SANS 301 - GISF
Which factor must be held for a One-Time-Pad to be secure?
A. The pad must be as long as the message
B. The pad must have a random initialization vector
C. The pad must be in ASCII
D. The pad must be at least 512 bytes - CORRECT ANSWER-A. The pad must
be as long as the message
TCP's error correction mechanism relies on the sequence number and which
flag?
A. RST
B. SYN
C. ACK
D. FIN - CORRECT ANSWER-C. ACK
Collecting customer information can be valuable to your business to help cater
your product line to meet the needs of your buyers. While this may help with
overall product sales and customer support it also could put your company at risk
of violating which of the following?
A. Privacy Laws
B. Insurance Contracts
C. Service Level Agreements
D. Equal Opportunity Agreements - CORRECT ANSWER-A. Privacy Laws
Which of the following is accomplished by purchasing insurance?
A. Risk Assessment
B. Transfer the risk
C. Eliminate the risk
D. Accept the residual risk - CORRECT ANSWER-B. Transfer the risk
What type of firewall tracks the status of a connection in a table?
A. Stateful
B. ACL
C. Software
D. Packet Filter - CORRECT ANSWER-A. Stateful
, A firewall with external IP address: 151.113.101.237 and internal IP address:
10.10.10.1 is using NAT. Host 10.10.10.37 is connected to 65.35.59.207 over
HTTPS. Which of the following IP addresses will host 65.35.59.207 view as the
source IP address?
A. 10.10.10.37
B. 10.10.10.1
C. 151.113.101.237 - CORRECT ANSWER-C. 151.113.101.237
What does the keychain device represent in this scenario?
A person has configured their PayPal account to require the use of a small
"keychain device" that generates a random number. When the person wants to
log into PayPal, they must enter their username and password, then they must
enter the random number to complete the process. The random number changes
often and so they must enter the number before it changes.
A. Proximity Authentication
B. Person Identification Authentication
C. Synchronous Token
D. Typing Dynamics - CORRECT ANSWER-C. Synchronous Token
What is authentication?
A. Validating evidence of a user's identity
B. A role that determines which objects a user may access
C. The level of confidentiality that a user is given in a system
D. The granting of rights and permissions for computer access - CORRECT
ANSWER-A. Validating evidence of a user's identity
Ruby sends a digitally-signed email to Kenya. Which of the following is a result of
this event?
A. Kenya has Ruby's public key?
B. Kenya can send email on behalf of Ruby
C. The message is encrypted
D. Ruby can prove that Kenya received her email - CORRECT ANSWER-A.
Kenya has Ruby's public key
What is the term used to describe one of the sections of the IP address (for
example, the "128" section seen below)?
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller stephanvdb04. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.