| |
|The most damaging of the denial of service attacks can be a _______________ attacks, where an attacker uses zombie software distributed |
|over several machines |
| |
| |
|[pic] |
|Bot |
| |
| |
|[pic] |
|Distributed denial of service |
| |
| |
|[pic] |
|Zombie |
| |
| |
|[pic] |
|Discrete denial of service |
| |
| |
| |
|_____ is a standard for encrypting and digitally signing electronic mail that contains attachments and for offering secure data |
|transmissions. |
| |
| |
|[pic] |
|Secure MIME |
| |
| |
|[pic] |
|HTTPS |
| |
| |
|[pic] |
|SSH |
| |
| |
|[pic] |
|SSL |
| |
| |
| |
|A ___________ is a private network of computers that uses the public Internet to connect some nodes. |
| |
| |
|[pic] |
|UseNet |
| |
| |
|[pic] |
|FINNet |
| |
| |
|[pic] |
|Routing Table |
| |
| |
|[pic] |
|VPN |
| |
| |
| |
|_________________ is the existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event |
|compromising the security of the system, network, application, or protocol involved. |
| |
| |
|[pic] |
|Attack |
| |
| |
|[pic] |
|Patch |
| |
| |
|[pic] |
|Vulnerability |
| |
| |
| |
|[pic] |
|An ______________is a person who can investigate on a particular case, evaluate all findings, and educate the jury about his findings. |
| |
| |
|[pic] |
|Expert witness |
| |
| |
|[pic] |
|Jury Member |
| |
| |
|[pic] |
|Court Reporter |
| |
| |
|[pic] |
|Crime Reporter |
| |
| |
| |
|____________ is used to describe those hackers who use their computer skills with malicious intent for illegal purposes or nefarious |
|activities |
| |
| |
|[pic] |
|Grey Hats |
| |
| |
|[pic] |
|Black Hats |
| |
| |
|[pic] |
|Red Hats |
| |
| |
|[pic] |
|White Hats |
| |
| |
| |
|_______ is a malicious program that replicates it self until it fills all of the storage space on a drive or network |
| |
| |
|[pic] |
|Virus |
| |
| |
|[pic] |
|Worm |
| |
| |
|[pic] |
|Bot |
| |
| |
|[pic] |
|Trojan |
| |
| |
| |
|______________ refers to a kind of electronic civil disobedience in which activists take direct action by breaking into, or protesting, |
|government or corporate computer systems |
| |
| |
|[pic] |
|Hacktivism |
| |
| |
|[pic] |
|Defensiveness |
| |
| |
|[pic] |
|Activism |
| |
| |
|[pic] |
|Attackvism |
| |
| |
| |
|______________ refers to the pre-attack phase when the attacker scans the network with specific information gathered during reconnaissance.|
| |
| |
|[pic] |
|Scanning |
| |
| |
|[pic] |
|Parsing |
| |
| |
|[pic] |
|Sniffing |
| |
| |
|[pic] |
|Spoofing |
| |
| |
| |
|Cyber Crime is divided into the two T’s |
| |
| |
|[pic] |
|Time and Tools of the crime |
| |
| |
|[pic] |
|Time and Target of the crime |
| |
| |
|[pic] |
|Tools and Target of the crime |
| |
| |
|[pic] |
|Time and Task of the crime |
| |
| |
| |
|___________ contain events generated by system component and deals with driver failures and hardware issues. |
| |
| |
|[pic] |
|Security Log |
| |
| |
|[pic] |
|System Log |
| |
| |
|[pic] |
|Application Log |
| |
| |
|[pic] |
|Event Log |
| |
| |
| |
|__________ is a system integrity check tool. |
| |
| |
|[pic] |
|Tripwire |
| |
| |
|[pic] |
|Limewire |
| |
| |
|[pic] |
|MSBS |
| |
| |
|[pic] |
|Sysinternals |
| |
| |
| |
|_____________ detects and drops packets that overload the server |
| |
| |
|[pic] |
|Protocol based filtering |
| |
| |
|[pic] |
|Stateless packet filtering |
| |
| |
|[pic] |
|Stateful packet filtering |
| |
| |
|[pic] |
|Packet Dropper |
| |
| |
| |
|___________ is also known as misuse detection and tries to identify events that misuse a system. |
| |
| |
|[pic] |
|Snort rule |
| |
| |
|[pic] |
|Anomaly detection |
| |
| |
|[pic] |
|Signature recognition |
| |
| |
|[pic] |
|Rule trigger system |
| |
| |
| |
|_________ is configured to be totally invisible to an end user. It is placed between two networks like a router. |
| |
| |
|[pic] |
|Transparent Proxy |
| |
| |
|[pic] |
|SOCKS |
| |
| |
|[pic] |
|Anonymiser |
| |
| |
|[pic] |
|Protocol Analyzer |
| |
| |
| |
|A ___________ is defined, as the standard set of rules that determine the how the system should function while communicating across the |
|network. |
| |
| |
|[pic] |
|Protocol |
| |
| |
|[pic] |
|Layer |
| |
| |
|[pic] |
|Policy |
| |
| |
|[pic] |
|Stack |
| |
| |
| |
|__________ is the act of obtaining unauthorized access to a network by manipulating authorized users in to revealing their passwords and |
|access information |
| |
| |
|[pic] |
|Social Engineering |
| |
| |
|[pic] |
|Sniffing |
| |
| |
|[pic] |
|Reverse Engineering |
| |
| |
|[pic] |
|Scanning |
| |
| |
| |
|The __________ is a semi-trusted network zone that separates the untrusted Internet from the company's trusted internal network. |
| |
| |
|[pic] |
|Detoxified Zone |
| |
| |
|[pic] |
|Demilitarized Zone |
| |
| |
|[pic] |
|Destabilized Zone |
| |
| |
|[pic] |
|Demarcated Zone |
| |
| |
| |
|_______________ monitor log files generated by network services. |
| |
| |
|[pic] |
|Log File Monitors |
| |
| |
|[pic] |
|Event viewer |
| |
| |
|[pic] |
|Application log |
| |
| |
|[pic] |
|Security log |
| |
| |
| |
|The primary objective behind __________ is to overload the e-mail server |
| |
| |
|[pic] |
|mail snarfing |
| |
| |
|[pic] |
|mail bombing |
| |
| |
|[pic] |
|mail phishing |
| |
| |
|[pic] |
|mail spoofing |
| |
| |
| |
|[pic] |
|Public key cryptography uses an asymmetric key algorithm and is used for creating the ________________________ |
| |
| |
|[pic] |
|Digital algorithm |
| |
| |
|[pic] |
|Digital signature |
| |
| |
|[pic] |
|Digital chain |
| |
| |
|[pic] |
|Digital identifier |
| |
| |
| |
|Public key cryptography uses an asymmetric key algorithm and is used for creating the ________________________ |
| |
| |
|[pic] |
|Digital algorithm |
| |
| |
|[pic] |
|Digital signature |
| |
| |
|[pic] |
|Digital chain |
| |
| |
|[pic] |
|Digital identifier |
| |
| |
| |
|A _____________ is an application program that is used to identify an unknown or forgotten password to a computer or network resource. |
| |
| |
|[pic] |
|Password cropper |
| |
| |
|[pic] |
|Password hasher |
| |
| |
|[pic] |
|Password cracker |
| |
| |
|[pic] |
|Password hacker |
| |
| |
| |
|The _______ performs Power on self-test |
| |
| |
|[pic] |
|PING |
| |
| |
|[pic] |
|PZST |
| |
| |
|[pic] |
|NETBIOS |
| |
| |
|[pic] |
|BIOS |
| |
| |
| |
|The objective of ______________ is to authenticate based on username, password, smart cards, tokens or PINs. |
| |
| |
|[pic] |
|host authentication |
| |
| |
|[pic] |
|user authentication |
| |
| |
|[pic] |
|network authentication |
| |
| |
|[pic] |
|resource authentication |
| |
| |
| |
|__________ has been defined as an assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a |
|deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a |
|system. |
| |
| |
|[pic] |
|Threat |
| |
| |
|[pic] |
|Attack |
| |
| |
|[pic] |
|Exploit |
| |
| |
|[pic] |
|Vulnerability |
| |
| |
| |
|____________ of the e-mail message has key role to play in e-mail tracing as it contains the unique IP address of the server that sent the |
|message. |
| |
| |
|[pic] |
|Header |
| |
| |
|[pic] |
|Option |
| |
| |
|[pic] |
|Key |
| |
| |
|[pic] |
|Signature |
| |
| |
| |
|______________are those that violate the confidentiality without affecting the state of the system. |
| |
| |
|[pic] |
|Active attacks |
| |
| |
|[pic] |
|Passive attacks |
| |
| |
|[pic] |
|Scan attacks |
| |
| |
|[pic] |
|Subversive attacks |
| |
| |
| |
|______ is an online utility that helps an investigator/user to search for copyright records |
| |
| |
|[pic] |
|LOCIS |
| |
| |
|[pic] |
|AXED |
| |
| |
|[pic] |
|LOCUS |
| |
| |
|[pic] |
|AXIS |
| |
| |
| |
|[pic] |
|_________ is a program that appears to be legitimate but is designed to have destructive effects. |
| |
| |
|[pic] |
|Trojan |
| |
| |
|[pic] |
|Virus |
| |
| |
|[pic] |
|Bot |
| |
| |
|[pic] |
|Worm |
| |
| |
| |
|During the preservation of the digital evidence the forensic investigator must record the _______state of the digital evidence |
| |
| |
|[pic] |
|Empirical |
| |
| |
|[pic] |
|Visible |
| |
| |
|[pic] |
|Transient |
| |
| |
|[pic] |
|Physical |
| |
| |
| |
|____________ is the process of determining whether someone or something is, in fact, who or what it is declared to be |
| |
| |
|[pic] |
|Identification |
| |
| |
|[pic] |
|Logon |
| |
| |
|[pic] |
|Password |
| |
| |
|[pic] |
|Authentication |
| |
| |
| |
|An ____________ gathers and analyzes information from various areas within a computer, or network, in order to identify possible violations|
|of security policy, including unauthorized access, as well as misuse. |
| |
| |
|[pic] |
|intrusion detection system |
| |
| |
|[pic] |
|extensible firewall |
| |
| |
|[pic] |
|outbound packet filter |
| |
| |
|[pic] |
|alert rule |
| |
| |
| |
|________ is a program and/or device that monitors data traveling over a network. |
| |
| |
|[pic] |
|Spammer |
| |
| |
|[pic] |
|Strobe |
| |
| |
|[pic] |
|Scanner |
| |
| |
|[pic] |
|Sniffer |
| |
| |
| |
|The ________layer of TCP/IP is the grouped layer of the data link layer and physical layer of OSI. |
| |
| |
|[pic] |
|Transport |
| |
| |
|[pic] |
|Protocol interface |
| |
| |
|[pic] |
|Physical |
| |
| |
|[pic] |
|Network interface |
| |
| |
| |
|Proxy based firewalls concentrate on the _____________ rather than just the packets |
| |
| |
|[pic] |
|Network Layer |
| |
| |
|[pic] |
|Application Layer |
| |
| |
|[pic] |
|Transport Layer |
| |
| |
|[pic] |
|Physical Layer |
| |
| |
| |
|The basic function of ___________is transmission of data over the communication channel. |
| |
| |
|[pic] |
|physical layer |
| |
| |
|[pic] |
|data layer |
| |
| |
|[pic] |
|transmission layer |
| |
| |
|[pic] |
|data link layer |
| |
| |
| |
|The authentication process is done by exchanging a set of messages between a pair of entities, usually called as an _________________ |
|protocol. |
| |
| |
|[pic] |
|Approval |
| |
| |
|[pic] |
|DSA Risk |
| |
| |
|[pic] |
|Authentication |
| |
| |
|[pic] |
|Acceptable risk |
| |
| |
| |
|During the power on self-test various tests are performed including: |
| |
| |
|[pic] |
|Video card test |
| |
| |
|[pic] |
|UGA test |
| |
| |
|[pic] |
|Webcam test |
| |
| |
|[pic] |
|Napster test |
| |
| |
| |
|_______________________ monitors system files to determine whether an intruder has changed the system files. |
| |
| |
|[pic] |
|System Change Implementers |
| |
| |
|[pic] |
|System Indicative Verifiers |
| |
| |
|[pic] |
|System Integrity Verifiers |
| |
| |
|[pic] |
|System Change Checkers |
| |
| |
| |
|Common digital signature algorithms that are used include ______ |
| |
| |
|[pic] |
|RSA and DSA |
| |
| |
|[pic] |
|ASA and DSA |
| |
| |
|[pic] |
|MSA and ASA |
| |
| |
|[pic] |
|MSA and RSA |
| |
| |
| |
|_________ is a program that handles external servers on behalf of internal servers. |
| |
| |
|[pic] |
|SOCKS |
| |
| |
|[pic] |
|NAT |
| |
| |
|[pic] |
|Firewall |
| |
| |
|[pic] |
|Proxy |
| |
| |
| |
|Which options should be turned on in a wireless network to make it more secure? |
| |
| |
|[pic] |
|SSH and SSL |
| |
| |
|[pic] |
|IPSEC and SSL |
| |
| |
|[pic] |
|SSID and WEP |
| |
| |
|[pic] |
|SSID and WRP |
| |
| |
| |
|A ___________is any circumstance or event that has the potential to cause harm to a system or network |
| |
| |
|[pic] |
|Vulnerability |
| |
| |
|[pic] |
|Threat |
| |
| |
|[pic] |
|Attack |
| |
| |
|[pic] |
|Disaster |
| |
| |
| |
|_____________ layer deals with the mechanical, electrical, procedural interfaces and the physical transmission medium. |
| |
| |
|[pic] |
|Network |
| |
| |
|[pic] |
|Physical |
| |
| |
|[pic] |
|Transport |
| |
| |
|[pic] |
|Transmission |
| |
| |
| |
|An ________can be an event or set of events that threatens the security in computing systems and networks in any organization. |
| |
| |
|[pic] |
|Event log |
| |
| |
|[pic] |
|Outbreak |
| |
| |
|[pic] |
|Alert |
| |
| |
|[pic] |
|Incident |
| |
| |
| |
|The ___________ is a unique identifier that is used to establish, and maintain, wireless connectivity and acts as a single shared password |
|between access points and clients. |
| |
| |
|[pic] |
|SSID |
| |
| |
|[pic] |
|SSLD |
| |
| |
|[pic] |
|DSDL |
| |
| |
|[pic] |
|SSDI |
| |
| |
| |
|___________ is a computer program that is designed to replicate itself by copying itself into the other programs stored in a computer |
| |
| |
|[pic] |
|Worm |
| |
| |
|[pic] |
|Bot |
| |
| |
|[pic] |
|Trojan |
| |
| |
|[pic] |
|Virus |
| |
| |
| |
|___________ is a computer that is completely vulnerable to attacks. |
| |
| |
|[pic] |
|Rogue Server |
| |
| |
|[pic] |
|Application Server |
| |
| |
|[pic] |
|Bastion host |
| |
| |
|[pic] |
|Firewall Server |
| |
| |
| |
|Running a program that remotely finds ports opened and closed on remote systems, represents one of the most common types of |
|__________attacks. |
|[pic] |Reverse Mapping |
|[pic] |Re-engineering |
|[pic] |Rendezvous |
|[pic] |Reconnaissance |
|The most damaging of the denial of service attacks can be a _______________ attacks, where an attacker uses zombie software distributed |
|over several machines |
| |
| |
|[pic] |
|Bot |
| |
| |
|[pic] |
|Distributed denial of service |
| |
| |
|[pic] |
|Zombie |
| |
| |
|[pic] |
|Discrete denial of service |
| |
| |
| |
|_____ is a standard for encrypting and digitally signing electronic mail that contains attachments and for offering secure data |
|transmissions. |
| |
| |
|[pic] |
|Secure MIME |
| |
| |
|[pic] |
|HTTPS |
| |
| |
|[pic] |
|SSH |
| |
| |
|[pic] |
|SSL |
| |
| |
| |
|A ___________ is a private network of computers that uses the public Internet to connect some nodes. |
| |
| |
|[pic] |
|UseNet |
| |
| |
|[pic] |
|FINNet |
| |
| |
|[pic] |
|Routing Table |
| |
| |
|[pic] |
|VPN |
| |
| |
| |
|_________________ is the existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event |
|compromising the security of the system, network, application, or protocol involved. |
| |
| |
|[pic] |
|Attack |
| |
| |
|[pic] |
|Patch |
| |
| |
|[pic] |
|Vulnerability |
| |
| |
| |
|[pic] |
|An ______________is a person who can investigate on a particular case, evaluate all findings, and educate the jury about his findings. |
| |
| |
|[pic] |
|Expert witness |
| |
| |
|[pic] |
|Jury Member |
| |
| |
|[pic] |
|Court Reporter |
| |
| |
|[pic] |
|Crime Reporter |
| |
| |
| |
|____________ is used to describe those hackers who use their computer skills with malicious intent for illegal purposes or nefarious |
|activities |
| |
| |
|[pic] |
|Grey Hats |
| |
| |
|[pic] |
|Black Hats |
| |
| |
|[pic] |
|Red Hats |
| |
| |
|[pic] |
|White Hats |
| |
| |
| |
|_______ is a malicious program that replicates it self until it fills all of the storage space on a drive or network |
| |
| |
|[pic] |
|Virus |
| |
| |
|[pic] |
|Worm |
| |
| |
|[pic] |
|Bot |
| |
| |
|[pic] |
|Trojan |
| |
| |
| |
|______________ refers to a kind of electronic civil disobedience in which activists take direct action by breaking into, or protesting, |
|government or corporate computer systems |
| |
| |
|[pic] |
|Hacktivism |
| |
| |
|[pic] |
|Defensiveness |
| |
| |
|[pic] |
|Activism |
| |
| |
|[pic] |
|Attackvism |
| |
| |
| |
|______________ refers to the pre-attack phase when the attacker scans the network with specific information gathered during reconnaissance.|
| |
| |
|[pic] |
|Scanning |
| |
| |
|[pic] |
|Parsing |
| |
| |
|[pic] |
|Sniffing |
| |
| |
|[pic] |
|Spoofing |
| |
| |
| |
|Cyber Crime is divided into the two T’s |
| |
| |
|[pic] |
|Time and Tools of the crime |
| |
| |
|[pic] |
|Time and Target of the crime |
| |
| |
|[pic] |
|Tools and Target of the crime |
| |
| |
|[pic] |
|Time and Task of the crime |
| |
| |
| |
|___________ contain events generated by system component and deals with driver failures and hardware issues. |
| |
| |
|[pic] |
|Security Log |
| |
| |
|[pic] |
|System Log |
| |
| |
|[pic] |
|Application Log |
| |
| |
|[pic] |
|Event Log |
| |
| |
| |
|__________ is a system integrity check tool. |
| |
| |
|[pic] |
|Tripwire |
| |
| |
|[pic] |
|Limewire |
| |
| |
|[pic] |
|MSBS |
| |
| |
|[pic] |
|Sysinternals |
| |
| |
| |
|_____________ detects and drops packets that overload the server |
| |
| |
|[pic] |
|Protocol based filtering |
| |
| |
|[pic] |
|Stateless packet filtering |
| |
| |
|[pic] |
|Stateful packet filtering |
| |
| |
|[pic] |
|Packet Dropper |
| |
| |
| |
|___________ is also known as misuse detection and tries to identify events that misuse a system. |
| |
| |
|[pic] |
|Snort rule |
| |
| |
|[pic] |
|Anomaly detection |
| |
| |
|[pic] |
|Signature recognition |
| |
| |
|[pic] |
|Rule trigger system |
| |
| |
| |
|_________ is configured to be totally invisible to an end user. It is placed between two networks like a router. |
| |
| |
|[pic] |
|Transparent Proxy |
| |
| |
|[pic] |
|SOCKS |
| |
| |
|[pic] |
|Anonymiser |
| |
| |
|[pic] |
|Protocol Analyzer |
| |
| |
| |
|A ___________ is defined, as the standard set of rules that determine the how the system should function while communicating across the |
|network. |
| |
| |
|[pic] |
|Protocol |
| |
| |
|[pic] |
|Layer |
| |
| |
|[pic] |
|Policy |
| |
| |
|[pic] |
|Stack |
| |
| |
| |
|__________ is the act of obtaining unauthorized access to a network by manipulating authorized users in to revealing their passwords and |
|access information |
| |
| |
|[pic] |
|Social Engineering |
| |
| |
|[pic] |
|Sniffing |
| |
| |
|[pic] |
|Reverse Engineering |
| |
| |
|[pic] |
|Scanning |
| |
| |
| |
|The __________ is a semi-trusted network zone that separates the untrusted Internet from the company's trusted internal network. |
| |
| |
|[pic] |
|Detoxified Zone |
| |
| |
|[pic] |
|Demilitarized Zone |
| |
| |
|[pic] |
|Destabilized Zone |
| |
| |
|[pic] |
|Demarcated Zone |
| |
| |
| |
|_______________ monitor log files generated by network services. |
| |
| |
|[pic] |
|Log File Monitors |
| |
| |
|[pic] |
|Event viewer |
| |
| |
|[pic] |
|Application log |
| |
| |
|[pic] |
|Security log |
| |
| |
| |
|The primary objective behind __________ is to overload the e-mail server |
| |
| |
|[pic] |
|mail snarfing |
| |
| |
|[pic] |
|mail bombing |
| |
| |
|[pic] |
|mail phishing |
| |
| |
|[pic] |
|mail spoofing |
| |
| |
| |
|[pic] |
|Public key cryptography uses an asymmetric key algorithm and is used for creating the ________________________ |
| |
| |
|[pic] |
|Digital algorithm |
| |
| |
|[pic] |
|Digital signature |
| |
| |
|[pic] |
|Digital chain |
| |
| |
|[pic] |
|Digital identifier |
| |
| |
| |
|Public key cryptography uses an asymmetric key algorithm and is used for creating the ________________________ |
| |
| |
|[pic] |
|Digital algorithm |
| |
| |
|[pic] |
|Digital signature |
| |
| |
|[pic] |
|Digital chain |
| |
| |
|[pic] |
|Digital identifier |
| |
| |
| |
|A _____________ is an application program that is used to identify an unknown or forgotten password to a computer or network resource. |
| |
| |
|[pic] |
|Password cropper |
| |
| |
|[pic] |
|Password hasher |
| |
| |
|[pic] |
|Password cracker |
| |
| |
|[pic] |
|Password hacker |
| |
| |
| |
|The _______ performs Power on self-test |
| |
| |
|[pic] |
|PING |
| |
| |
|[pic] |
|PZST |
| |
| |
|[pic] |
|NETBIOS |
| |
| |
|[pic] |
|BIOS |
| |
| |
| |
|The objective of ______________ is to authenticate based on username, password, smart cards, tokens or PINs. |
| |
| |
|[pic] |
|host authentication |
| |
| |
|[pic] |
|user authentication |
| |
| |
|[pic] |
|network authentication |
| |
| |
|[pic] |
|resource authentication |
| |
| |
| |
|__________ has been defined as an assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a |
|deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a |
|system. |
| |
| |
|[pic] |
|Threat |
| |
| |
|[pic] |
|Attack |
| |
| |
|[pic] |
|Exploit |
| |
| |
|[pic] |
|Vulnerability |
| |
| |
| |
|____________ of the e-mail message has key role to play in e-mail tracing as it contains the unique IP address of the server that sent the |
|message. |
| |
| |
|[pic] |
|Header |
| |
| |
|[pic] |
|Option |
| |
| |
|[pic] |
|Key |
| |
| |
|[pic] |
|Signature |
| |
| |
| |
|______________are those that violate the confidentiality without affecting the state of the system. |
| |
| |
|[pic] |
|Active attacks |
| |
| |
|[pic] |
|Passive attacks |
| |
| |
|[pic] |
|Scan attacks |
| |
| |
|[pic] |
|Subversive attacks |
| |
| |
| |
|______ is an online utility that helps an investigator/user to search for copyright records |
| |
| |
|[pic] |
|LOCIS |
| |
| |
|[pic] |
|AXED |
| |
| |
|[pic] |
|LOCUS |
| |
| |
|[pic] |
|AXIS |
| |
| |
| |
|[pic] |
|_________ is a program that appears to be legitimate but is designed to have destructive effects. |
| |
| |
|[pic] |
|Trojan |
| |
| |
|[pic] |
|Virus |
| |
| |
|[pic] |
|Bot |
| |
| |
|[pic] |
|Worm |
| |
| |
| |
|During the preservation of the digital evidence the forensic investigator must record the _______state of the digital evidence |
| |
| |
|[pic] |
|Empirical |
| |
| |
|[pic] |
|Visible |
| |
| |
|[pic] |
|Transient |
| |
| |
|[pic] |
|Physical |
| |
| |
| |
|____________ is the process of determining whether someone or something is, in fact, who or what it is declared to be |
| |
| |
|[pic] |
|Identification |
| |
| |
|[pic] |
|Logon |
| |
| |
|[pic] |
|Password |
| |
| |
|[pic] |
|Authentication |
| |
| |
| |
|An ____________ gathers and analyzes information from various areas within a computer, or network, in order to identify possible violations|
|of security policy, including unauthorized access, as well as misuse. |
| |
| |
|[pic] |
|intrusion detection system |
| |
| |
|[pic] |
|extensible firewall |
| |
| |
|[pic] |
|outbound packet filter |
| |
| |
|[pic] |
|alert rule |
| |
| |
| |
|________ is a program and/or device that monitors data traveling over a network. |
| |
| |
|[pic] |
|Spammer |
| |
| |
|[pic] |
|Strobe |
| |
| |
|[pic] |
|Scanner |
| |
| |
|[pic] |
|Sniffer |
| |
| |
| |
|The ________layer of TCP/IP is the grouped layer of the data link layer and physical layer of OSI. |
| |
| |
|[pic] |
|Transport |
| |
| |
|[pic] |
|Protocol interface |
| |
| |
|[pic] |
|Physical |
| |
| |
|[pic] |
|Network interface |
| |
| |
| |
|Proxy based firewalls concentrate on the _____________ rather than just the packets |
| |
| |
|[pic] |
|Network Layer |
| |
| |
|[pic] |
|Application Layer |
| |
| |
|[pic] |
|Transport Layer |
| |
| |
|[pic] |
|Physical Layer |
| |
| |
| |
|The basic function of ___________is transmission of data over the communication channel. |
| |
| |
|[pic] |
|physical layer |
| |
| |
|[pic] |
|data layer |
| |
| |
|[pic] |
|transmission layer |
| |
| |
|[pic] |
|data link layer |
| |
| |
| |
|The authentication process is done by exchanging a set of messages between a pair of entities, usually called as an _________________ |
|protocol. |
| |
| |
|[pic] |
|Approval |
| |
| |
|[pic] |
|DSA Risk |
| |
| |
|[pic] |
|Authentication |
| |
| |
|[pic] |
|Acceptable risk |
| |
| |
| |
|During the power on self-test various tests are performed including: |
| |
| |
|[pic] |
|Video card test |
| |
| |
|[pic] |
|UGA test |
| |
| |
|[pic] |
|Webcam test |
| |
| |
|[pic] |
|Napster test |
| |
| |
| |
|_______________________ monitors system files to determine whether an intruder has changed the system files. |
| |
| |
|[pic] |
|System Change Implementers |
| |
| |
|[pic] |
|System Indicative Verifiers |
| |
| |
|[pic] |
|System Integrity Verifiers |
| |
| |
|[pic] |
|System Change Checkers |
| |
| |
| |
|Common digital signature algorithms that are used include ______ |
| |
| |
|[pic] |
|RSA and DSA |
| |
| |
|[pic] |
|ASA and DSA |
| |
| |
|[pic] |
|MSA and ASA |
| |
| |
|[pic] |
|MSA and RSA |
| |
| |
| |
|_________ is a program that handles external servers on behalf of internal servers. |
| |
| |
|[pic] |
|SOCKS |
| |
| |
|[pic] |
|NAT |
| |
| |
|[pic] |
|Firewall |
| |
| |
|[pic] |
|Proxy |
| |
| |
| |
|Which options should be turned on in a wireless network to make it more secure? |
| |
| |
|[pic] |
|SSH and SSL |
| |
| |
|[pic] |
|IPSEC and SSL |
| |
| |
|[pic] |
|SSID and WEP |
| |
| |
|[pic] |
|SSID and WRP |
| |
| |
| |
|A ___________is any circumstance or event that has the potential to cause harm to a system or network |
| |
| |
|[pic] |
|Vulnerability |
| |
| |
|[pic] |
|Threat |
| |
| |
|[pic] |
|Attack |
| |
| |
|[pic] |
|Disaster |
| |
| |
| |
|_____________ layer deals with the mechanical, electrical, procedural interfaces and the physical transmission medium. |
| |
| |
|[pic] |
|Network |
| |
| |
|[pic] |
|Physical |
| |
| |
|[pic] |
|Transport |
| |
| |
|[pic] |
|Transmission |
| |
| |
| |
|An ________can be an event or set of events that threatens the security in computing systems and networks in any organization. |
| |
| |
|[pic] |
|Event log |
| |
| |
|[pic] |
|Outbreak |
| |
| |
|[pic] |
|Alert |
| |
| |
|[pic] |
|Incident |
| |
| |
| |
|The ___________ is a unique identifier that is used to establish, and maintain, wireless connectivity and acts as a single shared password |
|between access points and clients. |
| |
| |
|[pic] |
|SSID |
| |
| |
|[pic] |
|SSLD |
| |
| |
|[pic] |
|DSDL |
| |
| |
|[pic] |
|SSDI |
| |
| |
| |
|___________ is a computer program that is designed to replicate itself by copying itself into the other programs stored in a computer |
| |
| |
|[pic] |
|Worm |
| |
| |
|[pic] |
|Bot |
| |
| |
|[pic] |
|Trojan |
| |
| |
|[pic] |
|Virus |
| |
| |
| |
|___________ is a computer that is completely vulnerable to attacks. |
| |
| |
|[pic] |
|Rogue Server |
| |
| |
|[pic] |
|Application Server |
| |
| |
|[pic] |
|Bastion host |
| |
| |
|[pic] |
|Firewall Server |
| |
| |
| |
|Running a program that remotely finds ports opened and closed on remote systems, represents one of the most common types of |
|__________attacks. |
|[pic] |Reverse Mapping |
|[pic] |Re-engineering |
|[pic] |Rendezvous |
|[pic] |Reconnaissance |