IT CertificationsComprehensive Study Set

Cissp Flashcards Pdf

532 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Data Remanence

ANSWER

The remains of partial or even the entire data set of digital information

QUESTION 2

Disaster Recovery Planning (DRP)

ANSWER

Deals with restoring normal business operations after the disaster takes place...works to get the business back to normal

QUESTION 3

Maximum tolerable downtime

ANSWER

The maximum period of time that a critical business function can be inoperative before the company incurs significant and long-lasting damage.

QUESTION 4

802.5

ANSWER

IEEE standard defines the Token Ring media access method

QUESTION 5

Recovery Time Objective

ANSWER

The balance against the cost of recover and the cost of disruption

QUESTION 6

Resource Requirements

ANSWER

portion of the BIA that lists the resources that an organization needs in order to continue operating each critical business function.

QUESTION 7

Checklist

ANSWER

This type of DRP test is a detailed review of DRP documents, performed by individuals working on their own. It is used to identify inaccuracies, errors, and omissions in DRP documentation.

QUESTION 8

Information Owner

ANSWER

The one person responsible for data, its classification and control setting

QUESTION 9

Job Rotation

ANSWER

To move from location to location, keeping the same function

QUESTION 10

Differential power analysis

ANSWER

A side-channel attack carry-out on smart cards that examining the power emission release during processing

QUESTION 11

Mitigate

ANSWER

Defined as real-time monitoring and analysis of network activity and data for potential vulnerabilities and attacks in progress.

QUESTION 12

Electromagnetic analysis

ANSWER

A side-channel attack on smart cards that examine the frequencies emitted and timing

QUESTION 13

Analysis

ANSWER

Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.

QUESTION 14

Change Control

ANSWER

Maintaining full control over requests, implementation, traceability, and proper documentation of changes.

QUESTION 15

Containment

ANSWER

Mitigate damage by isolating compromised systems from the network.

QUESTION 16

30 to 90 Days

ANSWER

Most organizations enforce policies to change password ranging from

QUESTION 17

Isochronous

ANSWER

Process must within set time constrains, applications are video related where audio and video must match perfectly

QUESTION 18

Detection

ANSWER

Identification and notification of an unauthorized and/or undesired action

QUESTION 19

Electronic Vaulting

ANSWER

Makes copies of files as they are modified and periodically transmits them to an off-site backup site

QUESTION 20

Fault Tolerance

ANSWER

Mitigation of system or component loss or interruption through use of backup capability.

QUESTION 21

Incremental

ANSWER

A backup method use when time and space are a high importance

QUESTION 22

Secure HTTP

ANSWER

Protocol designed to same individual message securely

QUESTION 23

Criminal

ANSWER

Conduct that violates government laws developed to protect society

QUESTION 24

Class C

ANSWER

Has 256 hosts

QUESTION 25

RAID 0

ANSWER

Creates one large disk by using several disks

QUESTION 26

Trade secrets

ANSWER

Deemed proprietary to a company and often include information that provides a competitive edge, the information is protected as long the owner takes protective actions

QUESTION 27

X.400

ANSWER

Active Directory standard

QUESTION 28

Prevention

ANSWER

Controls deployed to avert unauthorized and/or undesired actions.

QUESTION 29

Redundant Array Of Independent Drives (RAID)

ANSWER

A group of hard drives working as one storage unit for the purpose of speed and fault tolerance

QUESTION 30

Proprietary

ANSWER

Define the way in which the organization operates.

QUESTION 31

Gateway

ANSWER

Used to connect two networks using dissimilar protocols at different layers of the OSI model

QUESTION 32

Classification

ANSWER

The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.

QUESTION 33

Data Integrity

ANSWER

The property that data meet with a priority expectation of quality and that the data can be relied upon.

QUESTION 34

Alarm Filtering

ANSWER

The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks

QUESTION 35

Coaxial Cable

ANSWER

A cable consisting of a core, inner conductor that is surrounding by an insulator, an outer cylindrical conductor

QUESTION 36

Concentrator

ANSWER

Layer 1 network device that is used to connect network segments together, but provides no traffic control (a hub).

QUESTION 37

Digital Signature

ANSWER

Result of a user performing an action on a hash value with a private key, provides authentication, nonrepudiation, and data integrity

QUESTION 38

Eavesdropping

ANSWER

A passive network attack involving monitoring of traffic.

QUESTION 39

E-Mail Spoofing

ANSWER

Forgery of the sender's email address in an email header.

QUESTION 40

Emanations

ANSWER

Potentially compromising leakage of electrical or acoustical signals.

QUESTION 41

Fiber Optics

ANSWER

Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.

QUESTION 42

Fraggle

ANSWER

A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses.

QUESTION 43

Hijacking

ANSWER

Interception of a communication session by an attacker.

QUESTION 44

Hub

ANSWER

Layer 1 network device that is used to connect network segments together, but provides no traffic control (a concentrator).

QUESTION 45

Injection

ANSWER

An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.

QUESTION 46

Interception

ANSWER

Unauthorized access of information (e.g. Tapping, sniffing, unsecured wireless communication, emanations)

QUESTION 47

IP Address Spoofing

ANSWER

Forging of an IP address.

QUESTION 48

IP Fragmentation

ANSWER

An attack that breaks up malicious code into fragments, in an attempt to elude detection.

QUESTION 49

Kerberos

ANSWER

A network authentication protocol, provide protection by: authentication, authorization, and auditing

QUESTION 50

Incident response

ANSWER

The response of an organization to a disaster or other significant event that may significantly impact the organization, its people, or its ability to function productively.

QUESTION 51

Modification

ANSWER

A type of attack involving attempted insertion, deletion or altering of data.

QUESTION 52

Multiplexers

ANSWER

A device that sequentially switches multiple analog inputs to the output.

QUESTION 53

Open Mail Relay Servers

ANSWER

A mail server that improperly allows inbound SMTP connections for domains it does not serve.

QUESTION 54

Enticement

ANSWER

The legal act of luring an intruder, with intend to monitor their behavior

QUESTION 55

Packet Filtering

ANSWER

A basic level of network access control that is based upon information contained in the IP packet header.

QUESTION 56

Patch Panels

ANSWER

Provides a physical cross connect point for devices.

QUESTION 57

Private Branch Exchange (PBX)

ANSWER

A telephone exchange for a specific office or business.

QUESTION 58

Phishing

ANSWER

A social engineering attack that uses spoofed email or websites to persuade people to divulge information.

QUESTION 59

Physical Tampering

ANSWER

Unauthorized access of network devices.

QUESTION 60

Proxies

ANSWER

Mediates communication between un-trusted hosts on behalf of the hosts that it protects.

QUESTION 61

Repeaters

ANSWER

Layer 1 network device that is used to connect network segments together, but provides no traffic control (a concentrator).

QUESTION 62

Radio Frequency Interference (RFI)

ANSWER

A disturbance that degrades performance of electronic devices and electronic communications.

QUESTION 63

Rogue Access Points

ANSWER

Unauthorized wireless network access device.

QUESTION 64

Routers

ANSWER

A layer 3 device that used to connect two or more network segments and regulate traffic.

QUESTION 65

Satellite

ANSWER

A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.

QUESTION 66

Sequence Attack

ANSWER

An attack involving the hijacking of a TCP session by predicting a sequence number.

QUESTION 67

Shielding

ANSWER

Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.

QUESTION 68

Smurf

ANSWER

A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)

QUESTION 69

Sniffing

ANSWER

Eavesdropping on network communications by a third party.

QUESTION 70

Source Routing Exploitation

ANSWER

A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.

QUESTION 71

Spam

ANSWER

Unsolicited commercial email

QUESTION 72

Switches

ANSWER

A layer 2 device that used to connect two or more network segments and regulate traffic.

QUESTION 73

SYN Flooding

ANSWER

A Denial of Service attack that floods the target system with connection requests that are not finalized.

QUESTION 74

Tapping

ANSWER

Eavesdropping on network communications by a third party.

QUESTION 75

Tar Pits

ANSWER

Mitigation of spamming and other attacks by delaying incoming connections as long as possible.

QUESTION 76

Teardrop

ANSWER

A Denial of Service attack that exploits systems that are not able to handle malicious, overlapping and oversized IP fragments.

QUESTION 77

TEMPEST

ANSWER

A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.

QUESTION 78

Twisted Pair

ANSWER

A simple, inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.

QUESTION 79

War Dialing

ANSWER

Reconnaissance technique, involving automated, brute force identification of potentially vulnerable modems.

QUESTION 80

Worldwide Interoperability for Microwave Access (WI-MAX )

ANSWER

A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.

QUESTION 81

Accreditation

ANSWER

The managerial approval to operate a system based upon knowledge of risk to operate

QUESTION 82

1029

ANSWER

18 USC - Fraud and Related Activity in Connection with Access Devices

QUESTION 83

Certification

ANSWER

The technical and risk assesment of a system within the context of the operating environment

QUESTION 84

Common Criteria

ANSWER

The current internationally accepted set of standards and processes for information security products evaluation and assurance, which joins function and assurance requirements

QUESTION 85

Covert Channel

ANSWER

An unintended communication path

QUESTION 86

Data Hiding

ANSWER

A software design technique for abstraction of a process

QUESTION 87

Embedded

ANSWER

Hardware or software that is part of a larger system

QUESTION 88

NIDS

ANSWER

Usually inspect the header, because the data payload is encrypted in most cases

QUESTION 89

Framework

ANSWER

Third party processes used to organize the implementation of an architecture

QUESTION 90

Internet Architecture Board

ANSWER

Committee for internet design, engineering, and management, responsible for the architectural oversight of the IETF

QUESTION 91

1024-49151

ANSWER

Registered ports as defined by IANA

QUESTION 92

ITSEC

ANSWER

The past internationally accepted set of standards and processes for information security products evaluation and assurance, which separates function and assurance requirements

QUESTION 93

6

ANSWER

Semiformally verified design and tested

QUESTION 94

Memory Management

ANSWER

A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives

QUESTION 95

Race Condition

ANSWER

A state where two subjects can access the same object without proper mediation

QUESTION 96

Multi-Processing

ANSWER

To execute more than one instruction at an instant in time

QUESTION 97

Multi-Processor

ANSWER

More than one processor sharing same memory, also know as parallel systems

QUESTION 98

Multi-Programming

ANSWER

Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective

QUESTION 99

Multi-Tasking

ANSWER

More than one process in the middle of executing at a time

QUESTION 100

Preemptive

ANSWER

A type of multitasking that allows for more even distribution of computing time among competing request

QUESTION 101

Primary Storage

ANSWER

Memory - RAM

QUESTION 102

Process Isolation

ANSWER

A form of data hiding which protects running threads of execution from using each other's memory

QUESTION 103

Protection

ANSWER

Memory management technique that allows two processes to run concurrently without interaction

QUESTION 104

Reference Monitor

ANSWER

The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.

QUESTION 105

Relocation

ANSWER

Memory management technique which allows data to be moved from one memory address to another

QUESTION 106

Ring Protection

ANSWER

Implementation of operating system protection mechanism, where more sensitive built upon the layering concept

QUESTION 107

Trademarks

ANSWER

Protect words, names, product shapes, symbols, colors, or a combination of these, used to identify product a company

QUESTION 108

Secondary Storage

ANSWER

The hard drive

QUESTION 109

Virtual Memory

ANSWER

Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive

QUESTION 110

Wiretapping

ANSWER

A passive attack that eavesdrops on communications, only legal with prior consent or warrant

QUESTION 111

Security Kernel

ANSWER

Subset of operating systems components dedicated to protection mechanisms

QUESTION 112

Structured Walk-through

ANSWER

One method of testing a specific component of a plan. Typically, a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.

QUESTION 113

State Machine Model

ANSWER

Abstract and mathematical in nature, defining all possible states, transitions and operations

QUESTION 114

Internal use only

ANSWER

Information that can be distribute within the organization but could harm the company if disclosed externally

QUESTION 115

Synchronous token

ANSWER

Generates a one-time password that is only valid for a short period of time

QUESTION 116

User Mode

ANSWER

(problem or program state) the problems solving state, the opposite of supervisor mode

QUESTION 117

TCSEC (Orange Book)

ANSWER

The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance, which combines function and assurance requirements

QUESTION 118

Threads

ANSWER

A unit of execution

QUESTION 119

TNI (Red Book)

ANSWER

The past U.S. military accepted set of standards and processes for network evaluation and assurance, which combines function and assurance requirements

QUESTION 120

Trusted Computing Base

ANSWER

All of the protection mechanism in a computer system

QUESTION 121

636

ANSWER

Many implementations run LDAP on SSL on this port

QUESTION 122

Activation

ANSWER

To start business continuity processes

QUESTION 123

Access Control Process

ANSWER

1- Defining resources 2- Determining users 3- Specifying how users use recourse

QUESTION 124

Alternate Site

ANSWER

Location to perform the business function

QUESTION 125

Business Continuity Planning (BCP)

ANSWER

Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization

QUESTION 126

Business Continuity Program

ANSWER

An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed, resources are allocated and, recovery and continuity strategies and procedures are completed and tested.

QUESTION 127

Business Continuity Steering Committee

ANSWER

A committee of decision makers, business owners, technology experts and continuity professionals, tasked with making strategic recovery and continuity planning decisions for the organization.

QUESTION 128

Asynchronous

ANSWER

Encrypt/Decrypt are processes in queues, key benefit utilization of hardware devices and multiprocessor systems

QUESTION 129

Copyright

ANSWER

Protects the expression of an idea, rather than the idea itself

QUESTION 130

Business Interruption Insurance

ANSWER

Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.

QUESTION 131

Digital Signatures

ANSWER

Message encrypted is input into the hash function then the hash value is encrypted with the sender's private key

QUESTION 132

Business Recovery Timeline

ANSWER

The chronological sequence of recovery activities, or critical path, that must be followed to resume an acceptable level of operations following a business interruption.

QUESTION 133

Business Unit Recovery

ANSWER

The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster, including personnel, essential records, communication facilities, fax, mail services, etc.

QUESTION 134

Checklist Test

ANSWER

(desk check) a test that answers the questions: Does the organization have the documentation it needs? Can it be located?

QUESTION 135

Cold Site

ANSWER

an empty computer room with environmental facilities (UPS; heating, ventilation, and air conditioning [HVAC]; and so on) but no computing equipment.

QUESTION 136

Discretionary

ANSWER

Enables data owners to dictate what subjects have access to the objects they own

QUESTION 137

Contingency Plan

ANSWER

A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. May use any number of resources (e.e workaround procedures, alternate work area, etc.)

QUESTION 138

Crisis

ANSWER

A critical event, which, if not handled in an appropriate manner, may dramatically impact an organization's profitability, reputation, or ability to operate.

QUESTION 139

Critical Functions

ANSWER

Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.

QUESTION 140

Critical Infrastructure

ANSWER

Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization, community, nation, etc

QUESTION 141

Critical Records

ANSWER

Records or documents that, if damaged or destroyed, would cause considerable inconvenience and/or require replacement or recreation at considerable expense.

QUESTION 142

Damage Assessment

ANSWER

The process of assessing damage, following a disaster, to computer hardware, vital records, office facilities, etc. And determining what can be salvaged or restored and what must be replaced.

QUESTION 143

Data Backup Strategies

ANSWER

Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives, including timeframes, technologies, offsite storage, and will ensuretime objectives can be met.

QUESTION 144

Data Backups

ANSWER

The back up of system, application, program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.

QUESTION 145

Data Recovery

ANSWER

The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.

QUESTION 146

Database Replication

ANSWER

The partial or full duplication of data from a source database to one or more destination databases.

QUESTION 147

Declaration

ANSWER

A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)

QUESTION 148

Desk Check Test

ANSWER

A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?

QUESTION 149

Disaster

ANSWER

An event which stops business from continuing.

QUESTION 150

Disaster Recovery Plan

ANSWER

The document that defines the resources, actions, tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.

QUESTION 151

Disaster Recovery Teams (Business Recovery Teams)

ANSWER

A structured group of teams ready to take control of the recovery operations if a disaster should occur.

QUESTION 152

Red box

ANSWER

Simulates the alert tones of coins being deposited into a pay phone

QUESTION 153

Distributed Processing

ANSWER

A back up type, where the organization has excess capacity in another location.

QUESTION 154

Network Address Hijacking

ANSWER

Enable the attacker to re-route traffic from a network device to a personal machine

QUESTION 155

4

ANSWER

EAL Methodically designed, tested, and reviewed

QUESTION 156

Emergency

ANSWER

A sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property.

QUESTION 157

Accidental threats

ANSWER

More than 3-4 of all security violations are linked to insiders of a company are

QUESTION 158

Emergency Procedures

ANSWER

A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.

QUESTION 159

Executive Succession

ANSWER

Planning for the delegation of authority required when decisions must be made without the normal chain of command

QUESTION 160

Disk Shadowing

ANSWER

Ensure availability of data and provide fault-tolerance by creating and maintaining two identical disks, provide online backup storage, but is very expensive

QUESTION 161

Forward Recovery

ANSWER

The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.

QUESTION 162

Full Test (Full Interruption)

ANSWER

A BCP testing type, a test that answers the question: Can the organization operate at the alternate location only?

QUESTION 163

High-Risk Areas

ANSWER

Heavily populated areas, particularly susceptible to high-intensity earthquakes, floods, tsunamis, or other disasters, for which emergency response may be necessary in the event of a disaster.

QUESTION 164

Hot Site

ANSWER

Fully configured with hardware, software, and environmental needs, can be up and running quickly, expensive

QUESTION 165

Full-interruption

ANSWER

Regular operations is completely stop and move to the alternative site

QUESTION 166

Integrated Test

ANSWER

A test conducted on multiple components of a plan, in conjunction with each other, typically under simulated operating conditions

QUESTION 167

Phreakers

ANSWER

Hackers who specialize in committing telephone fraud

QUESTION 168

Maximum Tolerable Downtime (MTD)

ANSWER

Amount of time for restoring a business process or function to normal operations without major loss

QUESTION 169

Data Source Name

ANSWER

A logical name for the data store and does not use the drive letter or directory location of the database. Can be use when programming ODBC

QUESTION 170

Mission-Critical Application

ANSWER

An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business, as well as legal or regulatory impacts.

QUESTION 171

Mobile Recovery

ANSWER

A mobilized resource purchased or contracted for the purpose of business recovery.

QUESTION 172

14443-4

ANSWER

ISO/IEC standard for smart cards - Transmission protocol

QUESTION 173

Mock Disaster

ANSWER

One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all, or most, of the applicable teams.

QUESTION 174

Data Mining

ANSWER

The act of collecting and analyzing large quantities of information to determine pattern of behavior and use them to form a conclusion about past, current, and future behavior

QUESTION 175

Off Site

ANSWER

A backup of data located where staff can not gain access readily and a regional disaster will not cause harm

QUESTION 176

Off-Site Storage

ANSWER

Alternate facility, other than the primary production site, where duplicated vital records and documentation may be stored for use during disaster recovery.

QUESTION 177

Dispersion

ANSWER

Spreading out of light pulses which overlap the preceding or upcoming purses, most prevalent in fiber optic cabling

QUESTION 178

Operational Exercise

ANSWER

One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions

QUESTION 179

Operational Impact Analysis

ANSWER

Determines the impact of the loss of an operational or technological resource. The loss of a system, network or other critical resource may affect a number of business processes.

QUESTION 180

Operational Test

ANSWER

A test conducted on one or more components of a plan under actual operating conditions.

QUESTION 181

Synchronous (TIME BASED) dynamic

ANSWER

Uses time or a counter between the token and the authentication server, secure-ID is an example

QUESTION 182

Reciprocal Agreement

ANSWER

Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.

QUESTION 183

Recovery Period

ANSWER

The time period between a disaster and a return to normal functions, during which the disaster recovery plan is employed.

QUESTION 184

Recovery Point Objective (RPO)

ANSWER

The point in time to which systems and data must be recovered after an outage.

QUESTION 185

Recovery Strategy

ANSWER

An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.

QUESTION 186

Recovery Time Objectives

ANSWER

Maximum tolerance for loss of certain business function, basis of strategy

QUESTION 187

Remote Journaling

ANSWER

Transmit the journal or transaction log offsite to a backup location

QUESTION 188

2

ANSWER

EAL Structurally tested

QUESTION 189

Digital Linear Tape

ANSWER

Is only 4mm in size, but compression technique and head scanning makes it a large capacity and fast

QUESTION 190

Mandatory

ANSWER

Users have clearances, and resources have security levels that contain data classifications

QUESTION 191

Risk Assessment / Analysis

ANSWER

Process of identifying the risks to an organization, assessing the critical functions, defining the controls in place to reduce organization exposure and evaluating the cost for such controls.

QUESTION 192

Risk Mitigation

ANSWER

Implementation of measures to deter specific threats to the continuity of business operations, and/or respond to any occurrence of such threats in a timely and appropriate manner.

QUESTION 193

Shadowing

ANSWER

(file shadowing) a backup type, for databases at a point in time

QUESTION 194

Security Domain

ANSWER

An area where common processes and security control work to separate all entities involved in these processes from other entities

QUESTION 195

Access

ANSWER

A flow of information between a subject and an object

QUESTION 196

System Downtime

ANSWER

A planned or unplanned interruption in system availability.

QUESTION 197

Restricted

ANSWER

Information that utmost protection or, if discovered by unauthorized personnel, would caused irreparable damage

QUESTION 198

Uninterruptible Power Supply (Online)

ANSWER

A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.

QUESTION 199

Vital Record

ANSWER

A record that must be preserved and available for retrieval if needed.

QUESTION 200

Warm Site

ANSWER

Recovery alternative which includes cold site and some equipment and infrastructure is available

QUESTION 201

IT Contingency

ANSWER

Plan for systems,networks, and major applications recovery procedures after disruptions, should be develop for each major system and application

QUESTION 202

Spiral

ANSWER

A design methodology which addresses risk early and often

QUESTION 203

Business Continuity Plan

ANSWER

Strategy documents that provide detailed procedures that: ensure business functions are maintained, help minimize losses of life, operations, and systems

QUESTION 204

System Life Cycle

ANSWER

Robust project management process of new systems with at least the following phases: design and development, production, distribution, operation, maintenance, retirement, and disposal

QUESTION 205

Object Oriented Programming (OOP)

ANSWER

A programming design philosophy and a type of programming language, which breaks a program into smaller units. Each unit has its own function.

QUESTION 206

Compartmentalization

ANSWER

The process of separating group of people and information from other groups such as isolated from each other thus information does not flow between them

QUESTION 207

Entrapment

ANSWER

Induces an individual to commit a crime other wise he won't, it is illegal

QUESTION 208

Dumpster diving

ANSWER

Refers to going through someone's trash to find information, it is legal, unless involves trespassing

QUESTION 209

Method

ANSWER

OOP concept of an object's abilities, what it does

QUESTION 210

Encapsulation

ANSWER

OOP concept of a class's details to be hidden from object

QUESTION 211

Polymorphism

ANSWER

Objects or programming that looks the different but act same

QUESTION 212

Inheritance

ANSWER

OOP concept of a taking attributes from the original or parent

QUESTION 213

Assembler

ANSWER

Converts a high level language into machine language

QUESTION 214

Compiler

ANSWER

Converts source code to an executable

QUESTION 215

Interpreter

ANSWER

Line by line translation from a high level language to machine code

QUESTION 216

Machine Language (Machine Code)

ANSWER

Program instructions based upon the CPU's specific architecture

QUESTION 217

2-Phase Commit

ANSWER

A distributed system's transaction control that requires updates to complete or rollback

QUESTION 218

Black box

ANSWER

Manipulates line voltage to enable toll-free calling

QUESTION 219

Data Dictionary

ANSWER

A description of a database

QUESTION 220

Checkpoint

ANSWER

Part of a transaction control for a database which informs the database of the last recorded transaction

QUESTION 221

Trojan Horse

ANSWER

A program with an inappropriate second purpose

QUESTION 222

X.25

ANSWER

Packet-switching technology that is used by telecom services for data-only traffic, operate at L3 and L2

QUESTION 223

Federated identity

ANSWER

A portable identity, and its associated entitlements, that can be used across business boundaries, allow user to be authenticated across multiple IT systems

QUESTION 224

Logic Bomb

ANSWER

A program that waits for a condition or time to occur that executes an inappropriate activity

QUESTION 225

Data Diddler

ANSWER

Malware that makes small random changes to many data points

QUESTION 226

Remote Access Trojan

ANSWER

A Trojan horse with the express underlying purpose of controlling host from a distance

QUESTION 227

Rootkit

ANSWER

Malware that subverts the detective controls of an operating system

QUESTION 228

Payload

ANSWER

Final purpose or result

QUESTION 229

Botnet

ANSWER

Organized group of compromised computers

QUESTION 230

Spyware

ANSWER

Program that inappropriately collects private data or activity

QUESTION 231

Adware

ANSWER

Unsolicited advertising software

QUESTION 232

Deadlock

ANSWER

A condition in which neither party is willing to stop their activity for the other to complete

QUESTION 233

Business Impact Analysis

ANSWER

Qualitative & quantitative data is gathered, analyzed, interpreted, and presented to management

QUESTION 234

Fiber Distributed Data Interface

ANSWER

A token-passing ring scheme, has a second ring that remains dormant until an error condition is detected

QUESTION 235

Time Of Check/Time Of Use

ANSWER

A race condition where the security changes during the object's access

QUESTION 236

Denial Of Service

ANSWER

An availability attack, to consume resources to the point of exhaustion

QUESTION 237

Distributed Denial Of Service

ANSWER

An availability attack, to consume resources to the point of exhaustion from multiple vectors

QUESTION 238

Trapdoors (Backdoors) (Maintenance Hooks)

ANSWER

A programming device use in development to circumvent controls

QUESTION 239

Buffer Overflow

ANSWER

Unchecked data which spills into another location in memory

QUESTION 240

Alternate Data Streams (File System Forks)

ANSWER

A covert storage channel on the file attribute

QUESTION 241

Malformed Input

ANSWER

Inappropriate data

QUESTION 242

Dangling Pointer

ANSWER

False memory reference

QUESTION 243

SQL Injection

ANSWER

A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy

QUESTION 244

Cross-Site Scripting

ANSWER

Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware

QUESTION 245

Separation of Duties

ANSWER

Distributing tasks and associated privileges among multiple people, primary objective to prevent fraud and errors

QUESTION 246

Confidential

ANSWER

Information that if release outside of the organization could create severe problems for the organization

QUESTION 247

Application Programming Interface

ANSWER

A library of commands maintained by a system for other programs to use, provides consistency and integrity for the programs

QUESTION 248

Synchronous

ANSWER

Each encryption and decryption request is perform immediately

QUESTION 249

Atomicity, Consistency, Isolation, Durability

ANSWER

A set of best practices for programmers to seek in all application or data base design

QUESTION 250

Atomicity

ANSWER

Indivisible, data field must contain only one value that either all transactions take place or none do

QUESTION 251

RIP

ANSWER

Distance vector routing protocol, doesn't offer security and is interior gateway protocol

QUESTION 252

Isolation

ANSWER

Another subject cannot see an ongoing or pending update until it is complete

QUESTION 253

Subject

ANSWER

An active entity that requests access to a passive entity

QUESTION 254

Cognitive

ANSWER

Passwords base on user's opinion or life experience

QUESTION 255

5 Rules Of Evidence

ANSWER

Evidence must be: admissible, authentic, complete, accurate, and convincing

QUESTION 256

Accurate

ANSWER

Pertaining to law, high degree of veracity

QUESTION 257

Active Data

ANSWER

Information residing on computer systems, that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion, modification or reconstruction.

QUESTION 258

Wireless Application Protocols

ANSWER

A specification for a set of communication protocols to standardize the way that wireless devices

QUESTION 259

Secure MIME

ANSWER

A standard for encrypting and digitally signing electronic mail and for secure data transmissions.

QUESTION 260

Archival Data

ANSWER

Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.

QUESTION 261

Acronym for American Standard Code for Information Interchange (ASCII)

ANSWER

Text that does not include special formatting features and therefore can be exchanged and read by most computer systems

QUESTION 262

Information Classification

ANSWER

The practice of evaluating the risk levels of an organization's information to ensure that it receives the appropriate level of protection

QUESTION 263

Discretionary Access Control

ANSWER

The owner determines who has access to the data and what privileges they have - user centric

QUESTION 264

Binary

ANSWER

Ertaining to a number system that has just two unique digits.

QUESTION 265

Bit

ANSWER

A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.

QUESTION 266

Burn

ANSWER

Slang for making (burning) a CD-ROM copy of data, whether it is music, software, or other data.

QUESTION 267

Targeted Attack

ANSWER

An attack that sends specially developed bot only to one or a few IP Addresses in the target organization

QUESTION 268

ALE

ANSWER

SLE x ARO =

QUESTION 269

Cache

ANSWER

A type a computer memory that temporarily stores frequently used information for quick access.

QUESTION 270

Chain Of Custody

ANSWER

Recording the Who What When Where How of evidence

QUESTION 271

Civil Or Code Law

ANSWER

System of law based upon what is good for society

QUESTION 272

Mobile Code

ANSWER

Software that is transmitted across the network from a remote source to a local system then executed at the local system

QUESTION 273

Administrative

ANSWER

Covers standards of performance or conduct expected by government agencies from companies, industries, certain officials

QUESTION 274

Convincing

ANSWER

Pertaining to law, lending it self to one side of an argument

QUESTION 275

Cookie

ANSWER

Small data files written to a user's hard drive by a web server.

QUESTION 276

Salvage team

ANSWER

Responsible for starting the recovery of the original site

QUESTION 277

Deletion

ANSWER

Process whereby data is removed from active files and other data storage structures

QUESTION 278

Disaster Recovery Tape

ANSWER

Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."

QUESTION 279

Excessive privileges

ANSWER

Employee has more rights than necessary to complete his tasks

QUESTION 280

Due Diligence

ANSWER

Actions measured against either a policy or what a reasonable person would do

QUESTION 281

Encryption

ANSWER

A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.

QUESTION 282

Diverse routing

ANSWER

A method of providing telecommunication continuity which involve routing traffic through split or duplicate cable facilities

QUESTION 283

File Extension

ANSWER

A tag of three or four letters, preceded by a period, which identifies a data file's format or the application used to create the file.

QUESTION 284

File Level Deletion

ANSWER

Renders the file inaccessible to the operating system, available to reuse for data storage.

QUESTION 285

Host-to-host

ANSWER

TCP/IP protocol provides for reliable end-to-end communication, ensure error free delivery, handles data's packet sequencing, and maintains the data's integrity

QUESTION 286

File Sharing

ANSWER

One of the key benefits of a network is the ability to share files stored on the server among several users.

QUESTION 287

Firewall

ANSWER

A system designed to prevent unauthorized access to or from a private network.

QUESTION 288

Forensic Copy

ANSWER

An exact bit-by-bit copy of the entire physical hard drive or floppy disk, including slack and unallocated space. Only forensic copy quality will hold up in court.

QUESTION 289

Fragmented Data

ANSWER

Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.

QUESTION 290

DNS

ANSWER

Relies on UDP whereas services such as: FTP, Telnet and SMTP rely on TCP

QUESTION 291

Hard Disk

ANSWER

A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.

QUESTION 292

Simulation

ANSWER

Practice execution of the plan takes place, focus on specifics scenario, continues up to the point of actual relocation of the alternative site

QUESTION 293

Honeypot

ANSWER

A computer designed for the purpose of studying adversaries

QUESTION 294

Investigation

ANSWER

Methodical research of an incident with the purpose of finding the root cause

QUESTION 295

JPEG (Joint Photographic Experts Group)

ANSWER

An image compression standard for photographs

QUESTION 296

Legacy Data

ANSWER

Information which has retained its importance, but which has been created or stored by software/hardware that has been rendered obsolete.

QUESTION 297

1030

ANSWER

18 USC - Fraud and Related Activity in Connection with Computers

QUESTION 298

Mirroring

ANSWER

The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.

QUESTION 299

Continuous authentication

ANSWER

A type of authentication that provides protections against impostors who can see, alter, and insert information passed between the claimant and verifier even after the claimant/verifier authentication is complete

QUESTION 300

Hierarchical Storage Management

ANSWER

Provides continuous online backup by using optical or tape jukeboxes

QUESTION 301

Residual Data

ANSWER

Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.

QUESTION 302

Sampling

ANSWER

Process of statistically testing a data set for the likelihood of relevant information.

QUESTION 303

TIFF (Tagged Image File Format)

ANSWER

One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.

QUESTION 304

Algorithm

ANSWER

Mathematical function that determines the cryptographic operations

QUESTION 305

Asymmetric

ANSWER

Encryption system using a pair of mathematically related unequal keys

QUESTION 306

Evidence

ANSWER

It must be legally permissible, meaning it was seized legally, and the chance of custody was not alter

QUESTION 307

Checksum

ANSWER

A mathematical tool for verifying no unintentional changes have been made

QUESTION 308

Cipher Text

ANSWER

Scrambled form of the message or data

QUESTION 309

Content-Dependent

ANSWER

This control is based on the actual information within the data rather than the general definition

QUESTION 310

HR Database

ANSWER

Normally consider the authority source for user identities because is where they are developed

QUESTION 311

Cryptanalysis

ANSWER

Code breaking, practice of defeating the protective properties of cryptography.

QUESTION 312

Social engineering

ANSWER

Act of tricking or deceiving a person into giving confidential or sensitive information

QUESTION 313

Cryptology

ANSWER

The study of cryptography and cryptanalysis

QUESTION 314

Civil Law

ANSWER

Wrongs against individuals or companies, resulting in damage or loss

QUESTION 315

Nondiscretionary

ANSWER

The administrator define and control access to rules for files in system

QUESTION 316

Class B

ANSWER

Has 65,536 hosts

QUESTION 317

Salami

ANSWER

Executed by carrying out smaller crimes with the hope that a larger crime will not be noticed

QUESTION 318

Encipher

ANSWER

Act of scrambling the cleartext message by using a key.

QUESTION 319

Initialization Vector

ANSWER

Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated

QUESTION 320

Key Clustering

ANSWER

An instance in which two different keys generate the same ciphertext from the same plaintext

QUESTION 321

Key Escrow

ANSWER

For PKI, to store another copy of a key

QUESTION 322

X.500

ANSWER

Lightweight Directory Access Protocol

QUESTION 323

Key Space

ANSWER

Total number of keys available that may be selected by the user of a cryptosystem

QUESTION 324

Keyed-Hashing For Message Authentication

ANSWER

A hash that has been further encrypted with a symmetric algorithm

QUESTION 325

Least Privilege

ANSWER

Subjects and objects are given the minimum level of access required to perform functions or, tasks

QUESTION 326

14443-1

ANSWER

ISO/IEC standard for smart card physical characteristics

QUESTION 327

Router

ANSWER

A device where the two connecting networks must have the same network protocol

QUESTION 328

Blue box

ANSWER

Simulates a particular calling tone, enabling the theft of long distance service

QUESTION 329

Data diddling

ANSWER

Act of willfully modifying information, programs, or documentation in an effort to commit fraud or disrupt production

QUESTION 330

One Time Pad

ANSWER

A running key using a random key that is never used again

QUESTION 331

Permutation /Transposition

ANSWER

Moving letters around

QUESTION 332

Plain Text

ANSWER

Natural or human-readable form of message

QUESTION 333

Public Key Infrastructure (PKI)

ANSWER

A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate

QUESTION 334

Occupant emergency plan

ANSWER

Establish personnel safety and evacuation procedures

QUESTION 335

Running Key

ANSWER

An encryption method that has a key as long as the message

QUESTION 336

SMTP

ANSWER

Works as an email transfer agent at the application layer

QUESTION 337

Side Channel Attack

ANSWER

Inference about encrypted communications

QUESTION 338

Steganography

ANSWER

A method of hiding data within another media type, such as graphic, WAV file, or document

QUESTION 339

Cyberinsurance

ANSWER

Cover losses caused by Denial-of-Service, Malware damage, hackers, electronic theft, privacy-related lawsuits, and more

QUESTION 340

Symmetric

ANSWER

Encryption system using shared key/private key/single key/secret key

QUESTION 341

Watermarking

ANSWER

Intellectual property management technique for identifying after distribution

QUESTION 342

Work Factor

ANSWER

Effort/time needed to overcome a protective measure

QUESTION 343

Blackout

ANSWER

Prolonged, complete loss of electric power

QUESTION 344

Brownout

ANSWER

Reduction of voltage by the utility company for a prolonged period of time

QUESTION 345

Bumping

ANSWER

Hitting a filed down key in a lock with a hammer to open without real key

QUESTION 346

IPS

ANSWER

A system that's configured to automatically block suspected attacks in process without any intervention required by an operator

QUESTION 347

Fault

ANSWER

Momentary loss of power

QUESTION 348

Fire Detection

ANSWER

Alerts personnel to the presence of a fire

QUESTION 349

Restoration team

ANSWER

Responsible for getting the alternative site into a functioning environment

QUESTION 350

Fire Suppression

ANSWER

To reduce fire

QUESTION 351

Generator

ANSWER

Fault tolerance for power

QUESTION 352

Inrush Current

ANSWER

The initial surge of current required when there is an increase in power demand i.e starting a large motor

QUESTION 353

Asynchronous communication

ANSWER

Transfers data by sending bits of data in irregular timing patterns

QUESTION 354

14443-3

ANSWER

ISO/IEC standard for smart cards initialization and anticollision

QUESTION 355

Picking

ANSWER

Using small special tools all tumblers of the lock are aligned, opening the door

QUESTION 356

Hearsay

ANSWER

Second hand evidence and usually not admissible in court

QUESTION 357

Surge

ANSWER

Sudden rise in voltage in the power supply.

QUESTION 358

Off-site media storage

ANSWER

ensures that up-to-date data is available in the event that the primary data center is damaged or destroyed.

QUESTION 359

5

ANSWER

EAL Semiformally designed and tested

QUESTION 360

reciprocal site

ANSWER

your organization and another organization sign a reciprocal agreement in which you both pledge the availability of your organization's data center in the event of a disaster.

QUESTION 361

multiple data centers

ANSWER

larger organizations can consider the option of running daily operations out of two or more regional data centers that are hundreds (or more) of miles apart.

QUESTION 362

3

ANSWER

EAL Methodically tested and checked

QUESTION 363

Patent

ANSWER

Grants ownership and enables owner to legally enforce his rights to exclude others from using the invention.

QUESTION 364

MAC

ANSWER

The system applies controls based on the clearance of a user and the classification of an object or data - the owner provide the need to know

QUESTION 365

Parallel

ANSWER

A BCP test - Some systems are run at the alternate site

QUESTION 366

interruption (a.k.a. cutover)

ANSWER

this type of DRP test is similar to a parallel test except that in this test a function's computer systems are actually shut off or disconnected.

QUESTION 367

Desire service

ANSWER

Describe the destination for a TCP/UDP packet

QUESTION 368

Packet filtering firewall

ANSWER

Are not vulnerable to DOS attacks, should be place in the outermost boundary with an untrusted network

QUESTION 369

Parity Information

ANSWER

RAID 2 - Created using hamming code, detects errors and establishes location of the error on the drive

QUESTION 370

Object-Oriented Database

ANSWER

Reduces maintenance, ease of reusing code

QUESTION 371

Public Key Infrastructure

ANSWER

Framework of programs, procedures, communication protocols, and public key cryptography, enable secure communication among diverse individual

QUESTION 372

Offiline printing

ANSWER

Other unauthorized copies of reports could be printed

QUESTION 373

0-1023

ANSWER

Well Known ports

QUESTION 374

Black Boxes

ANSWER

Manipulates line voltage for toll free calls

QUESTION 375

Audit

ANSWER

Ensured system accountability

QUESTION 376

Identification

ANSWER

Recognition of an individual's assertion of identity, does not ensure accountability

QUESTION 377

RADIOUS

ANSWER

Central service, classified as AAA server, does not comparable with other similar server

QUESTION 378

Authentication - Biometric

ANSWER

one-to-one search to verify identity

QUESTION 379

CSMA/CD

ANSWER

LAN media access method

QUESTION 380

NFS

ANSWER

Use to share file between Unix computers

QUESTION 381

L2TP/PPTP

ANSWER

Tunneling protocols, operate at the Data Link Layer

QUESTION 382

Encapsulating Security Payload

ANSWER

Are limited due non-inclusion of IP header information

QUESTION 383

System development and maintenance

ANSWER

Can be perform by the same person in a well-controlled environment

QUESTION 384

Computing in Galois fields

ANSWER

Uses mathematical properties of modular arithmetic to make RSA more feasible for computer use

QUESTION 385

Rijndael

ANSWER

Maximum allow key size is 256

QUESTION 386

Vibration detection devices

ANSWER

Are vulnerable to non-adversary disturbances

QUESTION 387

Identity Management

ANSWER

Most be able to scale to support the volume of data

QUESTION 388

LAN attack

ANSWER

Attacker sends spoofed packet SYSN flag set to the victim's IP address

QUESTION 389

IPSec - Tunnel model

ANSWER

Required when the communication is gateway-to-gateway or host-to-host

QUESTION 390

What, how, where, when

ANSWER

Proper BACKUP procedure steps

QUESTION 391

1994 U.S Communication Assistance for Law enforcement Act

ANSWER

Requires all communications carriers to make wiretaps possible

QUESTION 392

Risk Analysis

ANSWER

(1) Identify assets and their values (2) Identify vulnerabilities and threats (3) Quantify the probability and business impact of these potential threats (4) Provide an economic balance between the impact of threat and the cost of the countermeasure

QUESTION 393

RAID 1

ANSWER

Mirroring, has the higher cost per megabyte

QUESTION 394

PPP

ANSWER

Supports multiple network types in the same serial link

QUESTION 395

Dynamic packet filtering

ANSWER

Create ACLs on the fly, allows dynamic ports higher 1023

QUESTION 396

SSL/TLS

ANSWER

Support server (mandatory) and client (optional) authentication

QUESTION 397

VDSL

ANSWER

Can delivery 52 Mbps downstream over a single cooper twisted wire

QUESTION 398

SDSL and HDSL

ANSWER

Deliver 1.544 of bandwidth each way

QUESTION 399

ADSL

ANSWER

Delivers a max of 9 Mpbs downstream

QUESTION 400

TCP

ANSWER

IP Header Field = 6

QUESTION 401

UPD

ANSWER

IP Header Field = 17

QUESTION 402

ICMP

ANSWER

IP Header Field = 1

QUESTION 403

IGMP

ANSWER

IP Header Field = 2

QUESTION 404

• Project initiation • Functional design analysis & planning • Security requirements developed • System design specifications • Software developments • Installation • Maintenance support • Revision and replacement

ANSWER

System Development Life Cycle phase

QUESTION 405

NIACAP

ANSWER

Establishes minimal levels national standards for certifying national security systems

QUESTION 406

Passwords management

ANSWER

Is a preventive control

QUESTION 407

Connection-Oriented protocols

ANSWER

Provide reliability at the Transport Layer

QUESTION 408

Authentication Header

ANSWER

Provides integrity, authentication, and (depend on the the algorithm) nonrepudation

QUESTION 409

Access Control

ANSWER

The process of allowing only authorized users, programs, or other computer systems, to observe, modify, or otherwise take possession of the resources of a computer system. It also limit authorized users to some resources.

QUESTION 410

Facilities

ANSWER

Access control protect entry to, and movement around, an organization's physical location to protect its assets

QUESTION 411

Which users can access a system What resources they can access What operations they can perform Enforce accountability for their actions

ANSWER

Four Key to access control Specify:

QUESTION 412

EICAR

ANSWER

Use to test response of antivirus software on a computer system, a detectable string is use

QUESTION 413

Asset management

ANSWER

Involved knowing and keeping all company's IT assets up to date

QUESTION 414

Kernel proxy

ANSWER

All inspection and processing takes place within it at the lower layer

QUESTION 415

Frame relay

ANSWER

Allows multiple companies and networks to share WAN media

QUESTION 416

Data Terminal Equipment

ANSWER

The equipment use at the company-end in a frame relay environment

QUESTION 417

Data Circuit-Terminating Equipment

ANSWER

The equipment use by the service provider in a frame relay environment

QUESTION 418

Disaster, Interim operations, Alternate operations, Normal operations

ANSWER

Represents the correct sequence of tasks in a event of a disaster

QUESTION 419

Authentic, accurate, complete, convincing, admissible

ANSWER

5 Rules of evidence

QUESTION 420

Smoke-Activated detectors

ANSWER

Early-warning device to start in evacuation, use photo-electric, detect variations in light intensity

QUESTION 421

The Federal Privacy act

ANSWER

Protects US citizen's sensitive information collected by government agencies

QUESTION 422

Port Address Translation

ANSWER

Minimize the number of public IP addresses that organization purchases

QUESTION 423

Grid computing

ANSWER

Massive computational power is available but is not suitable for processing sensitive data

QUESTION 424

ISO/IEC 27001

ANSWER

Specifies requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented information security management system

QUESTION 425

ISO 9001

ANSWER

ISO standard related to Quality management

QUESTION 426

ISO 14001

ANSWER

ISO standard related to Environmental management

QUESTION 427

ISO 31000

ANSWER

ISO Standard related to Risk Management

QUESTION 428

NIST-800-34

ANSWER

The Business Continuity plan guidelines are defined

QUESTION 429

Monolithic

ANSWER

Operating systems functionality takes place in ring zero in privileged or supervisory mode

QUESTION 430

Checksums

ANSWER

Simple method used in symmetric key cryptography to ensured data integrity

QUESTION 431

Polyinstantiation

ANSWER

To protect sensitive data such as top secret, users lower-level users received fake view of the data

QUESTION 432

Electromagnetic Interference

ANSWER

Caused by electronic Motors, lightning, etc

QUESTION 433

Radio Frequency Interference

ANSWER

Caused by Components of Electrical System, Cables, Fluorescent Lighting, Truck Ignitions. Can cause permanent damage to sensitive system components

QUESTION 434

Magnetic Media

ANSWER

Affected from 100 degrees Fahrenheit

QUESTION 435

Disks

ANSWER

Damaged at 150 degrees Fahrenheit

QUESTION 436

Computer equipment

ANSWER

Damaged at 175 degrees Fahrenheit

QUESTION 437

Paper products

ANSWER

Damaged at 350 degrees Fahrenheit

QUESTION 438

EMI- Common Mode Noise

ANSWER

Noise from Radiation Generated by the difference between Hot and Ground wires

QUESTION 439

EMI- Traverse Mode Noise

ANSWER

Noise from Radiation Generated by the difference between Hot and Neutral wires

QUESTION 440

Project Initiation

ANSWER

Involves getting management support, developing the scope of the plan, and securing funding and resources

QUESTION 441

Transients

ANSWER

Line noise that is superimposed on the supply Circuit can cause fluctuation in power

QUESTION 442

Electrostatic Discharge

ANSWER

Power surge generated by a person or device contacting another device and transferring high voltage shock. Affected by low humidity

QUESTION 443

Greater than 60

ANSWER

Causes problems with condensation on computer equipment, corrosion of electrical connections

QUESTION 444

Less than 40

ANSWER

Causes Increase in Electrostatic Discharge, up 4000 Volts under normal humidity and up to 25000 volts under very low humidity

QUESTION 445

Hygrometer

ANSWER

Measure humidity levels

QUESTION 446

40 Volts

ANSWER

Static charge damage Sensitive Circuits and Transistors

QUESTION 447

1000 Volts

ANSWER

Static charge damage Scramble Monitor Display

QUESTION 448

1500 Volts

ANSWER

Static charge damage Disk Drive, causing data loss

QUESTION 449

2000 Volts

ANSWER

Static charge damage System Shutdown

QUESTION 450

4000 Volts

ANSWER

Static charge damage Printer Jam

QUESTION 451

17000 Volts

ANSWER

Static charge damage Permanent Chip

QUESTION 452

Class A Fire

ANSWER

Common Combustibles such as paper, wood, furniture, clothing - Water, Foam

QUESTION 453

Class B Fire

ANSWER

Burnable fuels such as gasoline, oil, or alcohol - Inert Gas, CO2

QUESTION 454

Class C Fire

ANSWER

Electrical fires such as computers and electronics - Inert Gas, CO2 - Turn off electricity first

QUESTION 455

Class D Fire

ANSWER

Special Fires, such as chemical, metal - Dry powder

QUESTION 456

Class K Fire

ANSWER

Commercial Kitchens - Wet Chemicals

QUESTION 457

Wet Pipe

ANSWER

Always contains water - most popular and reliable, 165 Fuse Melts - can freeze in winter - pipe breaks can cause floods

QUESTION 458

Dry Pipe

ANSWER

No water in Pipe - preferred for computer installations, use a clapper to hold the water, air blows out of pipe

QUESTION 459

Deluge

ANSWER

Water Discharge is large, not recommended for computer installations

QUESTION 460

Preaction

ANSWER

Most recommended for computer room, combines both dry and wet pipes, water released into pipe first then after fuse melts in nozzle the water is dispersed

QUESTION 461

Confidentiality

ANSWER

Efforts to prevent unauthorized discloser of information to those who do not the need, or right to see it

QUESTION 462

Pretty Good Privacy

ANSWER

First widespread public key encryption program, provide C by using IDEA and with MD5

QUESTION 463

MOM

ANSWER

Motive, opportunity, and means

QUESTION 464

Administrative Control

ANSWER

These include the developing and publishing of policies, standards, procedures, guidelines, risk management, and security awareness training

QUESTION 465

Technical Control

ANSWER

These consist in implementing and maintaining access control mechanisms, password and resource management, identification and authentication methods, configuration of the infrastructure

QUESTION 466

Physical Control

ANSWER

These entail controlling access to a facility, and protecting its perimeter

QUESTION 467

Due Care

ANSWER

Term and concept used to help determine liability in a court of law, ensure someone is acting responsible

QUESTION 468

CobiT

ANSWER

A framework developed by the Information Systems Audit and Control Association and the IT Governance Institute. Defines the goals for the controls that should be used to properly manage IT and ensure IT maps to business needs. Four domains: Plan and Organize, Acquire and Implement, Deliver and Support, and Monitor and Evaluate

QUESTION 469

Class A

ANSWER

Has 16,777,216 host

QUESTION 470

Threat

ANSWER

The possibility that someone or something would exploit a vulnerability, intentionally, or accidentally

QUESTION 471

Risk

ANSWER

The probability of a threat agent exploiting a vulnerability and the loss potential

QUESTION 472

Strategic

ANSWER

Planning for longer term - 5 years or more

QUESTION 473

Tactical

ANSWER

Midterm planning - less than 5 years

QUESTION 474

Bastion host

ANSWER

A strongly protected computer that is in a network protected by a firewall (or is part of a firewall) and is the only host (or one of only a few hosts) in the network that can be directly accessed from networks on the other side of the firewall

QUESTION 475

Assurance

ANSWER

Degree of confidence that certain security level provided

QUESTION 476

Governance

ANSWER

Set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensured objectives are achieved and risks are properly managed.

QUESTION 477

OECD

ANSWER

An International organization that helps different governments to collaborate in order to tackled economic, social and governance challenges of the globalized economy

QUESTION 478

Total Risk

ANSWER

Threats x vulnerability x asset value =

QUESTION 479

Residual Risk

ANSWER

(Threats x vulnerability x asset value) x control gap =

QUESTION 480

Risk management

ANSWER

The process of identifying, assessing, and reducing risk to an acceptable level and implementing various mechanisms to maintain that level of risks

QUESTION 481

Need to Know

ANSWER

Defines the minimum level of access for subjects based on their job or business requirements

QUESTION 482

Cipher-Only

ANSWER

The attacker has the ciphertext of several message, each message encrypted using the same algorithm. His goal is to discover the key used in the encryption process

QUESTION 483

Known-Plaintext

ANSWER

The attacker has the plaintext and ciphertext of one more messages. His goal is to discover the key used in the encryption process

QUESTION 484

Chosen-Plaintext

ANSWER

The attacker has the plaintext and ciphertext, but can choose the plaintext that gets encrypted to see the corresponding ciphertext

QUESTION 485

Chosen-Ciphertext

ANSWER

The attacker can choose the ciphertext to be decrypted and has access to the resulting decrypted plaintext. Hard to accomplished, the attacker may need to have control of the system

QUESTION 486

Differential cryptanalysis

ANSWER

The attacker takes two messages of plaintext and follows the changes that take place to the blocks as they go through the different S-boxes, each message is encrypted with same key

QUESTION 487

Linear Cryptanalysis

ANSWER

Attacker carries out a known-plaintext attack on several different messages encrypted with the same key, identifying specific output combination allows him to assign probability values to different keys, resulting on key display a pattern

QUESTION 488

Side-Channel Attack

ANSWER

Gathering outside information by watching how it behaves with the goal of uncovering the encryption key

QUESTION 489

Cryptography

ANSWER

The science of protecting information by encoding it into an unreadable format

QUESTION 490

Enigma

ANSWER

The most famous rotor machine used by the Germans in Word War II

QUESTION 491

Algorithms

ANSWER

The mathematical rules that dictate the functions of enciphering and deciphering

QUESTION 492

Polyalphabetic

ANSWER

Uses more than one alphabet to defeat frequency analysis

QUESTION 493

Symmetric Key

ANSWER

Provide confidentially, but does not provide authentication or nonrepudiation

QUESTION 494

Symmetric algorithms

ANSWER

DES, 3DES, Blowfish, IDEA, RC4-RC6, and AES are

QUESTION 495

Asymmetric Key

ANSWER

Provide authentication or nonrepudiation, but is slower than its counterpart

QUESTION 496

Asymmetric algorithms

ANSWER

RSA, ECC, Diffie-Hellman, El Gamal, Knapsack, and DSA

QUESTION 497

Stream cipher

ANSWER

Use a keystream generator and encrypt a message one bit at a time, usually implemented in hardware

QUESTION 498

Block cipher

ANSWER

Divides the message into groups of bits and encrypts them, usually implemented in software

QUESTION 499

DES

ANSWER

A block cipher that divides a message into 64-bit blocks and employs S-box-type functions on them

QUESTION 500

3DES

ANSWER

Uses 48 rounds of computation and up to three different keys

QUESTION 501

IDEA

ANSWER

A symmetric block cipher with a key of 128 bits

QUESTION 502

RSA

ANSWER

Based one a one-way function that factors large numbers into prime numbers, only the private key knows the trapdoor to decrypt the message

QUESTION 503

ECC

ANSWER

Asymmetric algorithm, provide digital signature, secure key distribution, and encryption. Use much less resources, more suitable for wireless device and cell phone encryption

QUESTION 504

Certificate authority

ANSWER

Trusted third party that generates and maintains user certificates, which hold their public key

QUESTION 505

Certification revocation list

ANSWER

Keep track of revoked certificates

QUESTION 506

Certificate

ANSWER

A mechanism use to associate a public key to person's identity

QUESTION 507

Registration authority

ANSWER

Validates the user's identity and then sends a request to another entity to fulfill user's request

QUESTION 508

Hashing

ANSWER

These algorithms provide data integrity only

QUESTION 509

Message digest - Digital Signature

ANSWER

When a hash algorithm is applied to a message, it produces _________ and this value is signed with a private key to produce ___________

QUESTION 510

HAVAL

ANSWER

Produces a variable-length hash value

QUESTION 511

Birthday

ANSWER

The attacker tries to create two messages with the same hashing value, brute force

QUESTION 512

SHA-1

ANSWER

Produces a 160-bit hash value and is used in DSS

QUESTION 513

One-time pad

ANSWER

Random values XOred againts the message to produce ciphertext

QUESTION 514

RSA, El Gamal, ECDSA, and DSA

ANSWER

Algorithm use for digital signature

QUESTION 515

Key management

ANSWER

Most challenging task in cryptography, pertains to creating, maintaining, distributing, and destroying it

QUESTION 516

Diffie-Hellman

ANSWER

A key agreement protocol, does not provide any security services nor digital signature

QUESTION 517

Criminal Law

ANSWER

Individual's conduct violate certain criteria developed to protect the public

QUESTION 518

Privacy-Enhance Mail

ANSWER

An Internet standard that provides secure e-email over the Internet by using encryption, digital signatures, and key management

QUESTION 519

Message Security Protocol

ANSWER

The military version of Privacy-Enhance Mail

QUESTION 520

S-HTTP

ANSWER

Provides protection for message sent between two computers, but not the actual link

QUESTION 521

49152-65535

ANSWER

Dynamic and/or private ports

QUESTION 522

Secure Electronic Transaction

ANSWER

Proposed electronic commerce technology that provides a safer method for customer and merchant to perform transactions over the a public domain

QUESTION 523

Transport mode

ANSWER

The data payload is protected - IPSec

QUESTION 524

Tunnel mode

ANSWER

The payload and headers are protected - IPSec

QUESTION 525

X509

ANSWER

Standard dictates different type of fields used within a certificate and the value within those fields

QUESTION 526

Electronic Code Book

ANSWER

Each block is encrypted independently, allowing randomly accessed files to be encrypted and still accessed without having to process the file in a linear encryption, for each block of plaintext the same block of ciphertext is produced - very short message 64 bits in length

QUESTION 527

Cipher Block Chaining

ANSWER

The result of encrypting one data is fed back into the process to encrypt the next block of data - Authentication

QUESTION 528

Cipher Feedback

ANSWER

Each bit produced in the keystream is the result of a predetermined number of fixed ciphertext bits - Authentication

QUESTION 529

Output Feedback

ANSWER

In The keystream is generated independently of the message - Authentication

QUESTION 530

Counter (CTR)

ANSWER

A 64 bit random data block is used as the first initialization - Used in high speed apps such as IPSec and ATM

QUESTION 531

Link Encryption

ANSWER

Encrypts all the data along a specific communication path i.e satellite, T3 line or telephone circuit. Data is decrypt and encrypt at each point - Layer 1 & 2

QUESTION 532

End-to-end Encryption

ANSWER

The headers, addresses, routing, and trailer are not encrypted, provided at the end-user computer as result more flexible - Layer 7

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials