uses secret or hidden information in order to retrieve particular data items is |
puzzle |
A zero-day exploit |
has no software patch |
The character that separates directories in a Windows directory path is |
the back slash (\ ) |
The computer connection that allows you to attach several separate components is called |
A Bus |
General security access controls refer to objects, rights, and: |
subjects |
The product that creates financial-fraud botnets using Zbot malware and is offered for sale on the black market is: |
ZeuS |
The main purpose of a software patch is to: |
fix a bug in a program |
A type of security control in which you unplug a computer from the Internet to protect it from malware is |
mechanical |
In a hierarchical file system directory, the topmost directory is called the: |
root |
A typical hard drive has an arm, a read/write head, and |
platters |
For data to be cryptographically random, it: |
cannot be produced by a procedure |
A keystroke logger is often associated with |
botnets |
The condition in which files automatically take on the same permissions as the folder in which they reside is called: |
dynamic inheritance |
In Windows, when you copy a file from one folder to another and the folders have different access permissions, the file: |
. takes on the access rights of the destination folder |
The law that establishes security measures that must be taken on health-related information |
HIPAA |
When collecting digital evidence from a crime scene, often the best strategy for dealing with a computer that is powered on is to |
unplug it |
The file system that organizes a volume’s contents around five master files, such as the catalog file and the extents overflow file, is |
HFS+ |
The sector(s) at the beginning of a hard disk that identify the starting block of each partition is called the |
master boot record |
A security database that contains entries for users and their access rights for files and folders is |
an access control list (ACL) |
The Fourth Amendment prevents arbitrary searches of areas where users expect their privacy to be protected. This is referred to as: |
reasonable expectation of privacy |
Hashing |
transforms readable text into gibberish |
The inode is the data structure on a drive that describes each file and is used in |
UFS |
An attack in which someone tries to trick a system administrator into divulging a password is called |
social engineering |
The major file system used with Windows today is |
NTFS |
An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of |
two-factor authentication |
A primary use of event logs is to: |
serve as an audit trail |
In a password system, the total number of possible passwords is called the |
search space |
The file system that uses a master file table is: |
NTFS |
In a Diffie-Hellman calculation using P=g^s mod N , s is |
the private key value |
An Advanced Encryption Standard (AES) key may not be |
16 bits in length |
The type of cipher that rearranges the text of a message is called |
transposition |
To use symmetric cryptography, the sender and receiver must share: |
a secret key |
Digital signatures are often used to provide |
nonrepudiation |
Volume encryption protects data on a computer against: |
theft |
The following are common ways to handle new encryption keys except |
transfer them via instant messenger |
A self-encrypting drive locks data on the hard disk by |
erasing the encryption key when the drive is unplugged or reset |
Hiding an object, such as a diary, to prevent others from finding it is an example of |
Security through Obscurity |
A file encryption program |
truncates a passphrase that is too long |
File encryption protects data on a computer against the following except: |
Trojan crypto |
The following are properties of persistent key storage except: |
it uses volatile storage |
1111 1111 – 1111 1111 – 1111 0000 – 0000 0000 is an example of: |
a binary network mask |
A disadvantage of a mesh network is |
congestion |
A disadvantage of a tree network is |
address-based size limits |
Modern internet technology evolved from research on: |
the ARPANET |
A disadvantage of a point-to-point network is |
no broadcasting |
An advantage of packet switching is |
parallel transmission |
To see a list of MAC addresses on a Windows-based network: |
issue the ipconfig /all command |
An advantage of a bus network is |
no routing |
192.168.1.1 is an example of: |
an IPv4 address |
Primary forms of Ethernet media include the following except: |
nano |
The well-known port number 80 is used for |
the World Wide Web |
The whois database provides the following information except |
the annual cost to rent the domain name |
Confidential company information that would give competitors a commercial advantage if leaked is called |
a trade secret |
The software-based access control that identifies data items that require different types of protection is: |
internal security labeling |
On the Internet, the entity that looks up a domain name and retrieves information about it is the: |
Domain Name System (DNS) |
In the Web site address www.stthomas.edu, the top-level domain is: |
edu |
Packet filtering looks at any packet header and filters on these values except: |
number of addresses |
Rules that restrict certain types of information to specific groups within a company are categorized as |
need to know |
An attack in which one or more hosts conspire to inundate a victim with ping requests is called a: |
ping flood |
The "trust but verify" maxim applies to the Web site usage management technique of: |
monitoring |
Managing a website’s subject matter and files and constructing web pages can be accomplished with |
a content management system |
A email security problem that can be prevented from occurring is: |
a connection-based attack |
Chain emails often result in: |
excessive email traffic directed at a victim |
Another term for an SMTP email server is: |
message transfer agent (MTA) |
The HTML tag that’s required to create a hyperlink is: |
<a> |
You are accessing an SSL-protected Web site, such as an online bank, and authentication fails. Your browser displays a message indicating why. The following is always an unsafe situation: |
Invalid digital signature |
Using content control to control Internet traffic, a gateway focuses on a packet’s |
application data |
Firewalls use the following mechanisms to filter traffic except: |
hardware filtering |
A point of presence system that analyzes network traffic to detect leaking data is: |
a data loss prevention system |
The language that’s the foundation of most Web pages is: |
Hypertext Markup Language (HTML) |
You can often determine that an email message is a forgery by examining the: |
the first Received header |
The Web address http://[email protected]/login.html is an example of: |
misleading syntax |
ASPX is: |
ASP scripting extended to support Microsoft’s .NET framework |
info sec
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price