Operations Security Prep Test


1. 

The two types of intrusion detection are

  1. Attack-based systems and response-based systems

  2. Signature-based systems and anomaly-based systems

  3. Knowledge-based systems and scripture-based systems

  4. Passive monitoring systems and active monitoring systems

image from book

2. 

Recording data traveling on a network is known as

  1. Promiscuous mode

  2. Packet sniffing

  3. Packet snoring

  4. Packing sneaking

image from book

3. 

Which of the following is NOT an example of penetration testing?

  1. Radiation monitoring

  2. War driving

  3. Port scanning

  4. War diving

image from book

4. 

Trusted recovery is concerned with

  1. The ability of a system to be rebuilt

  2. The vulnerability of a system while it’s being rebuilt

  3. The ability of a system to rebuild itself

  4. The willingness of a system to rebuild itself

image from book

5. 

The third-party inspection of a system is known as a(n)

  1. Confidence check

  2. Integrity trail

  3. Audit trail

  4. Audit

image from book

6. 

One of the primary concerns with long-term audit log retention is

  1. Whether anyone will be around who can find them

  2. Whether any violations of privacy laws have occurred

  3. Whether anyone will be around who understands them

  4. Whether any tape/disk drives will be available to read them

image from book

7. 

The required operating state of a network interface on a system running a sniffer is

  1. Open mode

  2. Promiscuous mode

  3. Licentious mode

  4. Pretentious mode

image from book

8. 

Filling a system’s hard drive so that it can no longer record audit records is known as a(n)

  1. Audit lock-out

  2. Audit exception

  3. Denial of Facilities attack

  4. Denial of Service attack

image from book

9. 

An investigator who needs to have access to detailed employee event information may need to use

  1. Keystroke monitoring

  2. Intrusion detection

  3. Keystroke analysis

  4. Trend analysis

image from book

10. 

Which of the following is NOT true about a signature-based IDS?

  1. It reports a low number of false-positives.

  2. It requires periodic updating of its signature files.

  3. It reports a high number of false-positives.

  4. It can’t detect anomalies based on trends.

image from book

Answers

1. 

B. Signature-based systems and anomaly-based systems. The two types of IDS systems are signature-based and anomaly-based. Review “Intrusion detection and prevention.”

2. 

B. Packet sniffing. Packet sniffing is the technique used to record network traffic. Review “Penetration testing.”

3. 

D. War diving. War diving isn’t a testing technique, but radiation monitoring, war driving, and port scanning are. Review “Penetration testing.”

4. 

B. The vulnerability of a system while it’s being rebuilt. Most operating systems in single-user mode lack the security controls present in a system that’s fully operational. Review “Security Controls.”

5. 

D. Audit. An auditis an inspection of a system or process. Review “Security Auditing and Due Care.”

6. 

D. Whether any tape/disk drives will be available to read them. The challenge with audit log retention is choosing a medium that will be readable many years in the future. Review “Retaining audit logs.”

7. 

B. Promiscuous mode.This is the term that describes the state of a system that is accepting all packets on the network, not just those packets destined for the system. Review “Penetration testing.”

8. 

D. Denial of Service attack. Filling a system’s hard drive is one way to launch a Denial of Service attack on an audit log mechanism. This will prevent the mechanism from being able to write additional entries to the log. Review “Protection of audit logs.”

9. 

A. Keystroke monitoring. Keystroke monitoring records every key press and mouse movement. Review “Keystroke monitoring.”

10. 

C. It reports a high number of false-positives. Signature-based IDSes generally have a low number of false-positives. Review “Intrusion detection and prevention.”




CISSP For Dummies
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net