Which of the following reviews system and event logs to detect attacks on the host and determine if the attack was successful?
Who is responsible for providing reports to the senior management on the effectiveness of the security controls?
Which of the following usually provides reliable, real-time information without consuming network or host resources?
Which of the following devices enables more than one signal to be sent out simultaneously over one physical circuit?
Which of the following service is a distributed database that translate host name to IP address to IP address to host name?
A timely review of system access audit records would be an example of which of the basic security functions?
Which of the following is a disadvantage of a statistical anomaly-based intrusion detection system?
In what way can violation clipping levels assist in violation tracking and analysis?
Which of the following would assist the most in Host Based intrusion detection?
Which layer of the OSI/ISO model handles physical addressing, network topology, line discipline, error notification, orderly delivery of frames, and optional flow control?
Which of the following is an extension to Network Address Translation that permits multiple devices providing services on a local area network (LAN) to be mapped to a single public IP address?
Which of the following is a device that is used to regenerate or replicate the received signals?
Which of the following are additional terms used to describe knowledge-based IDS and behavior-based IDS?
What would be considered the biggest drawback of Host-based Intrusion Detection systems (HIDS)?
Who can best decide what are the adequate technical security controls in a computer-based application system in regards to the protection of the data being used, the criticality of the data, and it's sensitivity level ?
Which of the following is NOT a characteristic of a host-based intrusion detection system?
Examples of types of physical access controls include all EXCEPT which of the following?
Rule-Based Access Control (RuBAC) access is determined by rules. Such rules would fit within what category of access control ?
An attack initiated by an entity that is authorized to access system resources but uses them in a way not approved by those who granted the authorization is known as a(n):
In response to Access-request from a client such as a Network Access Server (NAS), which of the following is not one of the response from a RADIUS Server?
Which of the following is a trusted, third party authentication protocol that was developed under Project Athena at MIT?
What is called the percentage at which the False Rejection Rate equals the False Acceptance Rate?
Which of the following was developed to address some of the weaknesses in Kerberos and uses public key cryptography for the distribution of secret keys and provides additional access control support?
In the context of access control, locks, gates, guards are examples of which of the following?
Controlling access to information systems and associated networks is necessary for the preservation of their:
There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side, Kerberos tickets correspond most closely to which of the following?
What is called a sequence of characters that is usually longer than the allotted number for a password?
Which of the following can be defined as a framework that supports multiple, optional authentication mechanisms for PPP, including cleartext passwords, challenge-response, and arbitrary dialog sequences?
Which one of the following authentication mechanisms creates a problem for mobile users?
To control access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up:
Which of the following access control models introduces user security clearance and data classification?
Compared to RSA, which of the following is true of Elliptic Curve Cryptography(ECC)?
What level of assurance for a digital certificate verifies a user's name, address, social security number, and other information against a credit bureau database?
What is the name of a one way transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string? Such a transformation cannot be reversed?
Which of the following elements is NOT included in a Public Key Infrastructure (PKI)?
Complete the blanks. When using PKI, I digitally sign a message using my ______ key. The recipient verifies my signature using my ______ key.
Which of the following can best be defined as a key distribution protocol that uses hybrid encryption to convey session keys. This protocol establishes a long-term key once, and then requires no prior communication in order to establish or exchange keys on a session-by-session basis?
What is the name for a substitution cipher that shifts the alphabet by 13 places?
What principle focuses on the uniqueness of separate objects that must be joined together to perform a task? It is sometimes referred to as “what each must bring” and joined together when getting access or decrypting a file. Each of which does not reveal the other?
Which of the following ciphers is a subset on which the Vigenere polyalphabetic cipher was based on?
Which of the following is NOT a known type of Message Authentication Code (MAC)?
Public Key Infrastructure (PKI) uses asymmetric key encryption between parties. The originator encrypts information using the intended recipient's "public" key in order to get confidentiality of the data being sent. The recipients use their own "private" key to decrypt the information. The "Infrastructure" of this methodology ensures that:
What is the maximum number of different keys that can be used when encrypting with Triple DES?
Why is infrared generally considered to be more secure to eavesdropping than multidirectional radio transmissions?
A circuit level proxy is ___________________ when compared to an application level proxy.
Which of the following would be used to detect and correct errors so that integrity and confidentiality of transactions over networks may be maintained while preventing unauthorize interception of the traffic?
What is called the access protection system that limits connections by calling back the number of a previously authorized location?
Which of the following countermeasures would be the most appropriate to prevent possible intrusion or damage from wardialing attacks?
If any server in the cluster crashes, processing continues transparently, however, the cluster suffers some performance degradation. This implementation is sometimes called a:
Which of the following is a method of multiplexing data where a communication channel is divided into an arbitrary number of variable bit-rate digital channels or data streams. This method allocates bandwidth dynamically to physical channels having information to transmit?
Within the OSI model, at what layer are some of the SLIP, CSLIP, PPP control functions provided?
In telephony different types of connections are being used. The connection from the phone company's branch office to local customers is referred to as which of the following choices?
What is the proper term to refer to a single unit of Ethernet data at the link layer of the DoD TCP model ?
Packet Filtering Firewalls examines both the source and destination address of the:
Each data packet is assigned the IP address of the sender and the IP address of the:
Related to information security, confidentiality is the opposite of which of the following?
Which of the following is the act of performing tests and evaluations to test a system's security level to see if it complies with the design specifications and security requirements?
What security problem is most likely to exist if an operating system permits objects to be used sequentially by multiple users without forcing a refresh of the objects?
Which of the following is commonly used for retrofitting multilevel security to a database management system?
Which of the following is an unintended communication path that is NOT protected by the system's normal security mechanisms?
A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?
Which expert system operating mode allows determining if a given hypothesis is valid?
Making sure that only those who are supposed to access the data can access is which of the following?
Who is responsible for initiating corrective measures and capabilities used when there are security violations?
Which of the following BEST explains why computerized information systems frequently fail to meet the needs of users?
When backing up an applications system's data, which of the following is a key question to be answered first?
Which of the following security mode of operation does NOT require all users to have the clearance for all information processed on the system?
Which of the following rules is least likely to support the concept of least privilege?
One of the following assertions is NOT a characteristic of Internet Protocol Security (IPsec)
What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds into his own bank account?
Which virus category has the capability of changing its own code, making it harder to detect by anti-virus software?
In computing what is the name of a non-self-replicating type of malware program containing malicious code that appears to have some useful purpose but also contains code that has a malicious or harmful purpose imbedded in it, when executed, carries out actions that are unknown to the person installing it, typically causing loss or theft of data, and possible system harm.
Which of the following technologies is a target of XSS or CSS (Cross-Site Scripting) attacks?
Virus scanning and content inspection of SMIME encrypted e-mail without doing any further processing is:
Which of the following virus types changes some of its characteristics as it spreads?
The high availability of multiple all-inclusive, easy-to-use hacking tools that do NOT require much technical knowledge has brought a growth in the number of which type of attackers?
Which backup method is used if backup time is critical and tape space is at an extreme premium?
Under the principle of culpable negligence, executives can be held liable for losses that result from computer system breaches if:
Which of the following backup method must be made regardless of whether Differential or Incremental methods are used?
Which of the following computer recovery sites is only partially equipped with processing equipment?
What is called an exception to the search warrant requirement that allows an officer to conduct a search without having the warrant in-hand if probable cause is present and destruction of the evidence is deemed imminent?
What is called an event or activity that has the potential to cause harm to the information systems or networks?
Contracts and agreements are often times unenforceable or hard to enforce in which of the following alternate facility recovery agreement?
Which of the following could be BEST defined as the likelihood of a threat agent taking advantage of a vulnerability?