Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Security + Flash Cards

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
U are preparing to deploy an Web site. The Web site uses dynamically generated Web pages based on user input. This is a requirement for the application running on the site. U need to design the site to prevent cross-site scripting attacks. U need to choos   Implement user input validation.  
🗑
You discover that when network users attempt to navigate to your company's public Web site, they are being redirected to a different Web site. This is an example of what type of attack?   DNS poisoning  
🗑
You are designing network access control so that remote users are limited to accessing the network during normal business hours only. Policies regarding user access apply to all users. This is an example of what type of access control?   Rule-based access control  
🗑
A HIDS that recognizes possible attacks by monitoring attempts to make unauthorized changes to files is an example of what kind of monitoring methodology?   Behavior-based  
🗑
What protocol is used to encrypt e-mail messages for transmission and delivery?   Secure Multipurpose Internet Mail Extension (S/MIME)  
🗑
You want to create a document that describes what types of things employees are permitted to do regarding e-mail and Web usage.   Acceptable use policy  
🗑
You are looking for ways to protect data on a network. Your solution should: * Provide for easy backup of all user data. * Minimize risk of physical data theft.   Use file servers attached to an NAS system. Lock the file servers and NAS in a secure area.  
🗑
Which solution should you use?   * Minimize the impact of the failure of any one file server.  
🗑
You suspect that an attacker is sending damaged packets into your network as a way to compromise your firewall. You need collect as much information about network traffic as possible. What should you use?   Protocol analyzer  
🗑
You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?   You should use the mandatory access control (MAC) model.  
🗑
You need to determine if intermittent spikes in network activity are related to an attempt to breach the network. You need to identify exactly when the activity is occurring and what type of traffic is causing the activity. What should you do?   Use a protocol analyzer.  
🗑
Why should you require the sender to digitally sign sensitive e-mail messages?   To provide for nonrepudiation. To validate the sender.  
🗑
Which environmental control is part of TEMPEST compliance?   Shielding  
🗑
Your office is TEMPEST-compliant. This prevents what potential risk?   Using a cell phone to access unauthorized Web sites.  
🗑
What should you do first if you discover a rogue AP on your LAN?   Immediately disconnect the rogue AP from your network.  
🗑
The process of logging onto a network with a user name and password is an example of which of the following?   Authentication  
🗑
Your network is protected from the Internet by a firewall. You are concerned about potential risks in the firewall protection. What should you do?   Scan the firewall's incoming ports with a port scanner.  
🗑
In a PKI system, what is the role of a private key?   Data decryption  
🗑
Your network administrator backs up the server by using an incremental backup strategy. He uses 7 tapes, one tape per day, and he performs the backup at the end of each business day. He does a full backup on Friday and Tuesday and an incremental on the ot   2  
🗑
You need to encrypt the contents of a USB flash drive. Which type of encryption should you use?   Advanced Encryption Standard (AES) is a symmetric key encryption algorithm.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: mylovelybekah
Popular Computers sets