Term
Which type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses or worms?
|
|
Definition
|
|
Term
From the command prompt, the following command is issued: telnet www.myserver.com 80. What process is being implemented for the purpose of information gathering?
|
|
Definition
|
|
Term
The IEEE 802.15.1-2005 standard is based on which version of the Bluetooth specifications?
|
|
Definition
|
|
Term
When using AES-CCMP encryption, the AES-256 bit key performs how many rounds?
|
|
Definition
|
|
Term
What type of malware is heavily dependent on a user in order to spread?
|
|
Definition
|
|
Term
A ___________ attack is similar to a passive man-in-the-middle attack.
|
|
Definition
|
|
Term
An administrator is running a port scan. He wants to ensure that no processes are listening on port 23. What state should the port be in?
|
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
An example of a(n) ___________ that information security must deal with is a software defect in an operating system that allows an unauthorized user to gain access to a computer without the user's knowledge or permission. |
|
Definition
|
|
Term
____________ provides tracking of events. |
|
Definition
|
|
Term
A type of threat that can come from employees, contractors and business partners such as a disgruntled worker is known as _______________. |
|
Definition
|
|
Term
As network administrator, you have been tasked with gaining a better understanding of who the attackers might be, why they might attack and what type of attacks might occur. Which of the following processes will you implement?
|
|
Definition
|
|
Term
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
|
|
Definition
|
|
Term
A team of consultants has just completed the process of implementing a VPN for your company. You have been assigned the task of evaluating the VPN implementation for proper setup and security. Your task is an example of:
|
|
Definition
|
|
Term
What security goal do the following have in common: hashing, digital signatures, certificates and non-repudiation tools?
|
|
Definition
|
|
Term
Which type of system security malware allows for access to a computer, program or service without authorization?
|
|
Definition
|
|
Term
Which of the following encryption protocols is used in the WPA2 standard?
|
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Analyzing code as it is written in order to prevent errors and increase security is referred to as: |
|
Definition
|
|
Term
According to the US Bureau of Labor Statistics, what percentage of growth is the available job outlook for information security analysts supposed to reach by the end of the decade?
|
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
A ______________ is an in-depth examination and analysis of a wireless LAN site. |
|
Definition
|
|
Term
When a wireless device looks for beacon frames it is known as ___________.
|
|
|
Definition
|
|
Term
What type of attack takes advantage of web applications that accept user input without validating it and then present it back to the user?
|
|
Definition
|
|
Term
Which of the following protocols creates an encrypted channel between the client and the authentication server in addition to using Microsoft Windows logins and passwords?
|
|
Definition
|
|
Term
What is the end result of a penetration test?
|
|
Definition
|
|
Term
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
|
|
Definition
|
|
Term
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?
|
|
Definition
|
|
Term
What is the maximum number of characters that can exit within an SSID?
|
|
Definition
|
|
Term
Which of the following SQL injection statements can be used to find specific users?
|
|
Definition
whatever' OR full_name LIKE '%Mia%' |
|
|
Term
Which of the following uses a standard web browser to provide information and gives the wireless user the opportunity to agree to a policy or present valid login credentials?
|
|
Definition
captive portal access point |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
On a piconet, slave devices that are connected but are not actively participating are called ______ slaves. |
|
Definition
|
|
Term
Of the three types of mutating malware, which type changes its internal code to one of a set number of predefined mutations whenever it is executed?
|
|
Definition
|
|
Term
A virus that infects an executable program file is known as:
|
|
Definition
|
|
Term
Which type of attack is targeted against a smaller group of specific individuals such as the major executives working for a manufacturing company?
|
|
Definition
|
|
Term
EAP uses which of the following types of packets? (Choose three.)
|
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
In the ___________ technique, the virus splits the malicious code into several parts and the parts are placed at random positions throughout the program code. |
|
Definition
|
|
Term
A ___________ box test is one in which some limited information has been provided to the tester. |
|
Definition
|
|
Term
Which of the following SQL injection statements can be used to discover the name of the table?
|
|
Definition
|
|
Term
Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?
|
|
Definition
|
|
Term
Which of the following is responsible for the issuing of EAP request packets?
|
|
Definition
|
|
Term
The predecessor to today's Internet was a network known as ___________. |
|
Definition
|
|
Term
Which of the three protections ensures that only authorized parties can view information?
|
|
Definition
|
|
Term
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS.
|
|
Definition
|
|
Term
|
Definition
|
|
Term
Proper _____________ involves identifying risks but making the decision to not engage in the activity. |
|
Definition
|
|
Term
The ______________ reports directly to the chief information officer (CIO) and is responsible for assessing, managing and implementing security. |
|
Definition
chief information security officer |
|
|
Term
A __________________ can detect which ports are served and which ports are browsed for each individual system. |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|