CIS 2337 Final

0.0(0)
studied byStudied by 16 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/116

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

117 Terms

1
New cards
Which term refers to a unique alphanumeric identifier for a user of a computer system?
Username
2
New cards
Which access control type allows a company to restrict employee logon hours?
Rule-based access control
3
New cards
When referring to the three steps in the establishment of proper privileges, what does AAA stand for?
authentication, authorization, and accounting.
4
New cards
What is a method of establishing the authenticity of specific objects, such as an individual's public key or downloaded software?
Certificates
5
New cards
Permissions can be applied to specific users or groups to control that user's or group's ability to view, modify, access, use, or delete resources such as folders and files.
TRUE
6
New cards
SSID (service set identifier )is:
Name of the wireless network Setting should limit access only to authorized users
7
New cards
WEP stands for Wired Equivalent Privacy -
Uses an RC4 stream cipher to encrypt the data as it is transmitted through the air
8
New cards
What is Point-to-point (P2P) connection?
Uses an RC4 stream cipher to encrypt the data as it is transmitted through the air
9
New cards
WiFi series refers to:
referring to the 802.11 Wireless LAN standards certified by the Wi-Fi Alliance
10
New cards
WiFi uses which frequency spectrum?
systems exist on 2.4GHz and 5GHz frequency spectrums
11
New cards
What does a host-based IDS monitor?
A single system; intrusion detection system that monitors the computer infrastructure on which it is installed, analyzing traffic and logging malicious behavior
12
New cards
Which component of an HIDS pulls in the information that the other components, such as the analysis engine, need to examine?
traffic collector
13
New cards
Which component of an HIDS must decide what activity is "okay" and what activity is "bad"?
analysis engine
14
New cards
What is an advantage of a network-based IDS?
It takes fewer systems to provide IDS coverage. Development, maintenance, and upgrade costs are usually lower. Visibility into all network traffic and can correlate attacks among multiple systems.
15
New cards
What is an advantage of a host-based IDS?
HIDS can detect attacks that cannot be seen by a Network-Based IDS since they monitor events local to a host
16
New cards
Service pack is the term for a small software update designed to address a specific problem, such as a buffer overflow in an application that exposes the system to attacks.
FALSE
17
New cards
BIOS stands for:
basic input/output system
18
New cards
What is operating system?
is a program that manages a computer's hardware as well as providing an environment for applications programs to run on.
19
New cards
TPM is: -
A system of maintenance covering the entire life of the equipment and the total human resource
20
New cards
Which protection ring has the highest privilege level and acts directly with the physical hardware? -
Ring 0
21
New cards
Rainbow tables include precomputed tables or hash values associated with passwords -
TRUE
22
New cards
What is malware? -
refers to software that has been designed for some nefarious purposes
23
New cards
Shimming attack is the process of putting a layer of code between the driver and the OS -
TRUE
24
New cards
SYN flooding is an example of a __________. -
Denial of service attack
25
New cards
A computer system is attacked for one of two general reasons: it is specifically targeted by the attacker or it is a target of opportunity. -
TRUE
26
New cards
Both ipconfig and if config are command-line tools to manipulate the network interfaces on a system.
TRUE
27
New cards
During penetration testing, zero-day vulnerabilities will be established. -
FALSE
28
New cards
If you test something and it comes back negative, but it was in fact positive, then the result is a false positive. -
FALSE
29
New cards
Tail is a utility designed to return the first lines of a file. -
FALSE
30
New cards
The _______________ is a list of known vulnerabilities in software systems. -
Common Vulnerabilities and Exposures (CVE) enumeration
31
New cards
The _______________ is a set of tools that can be used to target attacks at the people using systems; it has applets that can be used to create phishing e-mails, Java attack code, and other social engineering-type attacks. -
Social-Engineering Toolkit
32
New cards
The movement to an account that enables root or higher-level privilege is known as: -
escalation of privilege
33
New cards
Which term is used to define vulnerabilities that are newly discovered and not yet addressed by a patch?
**zero day**
34
New cards
Which testing technique is performed by testers who have detailed knowledge of the application and can thus test the internal structures within an application for bugs, vulnerabilities, and so on? -
white box testing
35
New cards
Which testing technique requires that the testers have no knowledge of the internal workings of the software being tested? -
black box testing
36
New cards
A(n) _______________ is a low-level program that allows multiple operating systems to run concurrently on a single host computer.
hypervisor
37
New cards
Which cloud computing service model involves the offering of software to end users from within the cloud? -
Software as a service (SaaS)
38
New cards
Which cloud system is defined as one where several organizations with a common interest share a cloud environment for the specific purposes of the shared endeavor? -
A public cloud system
39
New cards
Which type of computing brings processing closer to the edge of the network, which optimizes web applications and IoT devices? -
edge computing
40
New cards
Lease privilege refers to removing all controls from a system. -
FALSE
41
New cards
Cryptography is the universal solution to all security problems. -
FALSE
42
New cards
All input validation that is essential for business reasons or for security should be performed on the _______ of the client-server relationship, where it is free from outside influence and change. -
Server Side
43
New cards
Which process involves implementing security tools and policies to ensure your container is running as intended? -
Container Security
44
New cards
Which term refers to characteristics of resources that can be exploited by a threat to cause harm? -
Vulnerabilities
45
New cards
Which type of attack can be used to execute arbitrary commands in a database? -
SQL Injection
46
New cards
A qualitative risk assessment relies on judgment and experience. -
TRUE
47
New cards
Which action is an example of transferring risk? -
Management purchases insurance for the occurrence of an attack.
48
New cards
The presence of risks in a system is an absolute—they cannot be removed or eliminated. -
TRUE
49
New cards
Which term refers to ensuring proper procedures are followed when modifying the IT infrastructure? -
change management
50
New cards
Which term refers to the possibility of suffering harm or loss? -
risk
51
New cards
Which term refers to ensuring proper procedures are followed when modifying the IT infrastructure? -
change management
52
New cards
The goal of the delta backup is to back up as little information as possible each time you perform a backup. -
TRUE
53
New cards
Which backup technique requires a large amount of space and is considered to have a simple restoration process? -
full
54
New cards
Which term is used to describe the target time that is set for resuming operations after an incident? -
recovery time object
55
New cards
Backups can prevent a security event from occurring. -
FALSE
56
New cards
Which document outlines what the loss of any critical functions will mean to the organization? -
business impact analysis
57
New cards
Which term is used to describe the target time that is set for resuming operations after an incident? -
recovery time objective (RTO)
58
New cards
From a forensics perspective, Linux systems have the same artifacts as Windows systems. -
FALSE
59
New cards
A physical hard disk drive will persist data longer than a cache. -
TRUE
60
New cards
Tangible objects that prove or disprove facts are what type of evidence? -
Physical evidence
61
New cards
Business records, printouts, and manuals are which type of evidence? -
Documentary Evidence
62
New cards
Evidence that is convincing or measures up without question is known as __________. -
Sufficient Evidence
63
New cards
Which rule applies to evidence obtained in violation of the Fourth Amendment of the Constitution? -
the Exclusionary Rule
64
New cards
Evidence that is both legally qualified and reliable is known as __________.
Admissible evidence
65
New cards
Clusters on a hard disk that are marked by the operating system as usable when needed are referred to as __________. -
free space
66
New cards
From a forensics perspective, Linux systems have the same artifacts as Windows systems. -
FALSE
67
New cards
NIDSs are typically deployed so that they can monitor traffic in and out of an organization's major links. -
TRUE
68
New cards
SYN flooding is an example of a __________. -
Denial-of-service
69
New cards
The _______________ is a list of known vulnerabilities in software systems. -
Common Vulnerability Database
70
New cards
TCP is a connectionless protocol. -
TRUE
71
New cards
If the root CA's private key were compromised, what would happen? -
Subordinate CAs and end users would be affected.
72
New cards
What is a method of establishing the authenticity of specific objects, such as an individual's public key or downloaded software? -
Certificates
73
New cards
Which statement describes the main difference between TCP and UDP? -
TCP packets are connection oriented, whereas UPD packets are connectionless.
74
New cards
Backups can prevent a security event from occurring. -
FALSE
75
New cards
Access Point (AP)
Point of entry for radio-based network signals into and out of a network
76
New cards
Fat access point
standalone access points
77
New cards
Thin access point
controller-based access points
78
New cards
Controller based
allow for centralized management and control
79
New cards
Standalone points
have substantial capabilities with respect to authentication, encryption, and channel management
80
New cards
The lower power used, the less opportunity for interference
TRUE
81
New cards
Replay attack
the attacker captures a portion of a communication between two parties and retransmits it at a later time
82
New cards
Evil Twin
Attack against the wireless protocol via substitute hardware
83
New cards
Network-based IDS (NIDS)
Examines activity on the network itself

It has visibility only into the traffic crossing the network link it is monitoring and typically has no idea of what is happening on individual systems
84
New cards
Host-based IDS (HIDS)
Examines activity on an individual system

Concerned with an individual system
85
New cards
Signature database
collection of patterns and definitions of known suspicious or malicious activity
86
New cards
User interface and reporting
interfaces with the human element and provides alerts when appropriate
87
New cards
Advantages of NIDS
Providing IDS coverage requires fewer systems

Deployment, maintenance, and upgrade costs are usually lower

A NIDS has visibility into all network traffic and can correlate attacks among multiple systems
88
New cards
Disadvantages of a NIDS
Ineffective when traffic is encrypted

Can’t see traffic that does not cross it

Must be able to handle high volumes of traffic

Does not know about activity on the hosts themselves
89
New cards
Advantages of HIDSs
Very operating system–specific with more detailed signatures

Reduce false-positive rates

Examine data after it has been decrypted

Very application specific

Determine whether or not an alarm may impact that specific system
90
New cards
Disadvantages of HIDSs
Must have a process on every system you want to watch

High cost of ownership and maintenance

Use local system resources

Have a very focused view and cannot relate to activity around them

If logging only locally, could be compromised or disabled
91
New cards
Hardening
The process of securing and preparing a system for the production environment
92
New cards
Trusted operating system
Designed to allow multilevel security in its operation
93
New cards
Sniffing
Someone examines all the network traffic that passes their NIC, whether addressed for them or not
94
New cards
Spraying
Attack uses a limited number of commonly used passwords and applies them to a large number of accounts
95
New cards
Dictionary attack
A password-cracking program that uses a list of dictionary words to try to guess the password is used
96
New cards
Brute force attack
A password-cracking program attempts all possible character combinations
97
New cards
OpenSSL
General-purpose cryptography library that offers a wide range of cryptographic functions on Windows and Linux systems
98
New cards
Gray box testing
testers typically having some knowledge of the software, network, or systems they are testing
99
New cards
Weak configurations
System may not achieve all of the desired performance or security objectives
100
New cards
Infrastructure as a Service (IaaS)
systems that are delivered as a virtual solution for computing