Term
The policies of the Bell-LaPadula model are |
|
Definition
*-Property (no write down) and Simple Security Rule (no read up) |
|
|
Term
The term "script kiddies" refers to |
|
Definition
A hacker of low-end technical ability |
|
|
Term
|
Definition
A hacker with a high level of technical ability |
|
|
Term
Users on your network receive an e-mail warning them of a dangerous computer virus. It instructs the user to delete files it claims were put there by the virus, but they are actually critical system files. This is an example of |
|
Definition
|
|
Term
Locks, sign-in logs, and security guards are examples of |
|
Definition
|
|
Term
Locks, sign-in logs, and security guards are examples of |
|
Definition
|
|
Term
What is an unstructured threat? |
|
Definition
An attack that is uncoordinated, nonspecific, and lasts a short amount of time |
|
|
Term
What is a structured threat? |
|
Definition
An attack that uses coordination, insiders, and lasts for a long period of time |
|
|
Term
|
Definition
An attack that was made to look like an attack from Iraq, but was actually made by two teenagers from California who got training in Israel |
|
|
Term
All of the following are techniques used by a social engineer EXCEPT |
|
Definition
An attacker runs a brute force attack on a password. |
|
|
Term
Which of the following is NOT an example of a poor security practice? |
|
Definition
An employee does not allow a person he is talking to, to enter a secured area behind him before showing proper credentials. |
|
|
Term
Which of the following is a security model that uses transactions as the basis for its rules? |
|
Definition
|
|
Term
What is the most common threat to information security in an organization? |
|
Definition
|
|
Term
The company CIO wants you and your team to check the security of the network by simulating an attack by malicious individuals. He is asking you to |
|
Definition
Conduct a penetration test |
|
|
Term
The outermost layer of physical security should |
|
Definition
Contain the most publicly visible activities |
|
|
Term
The most sensitive equipment should be located |
|
Definition
Deep inside the organization |
|
|
Term
The IDS fails to alert on an intruder's ping sweep and port scan. This is a failure of which element of the operational model of computer security? |
|
Definition
|
|
Term
Attackers need a certain amount of information before launching their attack. One common place to find information is to go through the trash of the target to find information that could be useful to the attacker. This process of going through a target's trash is known in the community as |
|
Definition
|
|
Term
Which of the following is not a common wireless communications method? |
|
Definition
|
|
Term
What is the problem described by the van Eck phenomenon and studied under TEMPEST? |
|
Definition
Electromagnetic eavesdropping |
|
|
Term
The first step an administrator can take to reduce possible attacks is to |
|
Definition
Ensure all patches for the operating system and applications are installed |
|
|
Term
What is a good first step for companies to take to fight potential social engineering attacks? |
|
Definition
Establish policies and procedures dictating the roles and responsibilities all users, as well as security administrators |
|
|
Term
Bob works in a small office with a network of computers. Bob, along with all the other employees, is responsible for securing his own computer on the network. This is an example of network security |
|
Definition
|
|
Term
Computer security and information assurance are the same thing |
|
Definition
|
|
Term
The steps an attacker takes in attempting to penetrate a targeted network are extremely different from the ones that a security consultant performing a penetration test would take. |
|
Definition
|
|
Term
There are three general reasons a particular computer system is attacked: It is specifically targeted by the attacker, it is a target of opportunity, or it is a target that was specified to be attacked by a larger criminal organization. |
|
Definition
|
|
Term
Operating systems and applications all implement rights and permissions the same way. |
|
Definition
|
|
Term
Social engineers attempt to exploit the natural tendencies of people. They do this by |
|
Definition
First trying to evoke sympathy; if this fails, then by fear of confrontation |
|
|
Term
Social engineers attempt to exploit the natural tendencies of people. They do this by |
|
Definition
First trying to evoke sympathy; if this fails, then by fear of confrontation |
|
|
Term
A fire suppression system that is safe for equipment, but dangerous for humans is |
|
Definition
|
|
Term
|
Definition
He used social engineering, sniffers, and cloned cell phones to gain unauthorized access to networks belonging to Motorola, Novell, Fujitsu, and Sun Microsystems |
|
|
Term
Background checks, drug testing, retirement, and termination are elements found in which type of policy? |
|
Definition
|
|
Term
|
Definition
Identifies ports that are open and services that are running |
|
|
Term
If the system is infected with a time bomb, it means that |
|
Definition
It has a piece of malicious code that will be triggered at a certain time |
|
|
Term
The database administrator falls ill and is not able to come to work for three weeks. No one else in the company knows how to administer the database server. This is a result of not following which principle? |
|
Definition
|
|
Term
Reducing the number of services to the least number necessary for it to properly perform its functions is an example of which principle? |
|
Definition
|
|
Term
When information is disclosed to individuals not authorized to see it, you have suffered a |
|
Definition
|
|
Term
Ensuring that users have access only to the files they need to complete their tasks is an example of which principle? |
|
Definition
|
|
Term
When users are unable to access information or the systems processing information, you may have suffered a |
|
Definition
|
|
Term
A successful attack on a network may adversely impact security in all the following ways EXCEPT |
|
Definition
|
|
Term
What was the Slammer Worm/Virus? |
|
Definition
Malware that exploited Microsoft SQL Server and spread across the world in just 10 minutes |
|
|
Term
When creating a password, users tend to use |
|
Definition
Names of family, pets, or teams |
|
|
Term
Which of the following is the weakest password |
|
Definition
|
|
Term
IEEE 802.11 is a set of standards suited for |
|
Definition
|
|
Term
The incident response team reviewed the security logs and discovered that the network had been breached, due to a misconfigured firewall. This is a failure of which element of the operational model of computer security? |
|
Definition
|
|
Term
The policies of the Biba model are? |
|
Definition
Ring (no read down) and Low-Water-Mark (no write up |
|
|
Term
A database server is put on the network by the for a project manager. No one is told it is there except for the project manager, so that he can work on it without worrying that other individuals will try to get to it. This is an example of which principle? |
|
Definition
Security through obscurity |
|
|
Term
A person parks his car by an ATM, sets up a small camera discreetly pointed at ATM keypad, and then pretends to be going through bank papers in his car. This would be an example of |
|
Definition
|
|
Term
The three types of authentication used for access control are |
|
Definition
Something you have, something you know, something you are |
|
|
Term
A fire suppression system that is safe for humans, but will destroy equipment is |
|
Definition
|
|
Term
Making the effort to compromise a system more costly than the value of accomplishing it is the goal of security |
|
Definition
|
|
Term
Fifty years ago, few people had access to a computer system or network, so securing them was a relatively easy matter. |
|
Definition
|
|
Term
As the level of sophistication of attacks has increased, |
|
Definition
The level of knowledge necessary to exploit vulnerabilities has decreased |
|
|
Term
Why is the Morris worm significant? |
|
Definition
This was the first large-scale attack on the Internet |
|
|
Term
The first step an administrator can take to minimize possible attacks is to ensure that all patches for the operating system and applications are installed |
|
Definition
|
|
Term
According to the Computer Crime and Security Survey, the four types of attacks that increased from 2007 to 2008 were |
|
Definition
Unauthorized access, theft/loss of proprietary information, misuse of web applications, and DNS attacks |
|
|
Term
When an attacker attempts to get credit card numbers using telephone and voice technologies, it's called |
|
Definition
|
|
Term
|
Definition
Warfare conducted against information and information processing equipment |
|
|
Term
Bob inadvertently disconnects the cable from the company file server. This creates a problem of ________. |
|
Definition
|
|
Term
Jane is in the finance department. Although she should not be able to open files or folders from the marketing department, she can and does. This a problem of ___________. |
|
Definition
|
|
Term
Three means of establishing auditability: something you know, something you have, or something you are. |
|
Definition
|
|
Term
The Code Red Worm spread to 350,000 computers in just over a week. |
|
Definition
|
|
Term
The A in CIA refers to the term auditability. |
|
Definition
|
|
Term
Bob works in a small office with a network of computers. Bob, along with all the other employees, is responsible for securing his own computer on the network. This is an example of network security. |
|
Definition
|
|
Term
Operating systems and applications all implement rights and permissions the same way. |
|
Definition
|
|
Term
The biggest change that has occurred in security over the last 30 years has been the change in the computing environment from small, tightly contained mainframes to a highly widespread network of much larger systems. |
|
Definition
|
|
Term
Leaving sensitive information in a car is appropriate if the doors are locked and the files are not in plain view. |
|
Definition
|
|
Term
Halon is effective at putting out fires and safe for humans but can damage equipment. |
|
Definition
|
|
Term
Standards are recommendations relating to a policy. |
|
Definition
|
|
Term
A good security practice is to choose one good password and use it for all of your various accounts. |
|
Definition
|
|
Term
Hoaxes, while a potential nuisance, can not cause any real harm to your data. |
|
Definition
|
|
Term
Spear phishing is when an attacker attempts to redirect a user to a bogus web site that appears similar to the web site the user had intended to access. |
|
Definition
|
|
Term
TEMPEST is a program developed by the US department of defense to protect equipment from the ill effects of weather and other natural disasters. |
|
Definition
|
|
Term
UPS is short for keeping UP Services. |
|
Definition
|
|
Term
Jane is in the finance department. Although she should not be able to modify files or folders from the marketing department, she can, and does. This a problem of ___________. |
|
Definition
|
|
Term
Joe sends a scathing e-mail to his boss regarding increased work hours. Joe tries to deny sending the e-mail, but is unable to due to the use of digital signatures. This is an example of ________. |
|
Definition
|
|
Term
During the day, it takes an employee twice as long to retrieve files from the server that is under attack. The attack has resulted in a degradation of availability. |
|
Definition
|
|
Term
Access controls, firewalls, and encryption are technologies used for prevention |
|
Definition
|
|
Term
All applications, scripts, and batch files run in the same security context of the user who is logged in at the time. |
|
Definition
|
|
Term
Backups, incident response teams, and computer forensics are response technologies |
|
Definition
|
|
Term
The first step an administrator can take to minimize possible attacks is to ensure that all patches for the operating system and applications are installed |
|
Definition
|
|
Term
Auditability refers to whether a control can be verified as functioning or not. |
|
Definition
|
|
Term
Phishing is the most common form of social engineering attack related to computer security. |
|
Definition
|
|
Term
Shoulder surfing is when a person looks over the shoulder of another person while typing pins or passwords. |
|
Definition
|
|
Term
Voice recognition, iris scans, and facial geometry can be used for biometric access controls. |
|
Definition
|
|
Term
Shoulder surfing is when a person looks over the shoulder of another person while typing pins or passwords. |
|
Definition
|
|
Term
Procedures are high-level, broad statements of what the organization wants to accomplish. |
|
Definition
|
|
Term
A critical piece of equipment that provides power to systems even during a black out is called a(n) _______________. |
|
Definition
uninterruptible power supply |
|
|
Term
|
Definition
A for loop provides a convenient way to create a(n) ____ loop. |
|
|
Term
prefix increment operator |
|
Definition
When you want to increase a variable’s value by exactly 1, use the ____. |
|
|
Term
|
Definition
A loop controlled by the user is a type of ____ loop. |
|
|
Term
|
Definition
How many times will outputLabel be called? for(customer = 1; customer <= 20; ++customer) for(color = 1; color <= 3; ++color) { outputLabel(); } } |
|
|
Term
|
Definition
Use a(n) ____ loop to execute a body of statements continually as long as the Boolean expression that controls entry into the loop continues to be true. |
|
|
Term
|
Definition
A(n) ____ is a structure that allows repeated execution of a block of statements. |
|
|
Term
|
Definition
In Java, the ____ assigns a value to the variable on the left. |
|
|
Term
the loop control variable is false |
|
Definition
In a do...while loop, the loop will continue to execute until ____. |
|
|
Term
|
Definition
____ is the process of ensuring that a value falls within a specified range. |
|
|
Term
|
Definition
You use a unary minus sign preceding a value to make the value ____. |
|
|