1. SMTP is associated with port ___.
  2. Running an application to see if a particular port is open is called a ___.
    port scan
  3. ___ is the most mathematically secure file encryption.
  4. Does RADIUS use L2TP?
  5. What is PAP?
    password authentication protocol
  6. What is EAP?
    extensible authentication protocol
  7. What is port 443?
  8. Is NTLM used for securing communication between a client and a server?
    Yes—a hashing algorithm authentication protocol from Microsoft
  9. Which kind of site can be online the quickest: a hot site or a mirrored site?
  10. When connecting safely from home to the corporate network, you should use ___.
  11. What should you consider when executing proper logging procedures?
    What information you need to reconstruct events, and the amount of disk space required.
  12. What is a potential security risk of USB drives?
    potential for software introduction
  13. The most relevant practice for protecting against OS security flaws is ___.
    patch management
  14. What is DLT?
    digital linear tape backup
  15. Is the “risk” of long-term retention of backup data on DLT (tape) media, mainly based on the retention of data on the media?
    No—it’s based on compatibility of media and application systems
  16. Is an attacker more likely to use a “Trojan” or a “rootkit” to hide tools to be used at a later date, after an attacker exploits your system?
  17. What’s a common problem you face when doing audit-log reviews?
    the timestamps for the different servers are not synchronized
  18. When you implement an IDS, the most important thing is ___.
    Having personnel to interpret the results
  19. How should you place the NIDS, if you want to know the types of attacks against the network perimeter?
    Place the NIDS outside the firewall
  20. Weak encryption is a problem with the ___ wireless protocol.
  21. What’s an example of a weak password?
  22. ___ can be used to gain control of a web camera.
    Active X component
  23. Key “types” refer to ___.
    Synchronous versus asynchronous. For example, Kerberos uses asynchronous.
  24. How do you reduce the “attack surface” on an OS.
    disable unused services
  25. To log-in remotely onto a workstation, port ___ is needed.
  26. What can MAC flooding do to a switch?
    Make it act like a hub
  27. Is HIDS an effective way to “harden” an OS?
  28. Is stegenography used to encrypt and decrypt messages in graphics?
  29. Can stegenography be used to hide messages in wave files?
  30. What’s the difference between RADIUS and TACACS?
    TACACS encrypts client-server negotiation dialog
  31. Pre-shared keys are used with ___.
  32. Are “disaster exercises” used in conducting risk assessments?
  33. With HIDS, does someone have to manually review the logs?
  34. If you find lots of viruses on numerous domain workstations, should you implement “centralized” antivirus or “decentralized” antivirus?
  35. What kind of attacks is SSLv2 susceptible to?
    man in the middle
  36. What allows for secure key exchange over an unsecured network without a pre-shared key?
  37. What should you do if you discover an unauthorized access point attached to the network?
    Unplug it
  38. What reduces effectiveness, when deploying and managing NIPS?
    encrypting all network traffic
  39. The DMZ is set up ___.
    Within the router
  40. Is “biometrics” a logical access control?
  41. Can S/MIME be used to create digital signatures?
  42. When using a digital signature, concerning “which key” the sender uses, there’s a difference between ___ versus ___.
    "encrypting with” versus “sent with"
  43. Is the “tunnel” created by L2TP encrypted?
  44. Is the “tunnel” created by PPTP encrypted?
  45. In physical security, ___ is an access control system which implements a non-trusted but secure zone immediately outside the secure zone?
    Man trap
  46. To see if multiple PCs are infected with zombies, you can use ___.
  47. ___ requires an update to the baseline, after installing new software on the system.
    behavior-based HIDS
  48. What prevents damage to evidence during forensic analysis?
    read-only drive connectors
  49. What is someone looking for when doing dumpster diving?
    Information that can be used in a subsequent attack
  50. What encryption algorithm deals with large prime numbers?
Card Set