SRA221-FinalExam

Card Set Information

Author:
guntoro
ID:
272894
Filename:
SRA221-FinalExam
Updated:
2014-05-04 19:58:50
Tags:
SRA221 FinalExam
Folders:

Description:
SRA221-FinalExam
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user guntoro on FreezingBlue Flashcards. What would you like to do?


  1. Each policy should contain procedures and a timetable for periodic review. (T/F)
    T
  2. ACLs are more specific to the operation of a system than rule-based policies and they may or may not deal with users directly. (T/F)
    F
  3. Failure to develop an information security system based on the organization's mission, vision, and culture guarantees the failure of the information security program. (T/F)
    T
  4. Information security safeguards provide two levels of control: managerial and remedial. (T/F)
    F - Managerial, Operational and Technical
  5. A cold site provides many of the same services and options of a hot site. (T/F)
    F - Warm site
  6. Packet filtering firewalls scan network data packets looking for compliance with or violation of the rules of the firewall's database. (T/F)
    T
  7. Good policy and practice dictates that each firewall device, whether a filtering router, bastion host, or other firewall implementation, must have its own set of configuration rules. (T/F)
    T
  8. Firewall Rule Set 1 states that responses to internal requests are not allowed. (T/F)
    F
  9. A content filter is technically a firewall. (T/F)
    F
  10. A VPN allows a user to turn the Internet into a private network. (T/F)
    T
  11. A false positive is the failure of an IDPS system to react to an actual attack event. (T/F)
    F - False Negative
  12. IDPS responses can be classified as active or passive. (T/F)
    T
  13. A passive response is a definitive action automatically initiated when certain types of alerts are triggered. (T/F)
    F - Active response
  14. Your organization's operational goals, constraints, and culture should not affect the selection of the IDPS and other security tools and technologies to protect your systems. (T/F)
    F - will be effected
  15. A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers. (T/F)
    T
  16. Services using the TCP/IP protocol can run only on port 80. (T/F)
    F - port 1-1023
  17. Julius Caesar was associated with an early version of the transposition cipher. (T/F)
    T
  18. Hashing functions require the use of keys. (T/F)
    F - Message digest
  19. The asymmetric encryption systems use a single key to both encrypt and decrypt a message. (T/F)
    F - Symmetric
  20. Nonrepudiation means that customers or partners can be held accountable for transactions, such as online purchases, which they cannot later deny. (T/F)
    T
  21. A security __________ is an outline of the overall information security strategy for the organization and roadmap for planned changes to the information security environment of the organization.
    A. plan 
    B. mission
    C. blanket
    D. framework
    D. Framework
    (this multiple choice question has been scrambled)
  22. Effective management includes planning and_________.
    a. organizing
    b. leading
    c. controlling
    d. All of the above
    d. All of the above
  23. Redundancy can be implemented at a number of points throughout the security architecture, such as in________.
    a. firewalls
    b. proxy servers
    c. access controls
    d. All of the above
    d. All of the above
  24. A buffer against outside attacks is frequently referred to as a(n)_______
    A. firewall
    B. DMZ
    C. proxy server
    D. no-man's land
    B. DMZ
    (this multiple choice question has been scrambled)
  25. An alert ________is a document containing contact information for the people to be notified in the event of an incident.
    A. list
    B. message
    C. roster
    D. plan
    C. roster
    (this multiple choice question has been scrambled)
  26. Firewalls fall into_________major processing-mode categories.
    A. two
    B. three
    C. five
    D. four
    C. five
    (this multiple choice question has been scrambled)
  27. A___________filtering firewall can react to an emergent event and update or create rules to deal with the event.
    A. static
    B. statefiil
    C. stateless
    D. dynamic
    D. dynamic
    (this multiple choice question has been scrambled)
  28. Telnet protocol packets usually to TCP port___________.
    A. 8
    B. 23
    C. 14
    D. 7
    B. 23
    (this multiple choice question has been scrambled)
  29. A(n)____________works like a burglar alarm in that it delects a violation (some system activities analogous to an opened or broken window) and activates an alarm.
    A. SIS
    B. IIS
    C. IDS
    D. ITS
    C. IDS
    (this multiple choice question has been scrambled)
  30. ____________is an event that triggers an alarm when no actual attack is in progress.
    A. False attack stimulus
    B. False positive
    C. False negative
    D. none
    A. False attack stimulus
    (this multiple choice question has been scrambled)
  31. To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known ____________in their knowledge base.
    A. fingernails
    B. signatures
    C. footprints
    D. fingerprints
    B. signatures
    (this multiple choice question has been scrambled)
  32. __________are decoy systems designed to lure potential attackers away from critical systems.
    A. honeycells
    B. padded nets
    C. honeypots
    D. padded cells
    C. honeypots
    (this multiple choice question has been scrambled)
  33. In TCP/IP networking, port_____________is not used.
    A. 13
    B. 1
    C. 0
    d 1023
    C. 0
    (this multiple choice question has been scrambled)
  34. A(n)_____________is a network tool that collects copies of packets from the network and analyzes them.
    A. Packet scanner
    B. honey pot
    C. packet sniffer
    D. honey packet
    C. packet sniffer
    (this multiple choice question has been scrambled)
  35. _______________is the process of converting an original message into a form that is unreadable to unauthorized individuals.
    A. cryptography
    B. crypto logy
    C. encryption
    D. decryption
    C. encryption
    (this multiple choice question has been scrambled)
  36. ______________functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.
    A. Encryption
    B. Map
    C. Key
    D. Hash
    D. Hash
    (this multiple choice question has been scrambled)
  37. The __________algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use.
    A. AES
    B. RSA
    C. MAC
    D. DES
    B. RSA
    (this multiple choice question has been scrambled)
  38. __________________are encrypted messages that can be mathematically proven to be authentic.
    A. Message certificates
    B. Message Digests
    C. digital signatures
    D. MAC
    C. digital signatures
    (this multiple choice question has been scrambled)
  39. __________________specific security policies often function as standards or procedures to be used when configuring or maintaining systems.
    Systems
  40. Implementing multiple types of technology and thereby precluding that the failure of one system will compromise the security of information is referred to as __________________
    Redundancy
  41. A packet-___________________ firewall installed on a TCP/IP based network typically functions at the IP level and determines whether to drop a packet (deny) or forward it to the next network connection (allow) based on the rules programmed into the firewall.
    Filtering
  42. ____________________ firewalls combine the elements of other types of firewalls — that is, the elements of packet filtering and proxy services, or of packet filtering and circuit gateways.
    Hybrid
  43. The firewall device is never accessible directly from the ____________________ network.
    Public
  44. The ongoing activity from alarm events that are accurate and noteworthy but not necessarily significant as potentially successful attacks is called ____________________
    Noise
  45. The initial estimation of the defensive state of an organization's networks and systems is called doorknob ____________________
    rattling
  46. _____________________is the process of attracting attention to a system by placing tantalizing bits of information in key locations.
    Enticement
  47. To secure data in transit across any network, organizations must use ______________________to be assured of content privacy.
    Encryption
  48. A(n)_______________________is a small enclosure that has separate entry and exit points.
    Man Trap
  49. The temperature of ignition is called the of _______________________ a material.
    flame point
  50. The ________________________ detector is a sensor that detects the infrared or ultraviolet light produced by an open flame.
    flame

What would you like to do?

Home > Flashcards > Print Preview