Podcast
Questions and Answers
What is the primary purpose of Access Control?
What is the primary purpose of Access Control?
- To collect legitimate account names on a system
- To ensure resources are only granted to entitled users (correct)
- To execute program code embedded in web pages
- To monitor system activity for malicious behavior
What is an Access Control List (ACL)?
What is an Access Control List (ACL)?
- A security service that provides protection of system resources
- A task in Access Management that involves monitoring access
- A mechanism that implements access control for a system resource (correct)
- A type of virus that infects a system
What is the main function of an Access Control Service?
What is the main function of an Access Control Service?
- To maintain access information
- To collect legitimate account names on a system
- To provide protection of system resources against unauthorized access (correct)
- To execute program code embedded in web pages
What is the purpose of an Access Matrix?
What is the purpose of an Access Matrix?
What is ACK Piggybacking?
What is ACK Piggybacking?
What is the primary function of Activity Monitors?
What is the primary function of Activity Monitors?
What is the primary characteristic of a circuit-switched network?
What is the primary characteristic of a circuit-switched network?
What is the main purpose of a cloud computing system?
What is the main purpose of a cloud computing system?
Which type of disaster recovery site is the most expensive option?
Which type of disaster recovery site is the most expensive option?
What is the term for the unauthorized disclosure of information?
What is the term for the unauthorized disclosure of information?
What is the purpose of a Computer Emergency Response Team (CERT)?
What is the purpose of a Computer Emergency Response Team (CERT)?
What is the term for the process of exchanging data between an HTTP server and a client?
What is the term for the process of exchanging data between an HTTP server and a client?
What is the primary goal of a cost-benefit analysis in the context of security?
What is the primary goal of a cost-benefit analysis in the context of security?
What is the term for the threat action that undesirably alters system operation?
What is the term for the threat action that undesirably alters system operation?
What is the purpose of a client in a network?
What is the purpose of a client in a network?
What is the term for the process of detecting and responding to security incidents?
What is the term for the process of detecting and responding to security incidents?
What is the primary purpose of a Distance Vector?
What is the primary purpose of a Distance Vector?
What is Domain Hijacking?
What is Domain Hijacking?
What is the purpose of a Domain Name System (DNS)?
What is the purpose of a Domain Name System (DNS)?
What is Due Care?
What is Due Care?
What is the purpose of DumpSec?
What is the purpose of DumpSec?
What is the primary purpose of Dynamic Routing Protocols?
What is the primary purpose of Dynamic Routing Protocols?
What is Eavesdropping?
What is Eavesdropping?
What is the purpose of an Echo Request?
What is the purpose of an Echo Request?
What is the primary purpose of Egress Filtering?
What is the primary purpose of Egress Filtering?
What is a Domain in Windows NT and Windows 2000?
What is a Domain in Windows NT and Windows 2000?
What is the primary purpose of a firewall?
What is the primary purpose of a firewall?
What is the goal of flooding an attack?
What is the goal of flooding an attack?
What is a forest in the context of Active Directory?
What is a forest in the context of Active Directory?
What is the purpose of a fork bomb?
What is the purpose of a fork bomb?
What is the purpose of fingerprinting?
What is the purpose of fingerprinting?
Which protocol is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP)?
Which protocol is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP)?
What is the process of simultaneously sending the same message to multiple recipients?
What is the process of simultaneously sending the same message to multiple recipients?
What is a standard code of practice that provides guidance on how to secure an information system?
What is a standard code of practice that provides guidance on how to secure an information system?
What is a unit of data transmitted over an ATM network?
What is a unit of data transmitted over an ATM network?
What is a cryptographic algorithm for encryption and decryption?
What is a cryptographic algorithm for encryption and decryption?
What is a client computer program that can retrieve and display information from servers on the World Wide Web?
What is a client computer program that can retrieve and display information from servers on the World Wide Web?
What is the encrypted form of the message being sent?
What is the encrypted form of the message being sent?
What is a business plan that outlines emergency response, backup operations, and post-disaster recovery steps?
What is a business plan that outlines emergency response, backup operations, and post-disaster recovery steps?
What is a technique used to trick a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions?
What is a technique used to trick a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions?
What is a value that is computed by a function that is dependent on the contents of a data object and is stored or transmitted together with the object, for the purpose of detecting changes in the data?
What is a value that is computed by a function that is dependent on the contents of a data object and is stored or transmitted together with the object, for the purpose of detecting changes in the data?
What is the primary function of the Address Resolution Protocol (ARP)?
What is the primary function of the Address Resolution Protocol (ARP)?
What is the main characteristic of Asymmetric Cryptography?
What is the main characteristic of Asymmetric Cryptography?
What is the purpose of Auditing in the context of information security?
What is the purpose of Auditing in the context of information security?
What is the definition of Availability in the context of information security?
What is the definition of Availability in the context of information security?
What is the purpose of a Backdoor in the context of information security?
What is the purpose of a Backdoor in the context of information security?
What is the definition of Bandwidth in the context of information security?
What is the definition of Bandwidth in the context of information security?
What is the purpose of a Banner in the context of information security?
What is the purpose of a Banner in the context of information security?
What is the definition of Biometrics in the context of information security?
What is the definition of Biometrics in the context of information security?
What is the purpose of a Boot Record Infector?
What is the purpose of a Boot Record Infector?
What is the definition of Basic Authentication in the context of information security?
What is the definition of Basic Authentication in the context of information security?
What is the primary purpose of an Intrusion Prevention System (IPS)?
What is the primary purpose of an Intrusion Prevention System (IPS)?
What is the purpose of a covert channel?
What is the purpose of a covert channel?
What is crimineware?
What is crimineware?
What is the purpose of a cron job?
What is the purpose of a cron job?
What is the purpose of a crossover cable?
What is the purpose of a crossover cable?
What is cryptanalysis?
What is cryptanalysis?
What is the purpose of a cyclic redundancy check (CRC)?
What is the purpose of a cyclic redundancy check (CRC)?
What is a daemon?
What is a daemon?
What is data aggregation?
What is data aggregation?
What is the purpose of a data custodian?
What is the purpose of a data custodian?
What is the primary characteristic of a connectionless protocol?
What is the primary characteristic of a connectionless protocol?
What is the 'Day Zero' in the context of computer security?
What is the 'Day Zero' in the context of computer security?
What is the process of stripping off one layer's headers and passing the rest of the packet up to the next higher layer on the protocol stack?
What is the process of stripping off one layer's headers and passing the rest of the packet up to the next higher layer on the protocol stack?
What is the process of transforming an encrypted message into its original plaintext?
What is the process of transforming an encrypted message into its original plaintext?
What is the method of modifying the content of a website in such a way that it becomes 'vandalized' or embarrassing to the website owner?
What is the method of modifying the content of a website in such a way that it becomes 'vandalized' or embarrassing to the website owner?
What is the approach of using multiple layers of security to guard against failure of a single security component?
What is the approach of using multiple layers of security to guard against failure of a single security component?
What is a network area that sits between an organization's internal network and an external network, usually the Internet?
What is a network area that sits between an organization's internal network and an external network, usually the Internet?
What is an attack that tries all of the phrases or words in a dictionary, trying to crack a password or key?
What is an attack that tries all of the phrases or words in a dictionary, trying to crack a password or key?
What is a key agreement algorithm published in 1976 by Whitfield Diffie and Martin Hellman?
What is a key agreement algorithm published in 1976 by Whitfield Diffie and Martin Hellman?
What is an electronic 'credit card' that establishes your credentials when doing business or other transactions on the Web?
What is an electronic 'credit card' that establishes your credentials when doing business or other transactions on the Web?
What is the purpose of Emanations Analysis?
What is the purpose of Emanations Analysis?
What is the main characteristic of an Ephemeral Port?
What is the main characteristic of an Ephemeral Port?
What is the purpose of Escrow Passwords?
What is the purpose of Escrow Passwords?
What is the primary function of Ethernet?
What is the primary function of Ethernet?
What is the purpose of an Exponential Backoff Algorithm?
What is the purpose of an Exponential Backoff Algorithm?
What is the main characteristic of an Extended ACL?
What is the main characteristic of an Extended ACL?
What is the primary function of the File Transfer Protocol (FTP)?
What is the primary function of the File Transfer Protocol (FTP)?
What is the main purpose of a Filter in a network?
What is the main purpose of a Filter in a network?
What is the primary function of a Finger protocol?
What is the primary function of a Finger protocol?
What is an Event in a system or network?
What is an Event in a system or network?
What is the primary goal of flooding an attack?
What is the primary goal of flooding an attack?
What is the purpose of a forward lookup?
What is the purpose of a forward lookup?
What is the result of a fork bomb attack?
What is the result of a fork bomb attack?
What is the purpose of form-based authentication?
What is the purpose of form-based authentication?
What is the fragment offset field used for?
What is the fragment offset field used for?
What is the purpose of a forward proxy?
What is the purpose of a forward proxy?
What is the process of storing a data file in several chunks or fragments rather than in a single contiguous sequence of bits?
What is the process of storing a data file in several chunks or fragments rather than in a single contiguous sequence of bits?
What is a network point that acts as an entrance to another network?
What is a network point that acts as an entrance to another network?
What is a type of duplex communications channel that carries data in both directions at once?
What is a type of duplex communications channel that carries data in both directions at once?
What is a Unix-like operating system that comes with source code that can be copied, modified, and redistributed?
What is a Unix-like operating system that comes with source code that can be copied, modified, and redistributed?
What is an algorithm that computes a value based on a data object, thereby mapping the data object to a smaller data object?
What is an algorithm that computes a value based on a data object, thereby mapping the data object to a smaller data object?
What is a type of attack that seizes control of a previously established communication association?
What is a type of attack that seizes control of a previously established communication association?
What is a server name with a hostname followed by the full domain name?
What is a server name with a hostname followed by the full domain name?
What is a type of file sharing utility that acts as a server and client simultaneously?
What is a type of file sharing utility that acts as a server and client simultaneously?
What is the process of identifying and fixing vulnerabilities on a system?
What is the process of identifying and fixing vulnerabilities on a system?
What is a type of intrusion detection system that uses information from the operating system audit records to watch all operations occurring on the host?
What is a type of intrusion detection system that uses information from the operating system audit records to watch all operations occurring on the host?
What is the primary function of an HTTP Proxy?
What is the primary function of an HTTP Proxy?
What is the purpose of a Hybrid Attack?
What is the purpose of a Hybrid Attack?
What is the primary function of Incident Handling?
What is the primary function of Incident Handling?
What is the purpose of Ingress Filtering?
What is the purpose of Ingress Filtering?
What is the primary function of the Internet Control Message Protocol (ICMP)?
What is the primary function of the Internet Control Message Protocol (ICMP)?
What is the primary function of the Internet Message Access Protocol (IMAP)?
What is the primary function of the Internet Message Access Protocol (IMAP)?
What is the purpose of Integrity in the context of information security?
What is the purpose of Integrity in the context of information security?
What is the primary function of a Hub?
What is the primary function of a Hub?
What is the purpose of a Hybrid Encryption?
What is the purpose of a Hybrid Encryption?
What is the purpose of Information Warfare?
What is the purpose of Information Warfare?
What is the purpose of L2TP?
What is the purpose of L2TP?
What is the principle of allowing users the least amount of permissions necessary to perform their intended function?
What is the principle of allowing users the least amount of permissions necessary to perform their intended function?
What is a type of attack in which one system entity illegitimately poses as another entity?
What is a type of attack in which one system entity illegitimately poses as another entity?
What is the process of selectively removing log entries from a system log to hide a compromise?
What is the process of selectively removing log entries from a system log to hide a compromise?
What is a software protocol for enabling anyone to locate organizations and individuals in a network?
What is a software protocol for enabling anyone to locate organizations and individuals in a network?
What is a type of cyber attack in which the attacker intercepts and relays messages between two parties?
What is a type of cyber attack in which the attacker intercepts and relays messages between two parties?
What is a one-way cryptographic hash function?
What is a one-way cryptographic hash function?
What is the term for the ability to attack or defend within an Internet environment?
What is the term for the ability to attack or defend within an Internet environment?
What is the purpose of NAT?
What is the purpose of NAT?
What is a type of program that executes when a certain predefined event occurs?
What is a type of program that executes when a certain predefined event occurs?
What is the primary function of IP Forwarding?
What is the primary function of IP Forwarding?
What is the purpose of an Intranet?
What is the purpose of an Intranet?
What is Intrusion Detection?
What is Intrusion Detection?
What is an IP Address?
What is an IP Address?
What is IP Spoofing?
What is IP Spoofing?
What is the main purpose of NAT in a home or small business network?
What is the main purpose of NAT in a home or small business network?
What is ISO?
What is ISO?
What is a Netmask?
What is a Netmask?
What is an Issue-Specific Policy?
What is an Issue-Specific Policy?
What is Network-Based IDS?
What is Network-Based IDS?
What is Jitter?
What is Jitter?
What is the purpose of Non-Repudiation?
What is the purpose of Non-Repudiation?
What is a Jump Bag?
What is a Jump Bag?
What is an Octet?
What is an Octet?
What is the primary function of the Kernel?
What is the primary function of the Kernel?
What is One-Way Encryption?
What is One-Way Encryption?
What is the purpose of a Null Session?
What is the purpose of a Null Session?
What is Network Mapping?
What is Network Mapping?
What is Network Taps?
What is Network Taps?
What is Non-Printable Character?
What is Non-Printable Character?
What is the primary function of the network layer in the OSI model?
What is the primary function of the network layer in the OSI model?
What is the purpose of the OSI model?
What is the purpose of the OSI model?
What is the main idea behind the OSI model?
What is the main idea behind the OSI model?
What is the application layer responsible for in the OSI model?
What is the application layer responsible for in the OSI model?
What is the presentation layer responsible for in the OSI model?
What is the presentation layer responsible for in the OSI model?
What is the transport layer responsible for in the OSI model?
What is the transport layer responsible for in the OSI model?
What is the session layer responsible for in the OSI model?
What is the session layer responsible for in the OSI model?
What is the primary function of OSPF?
What is the primary function of OSPF?
What is the characteristic of a one-way function?
What is the characteristic of a one-way function?
What is the advantage of the OSI model?
What is the advantage of the OSI model?
What is the primary function of the data-link layer?
What is the primary function of the data-link layer?
What is the main purpose of a packet in a packet-switched network?
What is the main purpose of a packet in a packet-switched network?
What is the goal of password sniffing?
What is the goal of password sniffing?
What is pharming?
What is pharming?
What is the primary function of a personal firewall?
What is the primary function of a personal firewall?
What is the purpose of a patch?
What is the purpose of a patch?
What is the term for the actual application data a packet contains?
What is the term for the actual application data a packet contains?
What is the purpose of penetration testing?
What is the purpose of penetration testing?
What is phishing?
What is phishing?
What is the purpose of a ping scan?
What is the purpose of a ping scan?
What is the main purpose of Point-to-Point Tunneling Protocol (PPTP)?
What is the main purpose of Point-to-Point Tunneling Protocol (PPTP)?
What is the effect of poison reverse in routing updates?
What is the effect of poison reverse in routing updates?
What is polyinstantiation?
What is polyinstantiation?
What is the purpose of a port scan?
What is the purpose of a port scan?
What is possession in the context of information security?
What is possession in the context of information security?
What is polymorphism in the context of malicious software?
What is polymorphism in the context of malicious software?
What is the primary function of a Post Office Protocol, Version 3 (POP3)?
What is the primary function of a Post Office Protocol, Version 3 (POP3)?
What is the purpose of a preamble in network communications?
What is the purpose of a preamble in network communications?
What is the term for the address ranges set aside for use by private or non-Internet connected networks?
What is the term for the address ranges set aside for use by private or non-Internet connected networks?
What type of malware attaches itself to existing program files?
What type of malware attaches itself to existing program files?
What is the purpose of a Promiscuous Mode?
What is the purpose of a Promiscuous Mode?
What is the definition of a Protocol?
What is the definition of a Protocol?
What is the primary purpose of Public-Key Forward Secrecy?
What is the primary purpose of Public-Key Forward Secrecy?
What is the primary purpose of a Ransomware?
What is the primary purpose of a Ransomware?
What is the purpose of a Public Key Infrastructure (PKI)?
What is the purpose of a Public Key Infrastructure (PKI)?
What is the primary function of a Proxy Server?
What is the primary function of a Proxy Server?
What is the primary purpose of a Reconnaissance?
What is the primary purpose of a Reconnaissance?
What is the primary purpose of Reflexive ACLs?
What is the primary purpose of Reflexive ACLs?
What is the term for a program that executes when a certain predefined event occurs?
What is the term for a program that executes when a certain predefined event occurs?
What is the purpose of a Private Addressing?
What is the purpose of a Private Addressing?
What is the primary purpose of Radiation Monitoring?
What is the primary purpose of Radiation Monitoring?
What is the primary purpose of a Response?
What is the primary purpose of a Response?
What is the primary purpose of Reverse Engineering?
What is the primary purpose of Reverse Engineering?
What is the primary purpose of Risk Assessment?
What is the primary purpose of Risk Assessment?
What is the primary purpose of RARP?
What is the primary purpose of RARP?
What is the primary purpose of RSA?
What is the primary purpose of RSA?
What is the purpose of Role-Based Access Control?
What is the purpose of Role-Based Access Control?
What is a Router used for?
What is a Router used for?
What is a security mechanism that uses a cryptographic hash function?
What is a security mechanism that uses a cryptographic hash function?
What is the purpose of Secure Electronic Transactions (SET)?
What is the purpose of Secure Electronic Transactions (SET)?
What is the purpose of a Server?
What is the purpose of a Server?
What is a Segment?
What is a Segment?
What is Sensitive Information?
What is Sensitive Information?
What is a Session?
What is a Session?
What is a Session Key?
What is a Session Key?
What is a Share?
What is a Share?
What is the primary function of the Transmission Control Protocol (TCP)?
What is the primary function of the Transmission Control Protocol (TCP)?
What is the purpose of Trunking in computer networks?
What is the purpose of Trunking in computer networks?
What is the primary function of the User Datagram Protocol (UDP)?
What is the primary function of the User Datagram Protocol (UDP)?
What is the purpose of a Tunnel in computer networks?
What is the purpose of a Tunnel in computer networks?
What is the primary function of the Uniform Resource Locator (URL)?
What is the primary function of the Uniform Resource Locator (URL)?
What is the purpose of Trust in computer networks?
What is the purpose of Trust in computer networks?
What is the primary function of the Transport Layer Security (TLS) protocol?
What is the primary function of the Transport Layer Security (TLS) protocol?
What is the purpose of a Trojan Horse in computer networks?
What is the purpose of a Trojan Horse in computer networks?
What is the primary function of the Traceroute tool?
What is the primary function of the Traceroute tool?
What is the purpose of Unicast in computer networks?
What is the purpose of Unicast in computer networks?
What is the primary function of a shell in a Unix system?
What is the primary function of a shell in a Unix system?
What is the term for gaining indirect knowledge of communicated data by monitoring signals?
What is the term for gaining indirect knowledge of communicated data by monitoring signals?
What is the purpose of a smartcard?
What is the purpose of a smartcard?
What is the term for a fraudulent message sent over SMS, similar to phishing?
What is the term for a fraudulent message sent over SMS, similar to phishing?
What is the purpose of a sniffer?
What is the purpose of a sniffer?
What is the primary function of a socket?
What is the primary function of a socket?
What is the term for a protocol that a proxy server can use to accept requests from client users?
What is the term for a protocol that a proxy server can use to accept requests from client users?
What is the purpose of a source port?
What is the purpose of a source port?
What is the term for a cryptographic key that is divided into two or more separate data items?
What is the term for a cryptographic key that is divided into two or more separate data items?
What is the purpose of a standard ACL on a Cisco router?
What is the purpose of a standard ACL on a Cisco router?
What is the primary function of a switch in a network?
What is the primary function of a switch in a network?
What is the purpose of a subnet mask?
What is the purpose of a subnet mask?
What is the term for methods of hiding the existence of a message or other data?
What is the term for methods of hiding the existence of a message or other data?
What is the primary function of a stateful inspection firewall?
What is the primary function of a stateful inspection firewall?
What is the purpose of a static host table?
What is the purpose of a static host table?
What is the term for a network that provides switched communications service?
What is the term for a network that provides switched communications service?
What is the primary function of syslog in Unix systems?
What is the primary function of syslog in Unix systems?
What is the term for a type of cipher that works by encrypting a message a single bit, byte, or computer word at a time?
What is the term for a type of cipher that works by encrypting a message a single bit, byte, or computer word at a time?
What is the primary function of a subnet in a network?
What is the primary function of a subnet in a network?
What is the term for a type of attack that sends a host more TCP SYN packets than the protocol implementation can handle?
What is the term for a type of attack that sends a host more TCP SYN packets than the protocol implementation can handle?
What is a person responsible for enforcement or administration of the security policy that applies to a system?
What is a person responsible for enforcement or administration of the security policy that applies to a system?
What type of policy is written for a specific system or device?
What type of policy is written for a specific system or device?
What is the purpose of TCP Wrapper?
What is the purpose of TCP Wrapper?
What is the term for a potential for violation of security?
What is the term for a potential for violation of security?
What is a TCP-based, application-layer, Internet Standard protocol for remote login from one host to another?
What is a TCP-based, application-layer, Internet Standard protocol for remote login from one host to another?
What is the geometric arrangement of a computer system?
What is the geometric arrangement of a computer system?
What is a token-based device that requires a user to have a token with them when they log in?
What is a token-based device that requires a user to have a token with them when they log in?
What is the purpose of a threat assessment?
What is the purpose of a threat assessment?
What is the name of the protocol analyzer for Unix that can monitor network traffic on a wire?
What is the name of the protocol analyzer for Unix that can monitor network traffic on a wire?
What is the term for a potential to cause harm to a system?
What is the term for a potential to cause harm to a system?
What is a Virtual Private Network (VPN)?
What is a Virtual Private Network (VPN)?
What is a characteristic of a virus in computer software?
What is a characteristic of a virus in computer software?
What is vishing?
What is vishing?
What is a benefit of using a VPN?
What is a benefit of using a VPN?
What is the purpose of encryption in a VPN?
What is the purpose of encryption in a VPN?
What is a common use case for a VPN?
What is a common use case for a VPN?
What is the primary function of a Voice Firewall?
What is the primary function of a Voice Firewall?
What is the purpose of a War Dialer?
What is the purpose of a War Dialer?
What is the primary function of a Windowing System?
What is the primary function of a Windowing System?
What is the purpose of WHOIS?
What is the purpose of WHOIS?
What is the main function of a Web Server?
What is the main function of a Web Server?
What is the primary function of War Chalking?
What is the primary function of War Chalking?
What is the purpose of Windump?
What is the purpose of Windump?
What is the primary function of a Worm?
What is the primary function of a Worm?
What is the primary function of a Zero-Day Attack?
What is the primary function of a Zero-Day Attack?
What is the primary function of WEP?
What is the primary function of WEP?