Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Sec+

Security + Flash Cards

QuestionAnswer
U are preparing to deploy an Web site. The Web site uses dynamically generated Web pages based on user input. This is a requirement for the application running on the site. U need to design the site to prevent cross-site scripting attacks. U need to choos Implement user input validation.
You discover that when network users attempt to navigate to your company's public Web site, they are being redirected to a different Web site. This is an example of what type of attack? DNS poisoning
You are designing network access control so that remote users are limited to accessing the network during normal business hours only. Policies regarding user access apply to all users. This is an example of what type of access control? Rule-based access control
A HIDS that recognizes possible attacks by monitoring attempts to make unauthorized changes to files is an example of what kind of monitoring methodology? Behavior-based
What protocol is used to encrypt e-mail messages for transmission and delivery? Secure Multipurpose Internet Mail Extension (S/MIME)
You want to create a document that describes what types of things employees are permitted to do regarding e-mail and Web usage. Acceptable use policy
You are looking for ways to protect data on a network. Your solution should: * Provide for easy backup of all user data. * Minimize risk of physical data theft. Use file servers attached to an NAS system. Lock the file servers and NAS in a secure area.
Which solution should you use? * Minimize the impact of the failure of any one file server.
You suspect that an attacker is sending damaged packets into your network as a way to compromise your firewall. You need collect as much information about network traffic as possible. What should you use? Protocol analyzer
You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use? You should use the mandatory access control (MAC) model.
You need to determine if intermittent spikes in network activity are related to an attempt to breach the network. You need to identify exactly when the activity is occurring and what type of traffic is causing the activity. What should you do? Use a protocol analyzer.
Why should you require the sender to digitally sign sensitive e-mail messages? To provide for nonrepudiation. To validate the sender.
Which environmental control is part of TEMPEST compliance? Shielding
Your office is TEMPEST-compliant. This prevents what potential risk? Using a cell phone to access unauthorized Web sites.
What should you do first if you discover a rogue AP on your LAN? Immediately disconnect the rogue AP from your network.
The process of logging onto a network with a user name and password is an example of which of the following? Authentication
Your network is protected from the Internet by a firewall. You are concerned about potential risks in the firewall protection. What should you do? Scan the firewall's incoming ports with a port scanner.
In a PKI system, what is the role of a private key? Data decryption
Your network administrator backs up the server by using an incremental backup strategy. He uses 7 tapes, one tape per day, and he performs the backup at the end of each business day. He does a full backup on Friday and Tuesday and an incremental on the ot 2
You need to encrypt the contents of a USB flash drive. Which type of encryption should you use? Advanced Encryption Standard (AES) is a symmetric key encryption algorithm.
Created by: mylovelybekah
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards