Deck 9: Hardware and Software Controls

Full screen (f)
exit full mode
Question
Password cracking is

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
Use Space or
up arrow
down arrow
to flip the card.
Question
The merits of firewalls include all the following except

A) Costs
B) Complexity
C) Wide availability
D) Vulnerability to poor configuration
Question
Password guessing is

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
Question
In enterprise networks, power users can facilitate patch management by

A) Administering as much of the patch management themselves as possible
B) Setting automatic updates to as many services and software as possible
C) Using department funds to deploy local patch management systems to as many systems as possible
D) Allowing system administrators to controls as much of the patch management as possible
Question
A PIN is

A) A short numerical password
B) A sequences of words used as a password
C) An alpha-numeric phrase used for authentication
D) None of the above
Question
Password capturing is

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
Question
Password management is

A) A list of permissions attached to specified objects
B) A form of protection that allows one network to connect to another network while maintaining some amount of protection
C) The process of defining, implementing, and maintaining password policies throughout an enterprise
D) Passwords on the system known to unauthorized users
Question
An ACL is

A) The process of defining, implementing, and maintaining password policies throughout an enterprise
B) A list of permissions attached to specified objects
C) A form of protection that allows one network to connect to another network while maintaining some amount of protection
D) Passwords on the system known to unauthorized users
Question
PINs are useful in high security systems
Question
Limitations of IDS include

A) Evasion
B) Passwords
C) Complexity
D) Access
Question
A firewall is

A) A list of permissions attached to specified objects
B) The process of defining, implementing, and maintaining password policies throughout an enterprise
C) A form of protection that allows one network to connect to another network while maintaining some amount of protection
D) Passwords on the system known to unauthorized users
Question
Compromised passwords is/ are

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
Question
The de-militarized zone in the context of information security refers to

A) The network that hosts external services such as email, web and DNS
B) The Internet
C) The internal corporate network
D) The organization's reception area
Question
An IDS that compares observed events against defined activities for each protocol is a

A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
Question
An IDS that compares observed activity with defined patterns is a

A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
Question
A password policy is

A) A set of rules for using passwords
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
Question
Threats to passwords include

A) Password guessing
B) Password capturing
C) Password replacing
D) All of the above
Question
Considerations while prioritizing patches include all of the following except the

A) Importance of the vulnerability
B) Importance of the system to be patched
C) Licensing costs
D) Dependencies with other patches
Question
Patches should always be installed as soon as they become available
Question
An IDS that looks for specific sequences of bytes is a

A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
Question
Assessing the safety of a file using scores calculated from its observable attributes is called

A) Reputation based end-point protection
B) Protocol-based end-point protection
C) Anomaly-based end-point protection
D) Signature-based end-point protection
Question
Examining byte sequences in incoming and outgoing data is called

A) Reputation based end-point protection
B) Protocol-based end-point protection
C) Anomaly-based end-point protection
D) Signature-based end-point protection
Question
End-point protection defends against attacks on

A) Firewalls
B) Offices
C) Vehicles
D) Desktops
Question
End-point protection defends against attacks on

A) Firewalls
B) Offices
C) Vehicles
D) Desktops
Question
Methods used by endpoint security software for recognizing malware include

A) Reputations
B) Cracking
C) Certificates
D) Passwords
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Hardware and Software Controls
1
Password cracking is

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
D
2
The merits of firewalls include all the following except

A) Costs
B) Complexity
C) Wide availability
D) Vulnerability to poor configuration
D
3
Password guessing is

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
C
4
In enterprise networks, power users can facilitate patch management by

A) Administering as much of the patch management themselves as possible
B) Setting automatic updates to as many services and software as possible
C) Using department funds to deploy local patch management systems to as many systems as possible
D) Allowing system administrators to controls as much of the patch management as possible
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
A PIN is

A) A short numerical password
B) A sequences of words used as a password
C) An alpha-numeric phrase used for authentication
D) None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Password capturing is

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Password management is

A) A list of permissions attached to specified objects
B) A form of protection that allows one network to connect to another network while maintaining some amount of protection
C) The process of defining, implementing, and maintaining password policies throughout an enterprise
D) Passwords on the system known to unauthorized users
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
An ACL is

A) The process of defining, implementing, and maintaining password policies throughout an enterprise
B) A list of permissions attached to specified objects
C) A form of protection that allows one network to connect to another network while maintaining some amount of protection
D) Passwords on the system known to unauthorized users
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
PINs are useful in high security systems
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Limitations of IDS include

A) Evasion
B) Passwords
C) Complexity
D) Access
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
A firewall is

A) A list of permissions attached to specified objects
B) The process of defining, implementing, and maintaining password policies throughout an enterprise
C) A form of protection that allows one network to connect to another network while maintaining some amount of protection
D) Passwords on the system known to unauthorized users
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
Compromised passwords is/ are

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
The de-militarized zone in the context of information security refers to

A) The network that hosts external services such as email, web and DNS
B) The Internet
C) The internal corporate network
D) The organization's reception area
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
An IDS that compares observed events against defined activities for each protocol is a

A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
An IDS that compares observed activity with defined patterns is a

A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
A password policy is

A) A set of rules for using passwords
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Threats to passwords include

A) Password guessing
B) Password capturing
C) Password replacing
D) All of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Considerations while prioritizing patches include all of the following except the

A) Importance of the vulnerability
B) Importance of the system to be patched
C) Licensing costs
D) Dependencies with other patches
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Patches should always be installed as soon as they become available
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
An IDS that looks for specific sequences of bytes is a

A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Assessing the safety of a file using scores calculated from its observable attributes is called

A) Reputation based end-point protection
B) Protocol-based end-point protection
C) Anomaly-based end-point protection
D) Signature-based end-point protection
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Examining byte sequences in incoming and outgoing data is called

A) Reputation based end-point protection
B) Protocol-based end-point protection
C) Anomaly-based end-point protection
D) Signature-based end-point protection
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
End-point protection defends against attacks on

A) Firewalls
B) Offices
C) Vehicles
D) Desktops
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
End-point protection defends against attacks on

A) Firewalls
B) Offices
C) Vehicles
D) Desktops
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Methods used by endpoint security software for recognizing malware include

A) Reputations
B) Cracking
C) Certificates
D) Passwords
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.