info sec

Your page rank:

Total word count: 1364
Pages: 5

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

OCTAVE is a:

. risk-assessment process

A security analyst is performing a security assessment. The analyst should not:

take actions to mitigate a serious risk

A rational security decision, such as locking your vehicle when not in use, is an example of:

reasoned paranoia

Supervisory control and data acquisition (SCADA) devices are most often associated with:

utilities

An attempt by a threat agent to exploit assets without permission is referred to as:

an attack

A person skilled in attacking computer systems, who uses those skills as a security expert to help protect systems, is a:

white-hat hacker

When disclosing a security vulnerability in a system or software, the manufacturer should avoid

including enough detail to allow an attacker to exploit the vulnerability

One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is to

report the status of individual computer users

A type of security control that takes measures to help restore a system is referred to as:

corrective

The primary element on a computer motherboard that runs programs and makes the computer work is

the central processing unit (CPU)

The directory access right that allows a user to search for a name in a file’s path but not examine the directory as a whole is called

seek

An interpreter is a program that interprets the text of a program one word at a time, and performs the actions specified in the text. The following are examples of interpreters except:

Java

The type of computer-based access control that involves a process that uses secret or hidden information in order to retrieve particular data items is

puzzle

A zero-day exploit

has no software patch

The character that separates directories in a Windows directory path is

the back slash (\ )

The computer connection that allows you to attach several separate components is called

A Bus

General security access controls refer to objects, rights, and:

subjects

The product that creates financial-fraud botnets using Zbot malware and is offered for sale on the black market is:

ZeuS

The main purpose of a software patch is to:

fix a bug in a program

A type of security control in which you unplug a computer from the Internet to protect it from malware is

mechanical

In a hierarchical file system directory, the topmost directory is called the:

root

A typical hard drive has an arm, a read/write head, and

platters

For data to be cryptographically random, it:

cannot be produced by a procedure

A keystroke logger is often associated with

botnets

The condition in which files automatically take on the same permissions as the folder in which they reside is called:

dynamic inheritance

In Windows, when you copy a file from one folder to another and the folders have different access permissions, the file:

. takes on the access rights of the destination folder

The law that establishes security measures that must be taken on health-related information

HIPAA

When collecting digital evidence from a crime scene, often the best strategy for dealing with a computer that is powered on is to

unplug it

The file system that organizes a volume’s contents around five master files, such as the catalog file and the extents overflow file, is

HFS+

The sector(s) at the beginning of a hard disk that identify the starting block of each partition is called the

master boot record

A security database that contains entries for users and their access rights for files and folders is

an access control list (ACL)

The Fourth Amendment prevents arbitrary searches of areas where users expect their privacy to be protected. This is referred to as:

reasonable expectation of privacy

Hashing

transforms readable text into gibberish

The inode is the data structure on a drive that describes each file and is used in

UFS

An attack in which someone tries to trick a system administrator into divulging a password is called

social engineering

The major file system used with Windows today is

NTFS

An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of

two-factor authentication

A primary use of event logs is to:

serve as an audit trail

In a password system, the total number of possible passwords is called the

search space

The file system that uses a master file table is:

NTFS

In a Diffie-Hellman calculation using P=g^s mod N , s is

the private key value

An Advanced Encryption Standard (AES) key may not be

16 bits in length

The type of cipher that rearranges the text of a message is called

transposition

To use symmetric cryptography, the sender and receiver must share:

a secret key

Digital signatures are often used to provide

nonrepudiation

Volume encryption protects data on a computer against:

theft

The following are common ways to handle new encryption keys except

transfer them via instant messenger

A self-encrypting drive locks data on the hard disk by

erasing the encryption key when the drive is unplugged or reset

Hiding an object, such as a diary, to prevent others from finding it is an example of

Security through Obscurity

A file encryption program

truncates a passphrase that is too long

File encryption protects data on a computer against the following except:

Trojan crypto

The following are properties of persistent key storage except:

it uses volatile storage

1111 1111 – 1111 1111 – 1111 0000 – 0000 0000 is an example of:

a binary network mask

A disadvantage of a mesh network is

congestion

A disadvantage of a tree network is

address-based size limits

Modern internet technology evolved from research on:

the ARPANET

A disadvantage of a point-to-point network is

no broadcasting

An advantage of packet switching is

parallel transmission

To see a list of MAC addresses on a Windows-based network:

issue the ipconfig /all command

An advantage of a bus network is

no routing

192.168.1.1 is an example of:

an IPv4 address

Primary forms of Ethernet media include the following except:

nano

The well-known port number 80 is used for

the World Wide Web

The whois database provides the following information except

the annual cost to rent the domain name

Confidential company information that would give competitors a commercial advantage if leaked is called

a trade secret

The software-based access control that identifies data items that require different types of protection is:

internal security labeling

On the Internet, the entity that looks up a domain name and retrieves information about it is the:

Domain Name System (DNS)

In the Web site address www.stthomas.edu, the top-level domain is:

edu

Packet filtering looks at any packet header and filters on these values except:

number of addresses

Rules that restrict certain types of information to specific groups within a company are categorized as

need to know

An attack in which one or more hosts conspire to inundate a victim with ping requests is called a:

ping flood

The "trust but verify" maxim applies to the Web site usage management technique of:

monitoring

Managing a website’s subject matter and files and constructing web pages can be accomplished with

a content management system

A email security problem that can be prevented from occurring is:

a connection-based attack

Chain emails often result in:

excessive email traffic directed at a victim

Another term for an SMTP email server is:

message transfer agent (MTA)

The HTML tag that’s required to create a hyperlink is:

<a>

You are accessing an SSL-protected Web site, such as an online bank, and authentication fails. Your browser displays a message indicating why. The following is always an unsafe situation:

Invalid digital signature

Using content control to control Internet traffic, a gateway focuses on a packet’s

application data

Firewalls use the following mechanisms to filter traffic except:

hardware filtering

A point of presence system that analyzes network traffic to detect leaking data is:

a data loss prevention system

The language that’s the foundation of most Web pages is:

Hypertext Markup Language (HTML)

You can often determine that an email message is a forgery by examining the:

the first Received header

The Web address http://[email protected]/login.html is an example of:

misleading syntax

ASPX is:

ASP scripting extended to support Microsoft’s .NET framework

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending