click below
click below
Normal Size Small Size show me how
Risk_MGMT
Security and Risk Management Midterm
Question | Answer |
---|---|
A ________ is a small program that, after installed, downloads a larger attack program. | Downloader |
A botmaster can remotely ________. | Both A and B |
A(n) ________ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packets. | DoS |
A(n) ________ attack requires a victim host to prepare for many connections, using up resources until the computer can no longer serve legitimate users. | SYN Flooding |
Another name for safeguard is ________. | countermeasure |
Following someone through a secure door for access without using an authorized ID card or pass code is called ________. | piggybacking |
ICMP Echo messages are often used in ________. | IP address scanning |
If TJX had met the PCI-DSS control objectives, it would have ________ avoided the data breach. | probably |
If a company wishes to prosecute people or companies that steal its trade secrets, it must take ________ precautions to protect those trade secrets. | reasonable |
In ________, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest. | extortion |
In a virus, the code that does damage is called the ________. | payload |
Mobile code usually is delivered through ________. | webpages |
Most traditional external attackers were heavily motivated by ________. | the thrill of breaking in |
Penalties for hacking are ________. | irrelevant of the amount stolen |
Sending packets with false IP source addresses is called ________. | IP address spoofing |
Some ________ can jump directly between computers without human intervention. | worms |
Stealing credit card numbers is also known as ________. | carding |
Terrorists can use IT to ________. | Both A and B |
The TJX data breach was due to ________. | multiple security weaknesses |
The dominant type of attacker today is the ________. | career criminal |
The fastest propagation occurs with some types of ________. | worms |
The three common core goals of security are ________. | confidentiality, integrity, and availability |
To obtain IP addresses through reconnaissance, an attacker can use ________. | a chain of attack computers |
Watching someone type their password in order to learn the password is called ________. | shoulder surfing |
When a threat succeeds in causing harm to a business, this is a(n) ________. | breach |
When a threat succeeds in causing harm to a business, this is called a ________. | All of the above |
Which of the following CIA security goals did TJX fail to meet? | confidentiality |
Which of the following are examples of social engineering? | All of the above |
Which of the following are types of countermeasures? | All of the above |
Which of the following are ways that trade secret espionage occur? | All of the above |
Which type of program can hide itself from normal inspection and detection? | rootkit |
You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to be your bank's website. However, the website is fake. This is called a ________ attack. (Pick the most precise answer) | phishing |
________ are programs that attach themselves to legitimate programs. | Viruses |
________ attacks take advantage of flawed human judgment by convincing the victim to take actions that are counter to security policies. (Choose the best answer) | Social engineering |
________ consists of activities that violate a company's IT use policies or ethics policies. | Abuse |
________ is a form of online fraud when bogus clicks are performed to charge the advertiser without creating potential new customers. | Click fraud |
________ is a generic term for "evil software." | Malware |
________ may engage in commercial espionage against a firm. | Both A and B |
________ threaten to do at least temporary harm to the victim company's IT infrastructure unless the victim pays the attacker. | Extortionists |
A ________ occur(s) when a single security element failure defeats the overall security of a system. | weakest link failure |
A governance framework specifies how to do ________. | All of the above. |
A technical security architecture should be created ________. | before a firm creates individual countermeasures |
Before doing a vulnerability test, a security employee must ensure that ________. | he or she has a specific contract to do a specific test |
COSO focuses on ________. | corporate internal and financial controls |
CobiT focuses on ________. | controlling the entire IT function |
Conducting stings on employees ________. | Both A and B |
In manual procedures, the segregation of duties ________. | reduces risk |
It is acceptable for an employee to reveal ________. | None of the above. |
Once a company's resources are enumerated, the next step is to ________. | classify them according to sensitivity |
Placing security within IT ________. | is likely to give security stronger backing from the IT department |
Policies drive ________. | Both A and B |
Policies should be written by ________. | corporate teams involving people from multiple departments |
SLE times APO gives the ________. | expected annual loss |
The FTC can ________. | Both A and B |
The first step in developing an IT security plan is to ________. | assess the current state of the company's security |
The key to security being an enabler is ________. | getting it involved early within the project |
The worst problem with classic risk analysis is that ________. | we cannot estimate the annualized rate of occurrence |
This book focuses on ________. | defense |
When risk analysis deals with costs and benefits that vary by year, the computations should use ________. | Either A or B |
When someone requests to take an action that is potentially dangerous, what protection should be put into place? | Limit the number of people that may request an approval. |
Which companies do PCI-DSS affect? | companies that accept credit card payments |
Which of the following gives the best estimate of the complete cost of a compromise? | TCI |
Which of the following is a formal process? | Both A and B |
Which of the following is a way of responding to risk with active countermeasures? | risk reduction |
Which of the following is an example of a conflict of interest? | All of the above |
Which of the following specifies how to do certification by external parties? | ISO/IEC 27000 |
________ are prescriptive statements about what companies should do and are put together by trade associations and government agencies. | Recommended practices |
________ entails investigating the IT security of external companies and the implications of close IT partnerships before implementing interconnectivity. | Due diligence |
________ examines IT processes for efficiency, effectiveness, and adequate controls. | IT auditing |
________ examines financial processes for efficiency, effectiveness, and adequate controls. | Financial auditing |
________ is preferred by U.S. auditors. | CobiT |
________ is the plan-based creation and operation of countermeasures. | Protection |
________ means implementing no countermeasures and absorbing any damages that occur. | Risk acceptance |
________ means responding to risk by not taking a risky action. | Risk avoidance |
________ means responding to risk by taking out insurance. | Risk transference |
________ requires multiple countermeasures to be defeated for an attack to succeed. | Defense in depth |
________ specifically addresses data protection requirements at financial institutions. | GLBA |
________ specifically addresses data protection requirements at health care institutions. | HIPAA |
________ specify the low-level detailed actions that must be taken by specific employees. | Procedures |
A DES key is ________ bits long. | 56 |
A ________ is a cryptographic system that provides secure communication over an untrusted network. | virtual private network |
Companies transmit over the Internet because the Internet ________. | is inexpensive |
Digital signatures are used for ________ authentication. | message-by-message |
Electronic signatures usually provide ________. | Both A and B |
HMACs provide the cryptographic protection of ________. | authentication |
Hashing is ________. | repeatable |
In MS-CHAP, the ________ creates the response message. | supplicant |
In SSL/TLS, a ________ is a specific set of security methods and options. | cipher suite |
In SSL/TLS, a specific set of protocols that a particular cryptographic system will use to provide protection is called a ________. | cipher suite |
In checking the digital signature, the verifier ________. | hashes the plaintext message with the same algorithm used by the sender to get the message digest |
In codes, code symbols may represent ________. | All of the above |
In mutual authentication between two parties, ________. | there are two verifiers and two supplicants |
In order to be considered strong today, a symmetric encryption key must be at least ________ bits long. | 100 |
In public key encryption for authentication, the supplicant must prove that it knows ________, which nobody else should be able to know. | the true party's private key |
Nonces can be used in ________. | client/server applications |
SSL/TLS is used for ________ VPNs. | Both A and B |
SSL/TLS was developed for ________ VPNs. | host-to-host |
Someone who breaks encryption is called a ________. | cryptanalyst |
Someone who pretends to be someone else is ________. | an impostor |
The best way to thwart exhaustive searches by cryptanalysts is ________. | to make the key very long |
To check a certificate's revocation status, the verifier can ________. | send an OCSP message to the CA |
To ensure that a digital certificate is valid, the receiver of the certificate must check ________. | Both A and B |
To meet national export limitation in many countries, RC4 often uses a key length of ________ bits. | 40 |
What protection do cryptographic systems provide on a message-by-message basis? | All of the above |
What usually is the longest stage in a cryptographic system dialogue? | ongoing communication |
When Joshua sends a message to Larry, Joshua will use ________ to encrypt the message. | Larry's public key |
When you make a purchase over the Internet, your sensitive traffic is almost always protected by ________ VPN transmission. | SSL/TLS |
Which encryption method does MS-CHAP use? | Neither A nor B |
Which of the following can be used as a keying method? | public key encryption for confidentiality |
Which of the following fields are contained on a digital certificate? | All of the above |
Which of the following is one of the key lengths offered by AES? | 192 bits |
Which of the following measures do HMACs use? | hashing |
Which of the following statements accurately describes RC4? | RC4 is extremely fast |
Which of the following statements accurately describes RC4? | RC4 can use a broad range of key lengths |
Which types of VPNs use VPN gateways? | remote access VPNs |
________ are proofs of identity. | Credentials |
________ is the use of mathematical operations to protect messages travelling between parties or stored on a computer. | Cryptography |
________ offers transparent protection. | IPsec |
________ thwart replay attacks by ensuring "freshness" using cutoff values. | Time stamps |
A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic. | Ping flood |
A network administrator notices extensive damage to wireless packets. This might indicate a ________ attack. | DoS flood attack |
An EAP response message may contain ________. | a negative acknowledgement |
An attacker controlling bots in a coordinated attack against a victim is known as a ________. | DDoS attack |
Eavesdropping usually is more of a concern for ________ LANs than for ________ LANs. | wireless, wired |
In a man-in-the-middle attack, ________. | Both A and B |
In regards to network security, ________ is the policy-driven control of access to systems, data, and dialogues. | access control |
Most central authentication servers are governed by the ________ standard. | RADIUS |
Rerouting traffic using ARP poisoning is an attack on ________ of a network. | Both A and B |
The authenticator is the ________. | workgroup switch |
The most common attack against a wireless network is a(n) ________. | unauthorized network access |
The original 802.11 core security protocol, ________, was deeply flawed. | WEP |
The ultimate goal of a DoS attack is to ________. | cause harm |
WEP stands for ________. | wired equivalent privacy |
WEP typically takes ________ to crack today. | minutes |
When a new EAP authentication is added, software has to be changed on the ________. | central authentication server |
Which of the following measures offers strong security? | None of the above |
________ are an additional layer of compromised hosts that are used to manage large groups of bots. | Handlers |
________ are compromised hosts running malware controlled by the hacker. | Bots |
________ is a good option if an attack is aimed at a single server because it keeps transmission lines at least partially open for other communication. | Rate limiting |
________ is one method of thwarting DoS attacks by dropping all IP packets from an attacker. | Black holing |
________ is the process of obscuring an attackers source IP address. | Spoofing |
________ is used by ________ for authentication. | EAP, RADUS |
________ is/are effective method(s) to preventing ARP poisoning attacks. | Both A and B |
________ security uses 128-bit AES encryption for confidentiality and AES-CCMP for automatic rekeying. | 802.11i |
A security assertion may contain ________. | Both A and B |
A(n) ________ is a statement from Firm A that Firm B should accept as true if Firm B trusts Firm A. | assertion |
Directory servers from different vendors are synchronized through ________. | None of the above |
Hand geometry recognition is used heavily for ________. | door access |
If Directory Server A trusts Directory Server Band Directory Server B trusts Directory Server A, this is ________ trust. | mutual |
If a laptop needs to be taken off premises, ________. | All of the above |
In Kerberos, the ________ is an encrypted session key that only the verifier can decrypt. | service ticket |
In directory servers, information is organized ________. | hierarchically |
In the context of PKI, ________ is the process of accepting public keys and providing new digital certificates to the users. | provisioning |
LDAP can be used ________. | Both A and B |
Long passwords that use several types of keyboard characters are called ________ passwords. | complex |
The book recommends that passwords be at least ________ characters long. | 8 |
The most widely used form of biometrics is ________. | fingerprint scanning |
The principle of ________ states that each person should only get the permissions that he or she absolutely needs to do his or her job. | least permissions |
The strongest form of authentication is ________. | cryptographic authentication |
Two-factor authentication can be defeated if ________. | Both A and B |
When an attacker deliberately attempts to fool the system, this is called ________. | deception |
Which of the following is one of the four bases for authentication credentials? | Both A and B |
Which of the following is not one of the AAA controls? | accuracy |
Which of the following is not one of the devices in RADIUS central authentication? | the verifier |
Which of the following statements accurately describes fingerprint recognition? | fingerprint recognition is easily deceived |
Which of the following statements is true about log files? | All of the above |
________ is the process of assessing the identity of each individual claiming to have permission to use a resource. | Authentication |
________ is the process of collecting information about the activities of each individual in log files for immediate and later analysis. | Auditing |
________ often get their authentication information from ________. | Central authentication servers, directory servers |