Security Test 3 – Flashcards

Unlock all answers in this set

Unlock answers
question
What is the name for a standard or checklist against which systems can be evaluated and audited for their level of security (security posture)?
answer
Baseline
question
Anti-virus products typically utilize what type of virus scanning analysis?
answer
Static analysis
question
Mobile devices with global positioning system (GPS) abilities typically make use of:
answer
Location services
question
Proximity readers utilize a special type of tag that can be affixed to the inside of an ID badge. What is the name for this type of tag?
answer
Radio frequency identification tag
question
What is the best way to prevent data input by a user from having potentially malicious effects on software?
answer
Escaping user responses
question
Mobile Device Management systems that allow users to store usernames and passwords within a device are said to be using:
answer
Credential Manegement
question
Instead of trying to make a match, modern AV techniques are beginning to use a type of detection that attempts to identify the characteristics of a virus. Which of the following is the name for this technique?
answer
Heuristic detection
question
How can an area be made secure from a non-secured area via two interlocking doors to a small room?
answer
Using a man trap
question
Cipher locks are sometimes combined with what type of sensor which uses infrared beams that are aimed across a doorway?
answer
Tailgate sensors
question
What type of filtering utilizes an analysis of the content of spam messages in comparison to neutral/non-spam messages in order to make intelligent decisions as to what should be considered spam?
answer
Bayesian filtering
question
Which of the following can be enabled to prevent a mobile device from being used until a user enters the correct passcode such as a pin or password?
answer
Enable a lock screen
question
A system such as a printer, smart TV, or HVAC controller typically uses an operating system on what is called a(n):
answer
Embedded system
question
Which of the following are options of the SD format card families? (Choose three.)
answer
Standard Capacity (SDSC) High Capacity (SDHC) Secure Digital Input Output (SDIO)
question
Which of the following ports can be found in a laptop? (Choose three.)
answer
USB eSATA RJ-45
question
Simply using a mobile device in a public area can be considered a risk.
answer
True
question
Mobile devices such as laptops are stolen on average once every 20 seconds
answer
False
question
DLP agent sensors are installed on each host device and monitor for actions such as printing, copying to a USB flash drive or burning to a CD or DVD.
answer
True
question
____________ paint is a nontoxic petroleum gel-based paint that is thickly applied and does not harden; thereby, making any coated surface very difficult to climb.
answer
Anti-climb
question
__________ are portable computing devices that are generally larger than smartphones, smaller than notebooks and focused on ease of use.
answer
Tablets
question
A ____________ is a matrix or two-dimensional barcode first designed for the automotive industry in Japan.
answer
quick response code
question
Instead of using a key or entering a code to open a door, a user can use an object such as an ID badge to identify themselves in order to gain access to a secure area. Which of the following describes this type of object?
answer
physical token
question
Which PIN is considered to be the most commonly used PIN?
answer
1234
question
Which of the following mobile operating systems require all applications to be reviewed and approved before they can be made available on the public store front?
answer
iOS
question
Which of the following management systems can help facilitate asset tracking?
answer
Mobile Device Management MDM
question
Which of the following is a type of computing device that uses a limited version of the Linux operating system and uses a web browser with an integrated medial player?
answer
Web-based
question
What is the name for a cumulative package of all patches and hotfixes as well as additional features up to a given point?
answer
Service Pack
question
What term is used to describe the operation of stockrooms where mobile devices are stored prior to their dispersal to employees?
answer
Inventory Control
question
A QR code can contain which of the following items directly? (Choose three.)
answer
phone number, email address, URL
question
Which of the following are types of settings that would be included in a Microsoft Windows security template? (Choose three.)
answer
Account policies, user rights, System servicews
question
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications and monitoring logs.
answer
True
question
The Google Android mobile operating system is a proprietary system for use on only approved devices.
answer
False
question
The Apple _________ operating system, developed by Apple for their mobile devices, is a closed and proprietary architecture.
answer
iOS
question
A(n) _____________ is a record or list of individuals who have permission to enter a secure area, the time they entered and the time they left the area.
answer
Access List
question
A _____________ is a document or series of documents that clearly defines the defense mechanisms an organization will employ in order to keep information secure.
answer
Security Policy
question
An ultrabook is an example of what type of a portable computer?
answer
Subnotebook
question
What PC Card type is typically used for memory?
answer
Type I
question
Which of the following is a wearable technology?
answer
Google Glass
question
How can an administrator manage applications on mobile devices using a technique called "app wrapping"?
answer
mobile application management
question
What is the maximum effective range of a typical passive RFID tag?
answer
19
question
The PC Card and CardBus devices are being replaced with which technology?
answer
ExpressCard
question
What SD card family can be used to transmit pictures over a wireless network to a laptop hard drive or wireless printer?
answer
SDIO
question
What type of video surveillance is typically used by banks, casinos, airports and military installations and commonly employs guards who actively monitor the surveillance?
answer
CCTV
question
Which of the following are considered to be basic characteristics of mobile devices? (Choose three.)
answer
small form factor, mobile operating system, data synchronization capabilities
question
Combination padlocks consist of buttons that must be pushed in the proper sequence in order to be unlocked.
answer
False
question
DLP agent sensors are unable to read inside compressed files and binary files.
answer
Flase
question
____________ locks keep a record of when the door was opened and by which code.
answer
Cipher
question
___________ uses a device's GPS to define geographical boundaries where an app can be used.
answer
Geo-fencing
question
Select the tool below that consists of a system of security tools that is used to recognize and identify data that is critical to an organization and ensures that it is protected:
answer
Data loss prevention
question
Which of the following describes a hand-held mobile device that was intended to replace paper systems and typically included an appointment calendar, an address book, a "to-do" list, a calculator and the ability to record limited notes?
answer
PDA
question
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what type of technology?
answer
Anti-climb
question
Most portable devices and some computer monitors have a special steel bracket security slot built into the case which can be used in conjunction with a:
answer
Cable Lock
question
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What the name of this technology?
answer
Roller Barrier
question
Which of the following are features provided by a typical MDM? (Choose three.)
answer
Rapidly enroll new mobile devices Discover devices accessing enterprise systems Selectively erase corporate data while leaving personal data intact
question
Keyed entry locks are much more difficult to defeat than deadbolt locks.
answer
False
question
Mobile devices use _________ for storage, which is a nonvolatile solid state electronic storage that can be electrically erased and reused.
answer
flash memory
question
What type of device is designed to prevent malicious network packets from entering or leaving computers or networks (often referred to as a packet filter)?
answer
Firewall
question
The CardBus is a 64-bit bus in the PC card form factor.
answer
False
question
Most DLP systems make use of which of the following methods of security analysis?
answer
Content inspection
question
____________ security is the physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks and tablet computers that can easily be stolen.
answer
Hardware
question
A QR code can store website URLs, plain text, phone numbers, e-mail addresses or virtually an alphanumeric data up to 4296 characters.
answer
True
question
The action that is taken by a subject over an object is called a(n):
answer
Operation
question
Select below the access control model that uses access based on a user's job function within an organization:
answer
Role based access control
question
What is the name for a predefined framework that can be used for controlling access and is embedded into software and hardware?
answer
Access control Model
question
What type of attack involves an attacker stealing a file containing password digests and comparing the stolen digests to digests created by the attacker?
answer
Offline Cracker
question
When using Role Based Access Control (RBAC), permissions are assigned to:
answer
Roles
question
To assist with controlling orphaned and dormant accounts, what can be used to indicate when an account is no longer active?
answer
Account expiration
question
_________ in access control indicates that a condition has not been explicitly met; therefore, access has been rejected.
answer
Implicit deny
question
Which authentication protocol runs on Microsoft Windows, Apple MAC OS X, and Linux?
answer
Kerberos
question
Passwords that are transmitted can be captured by what type of software?
answer
Protocol analyzer
question
A RADIUS authentication server requires that the ________ be authenticated first.
answer
Supplicant
question
A list that specifies which subjects are allowed to access an object and what operations they can perform on it is referred to as a(n):
answer
ACL
question
In a UAC prompt, what color is used to indicate the lowest level of risk?
answer
Grey
question
The use of a single authentication credential that is shared across multiple networks is called:
answer
Identity management
question
The capability to look up information by name under the X.500 standard is known as a(n) _______ -pages service.
answer
White
question
A(n) __________ attack begins with the attacker creating encrypted versions of common dictionary words and comparing them against those in a stolen password file.
answer
Dictionary
question
To prevent one individual from having too much control, employees can __________ job responsibilities within their home department or across positions in other departments.
answer
Rotate
question
OpenID is an example of a web-based federated identity management (FIM) system.
answer
FIM
question
Using a rainbow table to crack a password requires three steps: creation of the table, comparing the table to known hash values and decrypting the password.
answer
False
question
A shield icon warns users if they attempt to access any feature that requires UAC permission.
answer
True
question
A ___________ constructs LDAP statements based on user inputs in order to retrieve information from the database or modify its contents.
answer
LDAP injection attack
question
Which of the following is a decentralized open-source FIM that does not require specific software to be installed on the desktop?
answer
OpenID
question
Which type of one-time password (OTP) changes after a set time period?
answer
Time based one time password TOTP
question
What is the center of the weakness of passwords?
answer
Human memory
question
A vulnerable process that is divided between two or more individuals to prevent fraudulent application of the process is known as:
answer
Separation of duties
question
Which of the following is the version of the X.500 standard that runs on a personal computer over TCP/IP?
answer
LDAP
question
With the development of IEEE 802.1x port security, the __________ authentication server has seen greater usage.
answer
RADIUS
question
Which of the following attacks is an attempt to compare a known digest to an unknown digest?
answer
Pre-image attack
question
A RADIUS __________ is a computer that forwards RADIUS messages among RADIUS clients and RADIUS servers.
answer
Proxy
question
In the DAC model, __________ can create and access their objects freely.
answer
Owners
question
Passwords provide strong protection.
answer
False
question
Which of the following is the name given to an individual who periodically reviews security settings and maintains records of access by users?
answer
Custodian
question
The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following options?
answer
DAP
question
Which access control model is considered to be the least restrictive?
answer
Discretionary access control
question
Which authentication factor is based on a unique talent that a user possesses?
answer
What you do
question
What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?
answer
Brute force
question
A token __________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.
answer
Identifier
question
Authorization and access are viewed as synonymous and in access control they are the same step.
answer
False
question
A user or process functioning on behalf of the user that attempts to access an object is known as the:
answer
Subject
question
Which of the following describes the time it takes for a key to be pressed and then released?
answer
Dwell time
question
Which of the following involves the creation of a large pregenerated data set of candidate digests?
answer
Rainbow tables
question
Which federated identity management (FIM) relies on token credentials?
answer
OAuth
question
Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs?
answer
RADIUS
question
___________ is granting or denying approval to use specific resources.
answer
Access control
question
The strength of RADIUS is that messages are always directly sent between the wireless device and the RADIUS server.
answer
False
question
The Bell-LaPadula (BLP) model of MAC can be used to prevent subjects from creating a new object or performing specific functions on objects that are at a lower level than their own.
answer
True
question
A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is:
answer
Common access card CAC
question
Which type of biometrics is based on the perception, thought process and understanding of the user
answer
Cognitave biometrics
question
What access control model below is considered to be the most restrictive access control model and involves assigning access controls to users strictly according to the custodian?
answer
Mandatory access control
question
A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:
answer
Password
question
Which hashing algorithm below is used with NTLMv2's Hashed Message Authentication Code?
answer
MD5
question
The use of one authentication credential to access multiple accounts or applications is referred to as:
answer
Single sign on
question
Which of the following is a set of permissions that is attached to an object?
answer
Access control List
question
What can be used to increase the strength of hashed passwords?
answer
Salt
question
Geolocation is the identification of the location of a person or object using technology and can be used as part of an authentication method.
answer
True
question
In the Mandatory Access Control (MAC) model, every subject and object ___________.
answer
Is assigned a label
question
A list of the available nonkeyboard characters can be seen in Windows by opening which of the following utilities?
answer
charmap.exe
question
Group policy is a Unix feature that allows for the centralized management and configuration of computers and remote users using Unix Active Directory.
answer
False
question
A(n) _________ is the person who is responsible for the information, determines the level of security needed for the data and delegates security duties as required.
answer
owner
question
How is the Security Assertion Markup Language (SAML) used?
answer
Allows secure web domains to exchange user authentication and authorization data
question
User accounts that remain active after an employee has left an organization are referred to as being what type of accounts?
answer
Orphaned
question
In most systems, a user logging in would be asked to _________ herself.
answer
identify
question
Entires within a Directory Information Base are arranged in a tree structure called the:
answer
DIT
question
Select below the authentication system developed by the Massachusetts Institute of Technology (MIT) to verify the identity of network users.
answer
Kerberos
question
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
answer
True
question
What authentication service commonly used on UNIX devices involves communicating user authentication information to a centralized server?
answer
TACACS
question
The most common type of authentication today is a(n) _________.
answer
Password
question
Which access control model can dynamically assign roles to subjects based on a set of defined rules?
answer
Rule based access control
question
Which of the following involves a dictionary attack combined with a brute force attack and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backwards, slightly misspelling words, or including special characters?
answer
Hybrid
question
During RADIUS authentication, what type of packet includes information such as identification of a specific AP that is sending the packet and the username and password?
answer
Authentication request
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New