Shared Flashcard Set

Details

301-325
-
25
Computer Science
Professional
01/31/2015

Additional Computer Science Flashcards

 


 

Cards

Term
Which of the following should Pete, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from their company?
Definition
Mandatory Vacations
Term
Which of the following will allow Pete, a security analyst, to trigger a security alert because of a tracking cookie?
Definition
Anti-spyware software
Term
Which of the following protocols allows for secure transfer of files?
Definition
SFTP
SCP
Term
Which of the following passwords is the LEAST complex?
Definition
Mytr@in!!
Term
During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall?
Definition
22
23
SSH
Telnet
Term
Which of the following is an application security coding problem?
Definition
Error and exception handling
Term
An IT security technician needs to establish host based security for company workstations. Which of the following will BEST meet this requirement?
Definition
Implement OS hardening by applying GPOs.
Term
Which of the following is the MOST specific plan for various problems that can arise within a system?
Definition
IT Contingency Plan
Term
Which of the following BEST describes the weakness in WEP encryption?
Definition
The WEP key is stored with a very small pool of random numbers to make the cipher text. As the random numbers are often reused it becomes easy to derive the remaining WEP key.
Term
Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years. Each breach has cost the company $3,000. A third party vendor has offered to repair the security hole in the system for $25,000. The breached system is scheduled to be replaced in five years. Which of the following should Sara do to address the risk?
Definition
Transfer the risk saving $5,000.
Term
Which of the following is an authentication and accounting service that uses TCP for connecting to routers and switches?
Definition
TACACS+
Term
Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production system?
Definition
Input validation
Term
Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation methods would provide the MOST physical protection?
Definition
Mantrap
Term
Which of the following should be connected to the fire alarm system in order to help prevent the spread of a fire in a server room without data loss to assist in an FM-200 deployment?
Definition
HVAC
Term
Matt, a security consultant, has been tasked with increasing server fault tolerance and has been given no budget to accomplish his task. Which of the following can Matt implement to ensure servers will withstand hardware failure?
Definition
RAID
Term
Which of the following fire suppression systems is MOST likely used in a datacenter?
Definition
FM-200
Term
A security administrator has installed a new KDC for the corporate environment. Which of the following authentication protocols is the security administrator planning to implement across the organization?
Definition
Kerberos
Term
While opening an email attachment, Pete, a customer, receives an error that the application has encountered an unexpected issue and must be shut down. This could be an example of which of the following attacks?
Definition
Buffer overflow
Term
Jane has recently implemented a new network design at her organization and wishes to passively identify security issues with the new network. Which of the following should Jane perform?
Definition
Vulnerability assessment
Term
A security technician is working with the network firewall team to implement access controls at the company’s demarc as part of the initiation of configuration management processes. One of the network technicians asks the security technician to explain the access control type found in a firewall. With which of the following should the security technician respond?
Definition
Rule based access control
Term
Jane, a security administrator, has been tasked with explaining authentication services to the company’s management team. The company runs an active directory infrastructure. Which of the following solutions BEST relates to the host authentication protocol within the company’s environment?
Definition
Kerberos
Term
Pete, the compliance manager, wants to meet regulations. Pete would like certain ports blocked only on all computers that do credit card transactions. Which of the following should Pete implement to BEST achieve this goal?
Definition
A host-based firewall
Term
Pete, the system administrator, wants to restrict access to advertisements, games, and gambling web sites. Which of the following devices would BEST achieve this goal?
Definition
URL content filter
Term
Pete, the system administrator, wishes to monitor and limit users’ access to external websites. Which of the following would BEST address this?
Definition
Install a proxy server.
Term
Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on the internal interface of the firewall to be translated to one public IP address on the external interface of the same firewall. Which of the following should Sara configure?
Definition
PAT
Supporting users have an ad free experience!