Part 2 pretest

Card Set Information

Author:
slmckissack
ID:
295708
Filename:
Part 2 pretest
Updated:
2015-02-13 15:03:36
Tags:
Part pretest
Folders:
Part 2 pretest
Description:
Part 2 pretest
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user slmckissack on FreezingBlue Flashcards. What would you like to do?


  1. What is the access control step that verifies that a user is who he or she claims to be?
    A. Qualification
    B. Authentication
    C. Authorization
    D. Identification
    B. Authentication
    (this multiple choice question has been scrambled)
  2. What is the security model that determines whether a user can enter a space and obtain secured objects?
    A. Authorization
    B. Biometrics
    C. Access Control
    D. Authentication
    C. Access Control
    (this multiple choice question has been scrambled)
  3. A user should be aware of which parts of an organization's security policies?
    A. Only the user account and password policies
    B. Only physical security policies
    C. The security policies applicable to the user and the effects of security breaches.
    D. Only the security policies that deal with computers
    C. The security policies applicable to the user and the effects of security breaches.
    (this multiple choice question has been scrambled)
  4. What is created by a flaw in an application that could be exploited by an external attacker?
    A. Loss
    B. Risk
    C. Threat
    D. Vulnerability
    D. Vulnerability
    (this multiple choice question has been scrambled)
  5. What form of security testing attempts to exploit known or identified vulnerabilities?
    A. Vulnerability testing
    B. Penetration testing
    C. Functional testing
    D. Gray box testing
    B. Penetration testing
    (this multiple choice question has been scrambled)
  6. To ensure that data at rest, data in motion, and data in use retain their integrity without unauthorized modification, removal, or corruption, what system should be in place as part of a data security policy?
    A. Full disk encryption
    B. Data retention
    C. Data loss prevention
    D. Public key infrastructure
    C. Data loss prevention
    (this multiple choice question has been scrambled)
  7. An It technician identifies and removes unnecessary services and a few obsolete user accounts running on a desktop computer. Which of the following is the technician most likely performing.
    A. Server hardening
    B. Threat modeling
    C. Application software hardening
    D. Host hardening
    D. Host hardening
    (this multiple choice question has been scrambled)
  8. Which type of authentication system uses a one-time password generated by a mobile device?
    A. Device-generated OTP
    B. OOB authentication
    C. SMS OTP
    D. Mobile system management
    A. Device-generated OTP
    (this multiple choice question has been scrambled)
  9. What term refers to the delivery of applications as a service in which resources, software, and data are available to the application and a host via the internet?
    A. Cloud bursting
    B. Cloud computing
    C. Hardware emulation
    D. External-host private cloud
    B. Cloud computing
    (this multiple choice question has been scrambled)
  10. What type of encryption uses only a single encryption key to both encrypt and decrypt data?
    A. Asynchronous stream encryption
    B. Asymmetric encryption
    C. Symmetric encryption
    D. Hash algorithm
    C. Symmetric encryption
    (this multiple choice question has been scrambled)
  11. On which of the following encryption concepts is PKI based?
    A. Elliptic curve encryption
    B. Asymmetric encryption
    C. Symmetric encryption
    D. Quantum key encryption
    C. Symmetric encryption
    (this multiple choice question has been scrambled)
  12. What is the a DoS attack that send a flood of synchronization (SYN) request and never sends the final acknowledgment (ACK)?
    A. Back door attack
    B. SYN Flood
    C. Smurf attack
    D. Ping Flood
    B. SYN flood
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview