100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ISSC 262 MidTerm Exam 2024 Questions and Answers

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
04-07-2024
Written in
2023/2024

A person skilled in attacking computer systems, who uses those skills as a security expert to help protect systems, is a: - ANS white-hat hacker AUP stands for? - ANS Acceptable Use Policy CIA properties do not include: - ANS authentication What is a worm? - ANS malware When you analyze a system using the six-phase security process, you are performing a: - ANS risk assessment This yields a more specific set of attacks tied to our particular threat agents. - ANS Attack Matrix An attempt by a threat agent to exploit assets without permission is referred to as: - ANS an attack A security analyst is performing a security assessment. The analyst should not: - ANS take actions to mitigate a serious risk Zero Day vulnerability is one that has been reported to the software's vendor and the general public. - ANS False Victims can protect themselves against zero-day attacks. - ANS False There are three types of tokens; they do not include which? - ANS Offensive tokens The most recent listed hash algorithm is what? - ANS SHA-512 The following risks are associated with a weak threat except. - ANS Shoulder surfing Simple trial and error password guessing Searching for a written password (All) The following are fundamental strategies for authenticating people on computer systems except: - ANS something you make In a password system, the total number of possible passwords is called the: - ANS search space Hashing: - ANS transforms readable text into gibberish Authentication does what: - ANS Associates an individual with an identity An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of: - ANS two-factor authentication An attack that blocks access to a system by other users is called: - ANS denial of service An attack in which someone tries to trick a system administrator into divulging a password is called: - ANS social engineering Encryption protects information by presenting a - ANS Key An encryption algorithm that uses the same key for both encryption and decryption is: - ANS symmetric AES was introduced in what year? - ANS 2002 The Enigma was: - ANS a rotor machine The type of cipher that rearranges the text of a message is called: - ANS transposition Moore's Law observed that computing power for doubled every; - ANS 18 Months The process of decrypting a code is - ANS Cryptanalysis File encryption on the computer's hard drive involves what risk? - ANS Access to low-level data written to the hard drive Access by a Trojan Horse Access by a separately booted OS (All) Hiding an object, such as a diary, to prevent others from finding it is an example of: - ANS cryptography To use symmetric cryptography, the sender and receiver must share: - ANS a secret key SHA-1 produces a(n) ____-bit message digest, which can then be used as an input to a digital signature algorithm. - ANS 160 PGP implemented a _______________ making it so that no single person was universally trusted to sign certificates. - ANS Web of trust In a Diffie-Hellman calculation using P = g^s mod N, s, is: the unique public value computer from the private key - ANS the private key value Digital signatures are often used to provide: - ANS none of the answers (nonrepudiation, protection against denial of service attacks, file availability) Using the Diffie-Hellman algorithm: - ANS both participants in the exchange must have a public/private key pair A public-key certificate generally does not contain: - ANS a private key The method used to encrypt a with multiple ciphers is called? - ANS KEK (Key Encrypted Key) What was the first web browser to use public key certificates? - ANS Netscape Navigator Encrypting an encryption key using a passphrase is called: - ANS key wrapping An Advanced Encryption Standard (AES) key may not be: - ANS 16 bits in length All of the following are types of switching except: - ANS Package switching A rootkit is: - ANS software that hides on a computer and provides a back door for an attacker An advantage of packet switching is: - ANS parallel transmission Another term for "maximum data rate" is: - ANS bandwidth In a wireless transmission, a host first sends a: - ANS a RTS message (Request to Send) Primary forms of Ethernet media include the following except: - ANS nano The OSI network model has how many layers? - ANS 7 The following is part of the networks protocol stack - ANS Transport Layer Link Layer (Both) To launch a distributed denial of service (DDOS) attack, an attacker often uses: - ANS a botnet To see a list of MAC addresses on a Windows-based network: - ANS go to System Preferences in the Windows graphical user interface - is an example of: - ANS a binary network mask 192.168.1.1 is an example of: - ANS an IPv4 address A disadvantage of a mesh network is: - ANS congestion A disadvantage of a star network is: - ANS broadcasting The well-known port number 80 is used for: - ANS World Wide Web (WWW) The element that automatically assigns IP addresses to LAN hosts is: - ANS Dynamic Host Configuration Protocol (DHCP) A disadvantage of a tree network is: - ANS address-based size limits A disadvantage of a point-to-point network is: - ANS no broadcasting A tool that captures packets on a network and helps you analyze the packets is: - ANS Wireshark Modern internet technology evolved from research on: - ANS the ARPANET An attack that forges the sender's IP address is called: - ANS an IP spoofing attack Identify which of the following is NOT a TCP/IP Attack: - ANS SQL Injection Identify which of the following is NOT a way attackers have exploited protocols to perform three general types attacks: - ANS Compromise a data center Issuing the nslookup command along with a domain name displays: - ANS the corresponding IP address Major contents of a TCP packet include all of the following "except": - ANS Physical layer On the Internet, the entity that looks up a domain name and retrieves information about it is the: - ANS Domain Name System (DNS) Packet filtering looks at any packet header and filters on these values except: - ANS number of addresses The three-way handshake consists of 4 packets. 1. SYN, 2. SYN and ACK, 3. ACK, 4: - ANS FIN The whois database provides the following information except: - ANS the annual cost to rent the domain name To resolve a domain name on the Internet, the DNS resolver first contacts: - ANS the root DNS server A decision to trust someone in a particularly delicate or sensitive capacity, particularly in government or intelligence organizations. - ANS Clearance The phases of a large-scale attack on an enterprise network or systems include the following except: - ANS mitigation What are the strategies for reducing the risks of insider threats? - ANS Monitoring Two-person or multiperson control Job Rotation (All) What are the general risks of an Enterprise? - ANS Masquerade and Subversion Disclosure Service loss and physical theft (All) Two-person or multiperson control in important transactions helps to reduce the risk of: - ANS insider threats The three-phase process when working with security-critical assets: - ANS Planning, implementation, deployment Rules that restrict certain types of information to specific groups within a company are categorized as: - ANS need to know Is a division, department, or other component that makes money for the company. - ANS Profit center/cost center Information security professionals play a variety of roles in enterprise security. These roles are: - ANS Implementers Auditors Forensic investigators Analysis (All) An outside party verifies that the enterprise follows particular procedures. - ANS Compliance audits Encapsulating Security Payload (ESP) does not work with: - ANS network address translation (NAT) In an SSL data packet, the field that indicates whether the packet carries data, an alert message, or is negotiating the encryption key is: - ANS Content type Secure Sockets Layer (SSL) has been replaced by: - ANS Transport Layer Security (TLS) Virtual private networking is used primarily for encrypting: - ANS a connection between two sites across the Internet We use cryptography to apply the following protections to network traffic "Except": - ANS Reliability The protocol that establishes security associations (SAs) between a pair of hosts is: - ANS Internet Key Exchange (IKE) Secure Sockets Layer (SSL): - ANS may display a padlock on a Web page to indicate SSL protection The latest protocol that effectively protects 802.11 wireless traffic across a LAN is: - ANS Wi-Fi Protected Access, version 2 (WPA2) The different crypto solutions prevent sniffing and eavesdropping in accordance with their security boundaries. The general boundaries fall into three categories: 1. Outsiders—eavesdropping on our wireless LAN traffic from outside our security boundary 2. Other Internet users—eavesdroppers who manage to eavesdrop on the general Internet traffic, possibly including packets of ours - ANS Other LAN users—eavesdropping by other people sharing our LAN To provide both encryption and integrity protection, WPA2 uses AES encryption with: - ANS CCM mode A security clearance may be refused if: - ANS both the applicant has participated in illegal activities and the applicant lies during the assessment process Additional classification controls such as sensitive compartmental information (SCI) are assigned to programs or data classified as: - ANS above Top Secret In a security classification system, the level at which disclosure of information could cause exceptionally grave damage is: - ANS Top Secret TEMPEST is a code word assigned by the NSA to: - ANS unintended data emanations The earliest form of electronic keying was - ANS over-the-air-rekeying. The third part ("Title III") of the 2002 E-Government Act is called the - ANS FISMA In TEMPEST which countermeasure Adjust the device so that it uses less power and radiates a weaker signal. In some cases, we must redesign the equipment to reduce its emanations without reducing its effectiveness. - ANS Attenuation A black program: - ANS Isn't officially acknowledged by the DOD In a security classification system, NOFORN meAnswer: - ANS no foreign distribution In a security classification system, a document labeled ORCON is controlled by: - ANS the originator

Show more Read less
Institution
ISSC 262
Course
ISSC 262









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISSC 262
Course
ISSC 262

Document information

Uploaded on
July 4, 2024
Number of pages
7
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.19
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
CalebSTUVIA
3.0
(2)

Get to know the seller

Seller avatar
CalebSTUVIA Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
5
Member since
1 year
Number of followers
2
Documents
139
Last sold
1 week ago
Caleb's STUVIA

3.0

2 reviews

5
0
4
0
3
2
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions