Assignments Part 2

Card Set Information

Author:
slmckissack
ID:
296118
Filename:
Assignments Part 2
Updated:
2015-02-20 15:43:06
Tags:
Assignments Part
Folders:
Assignments Part 2
Description:
Assignments Part 2
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user slmckissack on FreezingBlue Flashcards. What would you like to do?


  1. A user attempting to log off a computer does so under this type of user privilege?
    Automatic Privilege
  2. A user who has absolute power on a system is typically this type of user?
    Privileged user
  3. This type of user can operate a computer and open, create, and save documents, but cannot manipulate system settings?
    Restricted User
  4. A group account limited to a single computer
    Local group
  5. A group account that may include remote user accounts?
    Global group
  6. Privileges assigned to a specific individual?
    User-assigned privileges
  7. A password that meets or exceeds the password policy requirements?
    Strong password
  8. A method for cracking a password by generating every possible combination of characters and comparing it to stored passwords?
    Brute force guessing
  9. An account policy that calls for disabling a user's account when a incorrect password is used a specific number of times.
    Account lockout
  10. A process that automatically presents credentials to the authentication and authorization authority of multiple applications?
    Single Sing on
  11. Is the real chance that a security weakness will be exploited?
    Likelihood
  12. _______________ mode and effects analysis is one method of risk analysis.
    Failure
  13. _______________ =SLE x ARO
    ALE

    Annualized Loss Expectancy
  14. __________ Identification predicts the chance that an object could be damaged.
    Risk
  15. A ______________ risk assessment is the first step of a risk analysis process.
    Baseline
  16. Security ______________ is the structure of principles and policies that guides development.
    Architecture
  17. Items of value are ______________?
    Assets
  18. A ________________________ is a weakness in a network's security.
    Vulnerability
  19. ______ = AV x EF
    SLE

    Single Loss Expectance
  20. An ____________ scan looks at a system or network with an external view.
    Assessment
  21. A testing procedure that focuses on only the outputs of a system?
    Black box testing
  22. Details the actions to be taken in the event of a catastrophic event?
    Disaster Recovery Plan
  23. Copies only the data changed since the last full capture?
    Incremental Backup
  24. A valuable vulnerability scanning tool?
    Nmap
  25. Test designed to gain access through identified vulnerabilities?
    Penetration attempts
  26. An examination made before an incident or event occurs?
    Proactive Scanning
  27. A program that includes both identification of weaknesses and attempts to exploit any weaknesses found?
    Vulnerability Management
  28. An examination that attempts to identify security weakness in a system or network?
    Vulnerability Scan
  29. A recovery procedure that is invoked if the primary procedure fails?
    Contingency Plan
  30. The total amount of time that an organization can be without its vital business systems?
    Maximum tolerable outage
  31. An expression of how far back in time recovered data can restore company operations?
    Recovery Point Objective
  32. The loss of no data; data is restored at the point of failure?
    Zero data loss
  33. This is produced when encryption converts plaintext?
    Ciphertext
  34. Data stored on a storage medium?
    Data at rest  (DaR)
  35. Data in transit?
    Data in motion (DiM)
  36. Ensures that data is protected against corruption?
    Data Integrity
  37. Data being manipulated by an application?
    Data in use (DiU)
  38. A system that uses prevention and detection to protect sensitive?
    Data Loss Prevention
  39. Controls internal and external communications by filtering the flow of data?
    Endpoint DLP
  40. A hardware component that provides protection of sensitive data
    Hardware-based encryption
  41. Operates at the entry and exit points of a network to scan for packets containing sensitive data?
    Network DLP
  42. The system has proof of the integrity and origin of protected data?
    Non-repudiation
  43. Sets the time standards for keeping data?
    Data Retention
  44. A threat model that centers on the exposure to resources is said to be _________-centric?
    Asset
  45. Removing unnecessary services and accounts from a host computer is host ____________.
    Hardening
  46. An SQL ________________ attack causes a database system to return more data than the application intends.
    Injection
  47. A ____________________ baseline documents the performance and throughput levels of a host?
    Performance
  48. ___________________ testing is a software testing method that identifies coding errors and security vulnerabilities in an application.
    Fuzz
  49. Cross-site request forgery (abbr)
    XSRF
  50. _______________ management assures system updates are tested and implemented as needed.
    Patch
  51. The principle of ______________ suggests multiple layers of security (three words).
    Defense in Depth
  52. A ____________ baseline records the initial settings of a computer's operating system and perhaps application software.
    Configuration
  53. Using a cable lock to secure a computer to a work surface is a form of _______________ prevention.
    Theft
  54. A ___________________ occurs when input data is too large for the memory allocation in which it is stored.
    Buffer Overflow
  55. A host-based ______________ prevents distributed attacks and prevents infected traffic from entering the host.
    Firewall
  56. What term describes an environment where an organization permits its employees to use their own electronic mobile devices for workplace applications?
    Bring-your-own-device (BYOD)
  57. What encryption process doesn't require an external computer to work?
    Hard Encryption
  58. What category of security measures uses human features or actions to enhance the authentication process on a mobile device?
    Mobile Biometrics (MOBIO)
  59. ___________ is a secure voice protocol.
    ZRTP
  60. What security feature provides a first line of security on a mobile device?
    Screen lock
  61. What is the data security feature on a mobile device that can be activated automatically or remotely to prevent access to any data stored on the device?
    Data Wipe
  62. An Apple device user may jailbreak its operating system. To accomplish the same on an Android device, the user must _________ his or her device?
    Root
  63. What mobile device application monitors a device's settings and quarantines the device if certain settings change?
    Integrity manager
  64. What device transforms voice signals into binary data for encryption and transmission?
    Analog-to-digital converter (ADC)
  65. What term refers to the instructions that control the hardware functions of a mobile device?
    Firmware
  66. What security application detects an attack on a mobile device and then blocks its traffic from entering the device?
    Intrusion Prevention System (IPS)
  67. This process verifies that users are who they say they are?
    Authentication
  68. The __________ consists of confidentiality, integrity, and availability.
    CIA Triad
  69. The process that verifies what a user has the rights and permissions to do.
    Authorization
  70. The validation that a person is the owner of the entered credentials?
    Identification
  71. The media independent authentication standard defined by the IEEE?
    IEEE 802.1X
  72. A server that authenticates, authorizes, and provides accounting or remote users?
    RADIUS
  73. Devices and methods that identify people based on one or more physiological or behavioral traits?
    Biometrics
  74. Portable devices used to identify a person?
    Security Tokens
  75. A plastic card with an embedded microprocessor system?
    Smart Card
  76. Electronic data comprised of a digest of a document sign with an encrypted private key.
    Digital Signature
  77. This process determines the rights and permissions an authenticated user has to specific resources.
    Authorization
  78. A user has only the permissions required to perform his or her tasks.
    Principle of least privilege
  79. One of the basic concepts of internal controls?
    Separation of duties
  80. The phase of access control that performs authentication and identification.
    Policy definition
  81. The form of access controls that is commonly the default method in operating systems?
    Mandatory Access Control
  82. The form of access control that is based on a person's function.
    Role-based access control
  83. Defines whether a request can access network objects?
    Access Control list
  84. This type of ACL entry specifically identifies a host or network?
    Explicit
  85. This type of ACL entry should always be the last entry in a list?
    Implicit deny
  86. Users are authenticated to network resources through one set of credentials
    Single Sign On
  87. The form of access control that deals with who enters or leaves an area?
    Physical Access Control
  88. A user attempting to log off a computer does so under this type of user privilege.
    Automatic Privilege
  89. A user who has absolute power on a system is typically this type of user?
    Privileged User
  90. This type of user can operate a computer and open, create, and save documents, but cannot manipulate system settings?
    Restricted user
  91. A group account limited to a single computer
    Local group
  92. A group account that may include remote users accounts
    Global group
  93. Privileges assigned to a specific individual
    User-assigned privileges
  94. A password that meets or exceeds the password policy requirements?
    Strong password
  95. A method of cracking a password by generating every possible combination of characters and comparing it to stored passwords.
    Brute force guessing
  96. An account policy that calls for disabling a user's account when a incorrect password is used a specific number of times.
    Account lockout
  97. A process that automatically presents credentials to the authentication and authorization authority of multiple applications.
    Single Sign on
  98. A privilege extended to a user or application based on the user of a valid authentication credential?
    Granted Privilege
  99. A ______________ is a form of lassS that provides integration for wide area networks (WAN) focusing on the communication services.
    Carrier Cloud
  100. ______________ structures a physical and logical server to appear to be a dedicated server to any host seeking services.
    Server Virtualization
  101. Virtualization software running on a server creates multiple ___________.
    Virtual private servers
  102. The ____________ approach uses a host/guide and hypervisor arrangement and applies porting.
    Paravirtual Machine
  103. Virtualized applications running in a _______________ are isolated.
    Sandbox
  104. ________ is the delivery of applications as a service in which resources, software, and data are available to a host via the internet.
    Cloud computing
  105. A ___________ is a shared cloud infrastructure among two or more organizations.
    Community Cloud
  106. A ___________ offers applications, storage, and resources available from an ASP.
    Public Cloud
  107. A company offering cloud services to subscribers is a ___________.
    Cloud Service Provided (CSP)
  108. An attack in which an attacker attempts to access the hypervisor from inside a virtual environment is a ____________________.
    VM Escape
  109. One way to secure a virtual environment is by running a ________________.
    Virtual security appliance
  110. The encryption method that applies a different keystream to each of three passes on plaintext block.
    Triple Des
  111. A _____________ function creates a fixed-length value that uniquely represents an original value?
    Hashing
  112. Uses asymmetric encryption to share a symmetric key privately and symmetric encryption to encrypt data in transit?
    TLS
  113. The Boolean algebra function used to encrypt data.
    XOR
  114. __________________ Encryption defines a public key and a private key.
    Asymmetric
  115. _________________ is the hash function recommended by NIST.
    SHA
  116. ______________ encryption converts plaintext data through the application of a secret key and a mathematical algorithm.
    Symmetric
  117. The output of a process that converts plaintext into a single value.
    Message Digest
  118. Provides for key exchange and strong integrity checking.
    SSH
  119. ___________________ is a method for camouflaging data inside another data stream or file.
    Steganography
  120. Any message you send is encrypted using this.
    Private Key
  121. The encryption algorithm that combines a random number with a key and its associated data to yield a secret key and encrypted data.
    AES
  122. Any message you receive is decrypted using this.
    Public key

What would you like to do?

Home > Flashcards > Print Preview