click below
click below
Normal Size Small Size show me how
cis 377
Question | Answer |
---|---|
For defense in depth, a company must have multiple layers of security controls and safeguards. | true |
Guidelines ​are more detailed statements of what must be done to comply with policy. | false |
A__________ plan for the organization’s intended strategic efforts over the next several years | strategic |
What is the description of ISSP? | -addresses specific areas of technology -requires frequent updates -states organization's position on specific issue |
What is a description of SysSP? | -includes managerial guidance -implements ACL -maintains configuration rules policies |
Which is a technical control? | -Access control -Encryption -firewalls |
What a firewall can do? | full protect the network against virus |
Proxy server is used for what mode of firewall processing? | Application gateways |
What protocol is used for circuit gateway firewall? | SOCKS |
Which firewall use a state table to track connection between internal and external systems ? | Stateful inspection firewalls |
What is an example of intrusion? | -crack the passwords -launch virus -steal confidential data |
A(n) __________ is an event that triggers an alarm when no actual attack is in progress. | false attack stimulus |
What are descriptions of host-based IDPS? | -works on the principles of configuration -monitor CPU use -monitor the status of key system files |
what is a description of NIDS? | -requires sensors -collect source/destination IP addresses -monitors web or FPT server |
honeypot that has been protected so it cannot be easily compromised ? | -Padded cell |
__________ are encrypted messages that can be mathematically proven to be authentic. | digital signature |
Hash functions create a message digest by converting variable-length messages into binary | false |
The ______________ cipher simply rearranges the values within a block to create the ciphertext. | transportation |
Public key concept is used in which encryption? | asymmetric |
What are a components of PKI? | -CA -RA -certificates |