CMGT 400 Week 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

What size key does a DES system use?

56 bit

Which of the following types of information would be a likely target for industrial espionage?

All of these

Why might you wish to limit the number of company CD burners and control access to them in your organization?

An employee could use such media to take sensitive data

What method do most IDS software implementations use?

Anomaly detection

What is the name for scanning that depends on complex rules to define what is and is not a virus

Heuristic scanning

what is the term for a fake system designed to lure intruders?

Honey pot

What should you be most careful of when looking for an encryption method to use

How long the algorithm had been around

Many classic ciphers are easy to understand but not secure. What is the main problem with simple substitution?

It is too simple

Which of the following is a likely reason that an organization might be reluctant to admit it has been a victim of corporate espionage?

It might cause stock value to decline

Which of the following is a disadvantage of using an application gateway firewall

It uses a great deal of resources

What is one way of checking emails for virus infection?

Look for subject lines that are from known virus attacks

Classic ciphers were improved with the addition of multiple shifts (multiple substitution alphabets). Which of the following is an encryption method that uses two or more different shifts?

Multi-alphabet encryption

what is the difference between corporate and industrial espionage

None, they are interchangeable terms

What is the term for blocking an IP address that has been the source of suspicious activity

Preemptive blocking

What is the term for a firewall that is software installed on and existing server?

Screened host

Which of the following is the most basic type of firewall?

Screening firewall

Which of the following is the best definition for spyware

Software that monitors activity on a computer

What are TSR Programs

Terminate and stay resident programs, which stay in memory after you shut them down

If a company purchases a high-end UNIX server to use for its research and development departments, what is probably the most valuable part of the system?

The information on the server

Which of the following is most true regarding certified encryption methods

There is no such thing as certified encryption

Why would you want to scan an employee's computer when he leaves the organization?

To check for signs of corporate espionage

Which of the following is the most common way for a virus scanner to recognize a virus?

To compare a file to known virus attributes

what is the highest level of security you can expect to obtain?

A level of security that makes the effort required to get information more costly than the value of the information

Which of the following methods uses a variable-length symmetric key?

Blowfish

It is important to understand the concepts and application of cryptography. Which of the following most accurately defines encryption?

Changing a message so it can only be easily read by the intended recipient

Which of the following is a symmetric key system that uses 64-bin blocks?

DES

What is the greatest security risk to any company?

Disgruntled employees

What is the usual motivating factor for corporate/ industrial espionage?

Economic

which of the following is the correct term for making a system less attractive to intruders?

Intrusion deterrence

Why is binary mathematical encryption not secure?

It does not change letter or word frequency.

What is the advantage of a symmetric key system using 64-bit blocks?

It is fast

which of the following is most likely to be true of an encryption method that is advertised as unbreakable

It is likely to be exaggerated

What is a major weakness with a network host-based firewall?

Its security depends of the underlying operating system

Which of the following is most true regarding new encryption methods

Never use them until they have been proven

Which of the following methods is available as an add-in for most email clients?

PGP

What is PGP?

Pretty Good Privacy, a public key encryption method

What type of encryption uses different keys to encrypt and decrypt the message?

Public key

What formula can you use to calculate the value of information?

Resources needed to produce the information plus resources gained from the information.

Which of the following is most true regarding binary operations and encryption?

They can form a part of viable encryption methods

Terrance is trying to explain industrial espionage to a group of new security techs. What is the ultimate goal of espionage?

To obtain information not otherwise available

What is the best outcome for a spy attempting an espionage activity?

To obtain information without the target even realizing he did so

What is the reason for encrypting hard drives on laptop computers?

To prevent a thief from getting data off of a stolen laptop.

Which binary mathematical operation can be used for a simple encryption method?

XOR

What does SPI stand for?

stateful packet inspection

How do most antispyware packages work?

By looking for known spyware

Which of the following is the oldest encryption method?

Caesar cipher

Information is an asset to your company if it:

Costs any sum of money to produce

Which of the following is not one of the basic types of firewalls

Heuristic firewall


Conjuntos de estudio relacionados

My World Chapter 7.1 First Presidents

View Set

Quantative Reasoning 4A-4D Definitions

View Set

Fundamentals Prep U Exam 3 Chapter 8, 9, 10, +

View Set

LU CSIS 325 - CH. 1-3 & 5-7 (Midterm)

View Set