QUESTIONS WITH SOLUTIONS GRADED A+
◍ certificate.
Answer: created to link a public key to a particular individual;used as a form
of electronic identification for that person
◍ penetration testing.
Answer: A more active method of finding security holes that includes using
the kinds of tools attackers use to mimic an attack on our environment
◍ EU Directive 95/46/EC.
Answer: EU regulation that safeguards personally identifiable information
◍ FAST.
Answer: Recognize FAST (Face, Arms, Speech, Time).
◍ SPI (Stateful Packet Inspection).
Answer: a firewall that can watch packets and monitor the traffic from a
given connection
◍ DPI (Deep Packet Inspection).
Answer: a firewall technology that can analyze the actual content of the
traffic that is flowing through
◍ something you know.
Answer: A password is an example of this type of factor
◍ privacy.
Answer: the state or condition of being free from being observed or
disturbed by other people
◍ XSRF (cross-site request forgery).
Answer: an attack in which the attacker places a link on a web page in such
, a way that it will be automatically executed to initiate a particular activity on
another web page or application where the user is currently authenticated
◍ Nursing.com.
Answer: Resource for NGN practice questions and condition-specific
tutorials.
◍ residual data.
Answer: Data that is unintentionally left behind on a storage device
◍ ABC in emergency scenarios.
Answer: Prioritization of Airway, Breathing, and Circulation during
emergencies.
◍ vulnerability.
Answer: a weakness that can be used to harm us
◍ accountability.
Answer: this provides us with the means to trace activities in our
environment back to their source
◍ Right-sided Heart Failure Symptoms.
Answer: Peripheral symptoms (e.g., edema, ascites, JVD).
◍ anomaly-based IDS.
Answer: an IDS that takes a baseline of normal network traffic and activity
and measures current traffic against this baseline to detect unusual events
◍ HIDS (host-based intrusion detection system).
Answer: a system used to analyze the activities on or directed at the network
interface of a particular host.* may communicate with management device
by sending regular beacons
◍ cryptographic attack.
Answer: A type of attack that can occur when we fail to properly design our
security mechanisms when implementing cryptographic controls in our
applications
◍ performance measurement.
, Answer: A set of metrics that judge how well a given system functions
◍ client-side attack.
Answer: A type of attack that takes advantage of weaknesses in the software
loaded on client machines or one that uses social engineering techniques to
trick us into going along with the attack
◍ denying access.
Answer: an act that prevents a party from accessing something, such as
logging on to a machine or entering the lobby of our building after hours
◍ Principle of Least Privilege.
Answer: states we should only allow a party the absolute minimum
permission needed for it to carry out its function
◍ vulnerability assessment tool.
Answer: A tool that is aimed specifically at the task of finding and reporting
network services on hosts that have known vulnerabilities
◍ ROT13 cipher.
Answer: a more recent cipher that uses the same mechanism as the Caesar
cipher but moves each letter 13 places forward
◍ scanner.
Answer: a type of tool that can detect various security flaws when
examining hosts
◍ hash.
Answer: used to determine whether the message has changed;provides
integrity (but not confidentiality)
◍ protocol issues.
Answer: unauthenticated flaws in network protocols, authenticated flaws in
network protocols, flaws in authentication protocols
◍ sandbox.
Answer: A set of resources devoted to a program, process, or similar entity,
outside of which the entity cannot operate
, ◍ malware.
Answer: a security awareness issue that involves educating users about
malicious software and how to avoid it
◍ Therapeutic outcomes of medications.
Answer: Understanding the effects of medications and associated patient
teaching.
◍ monitoring.
Answer: a subset of auditing that focuses on observing information about the
environment in order to discover undesirable conditions such as failures,
resource shortages, security issues, and trends
◍ encryption.
Answer: a subset of cryptography that refers specifically to the
transformation of unencrypted data into its encrypted form
◍ Cardiac Medication Classifications.
Answer: Common Classes: Beta-blockers, Calcium channel blockers,
Diuretics.
◍ capability-based security.
Answer: in this method of security, a person's capabilities are oriented
around the use of a token that controls their access (e.g. a personal badge)
◍ Nikto (and Wikto).
Answer: A web server analysis tool that performs checks for many common
server-side vulnerabilities & creates an index of all the files and directories
it can see on the target web server (a process known as spidering)
◍ vulnerability assessment.
Answer: An activity involving the careful examination of our environment
using vulnerability scanning tools in order to discover vulnerabilities
◍ Burn Care Full Thickness.
Answer: Absent pain due to nerve destruction, high infection risk.
Interventions: Fluid resuscitation and wound care.