Mid-Term

¡Supera tus tareas y exámenes ahora con Quizwiz!

MATCH: The phrases below describe types of authentication factors. Match the type of authentication factor with its description. Something you know - memorized information like a password Something you have - an object containing a base secret, like the magnetic stripe on a cash card Something you are - a biometric measure

-Something you know - memorized information like a password -Something you have - an object containing a base secret, like the magnetic stripe on a cash card -Something you are - a biometric measure

We need to create a three-factor authentication system. The system already requires the user's fingerprint and memorized password. Which of the following can we add to implement three separate factors? A procedure that requires the user's cell phone Signature recognition A PIN entered via a built-in PIN pad Require the answer to a secret question

A procedure that requires the user's cell phone.

Which of the following is a list of access rights for each file, where each entry identifies a specific user and contains a list of access rights granted to that user. Reader rights Access control list (ACL) Group rights All of these are correct.

Access control list (ACL)

Select the controls from the list below that can implement a tailored access policy. Access control lists. Control of system-based access rights. Control of user group-based access rights Control of world-based access rights

Access control lists. Control of user group-based rights.

What does authentication do? Grant access rights All of these are correct Checks access rights. Associates an individual with an identity.

Associates an individual with an identity.

Encryption protects information by presenting which of the following? Bug Puzzle Key Riddle

Key

Alice is using a system that uses very simple file and directory access rights. The system doesn't have directory-specific access rights. Instead, it uses simple read and write permissions to restrict what users can do to a directory. Alice has read-only access to the "project" directory. Select which of the following operations Alice can perform on that directory. -List files in the directory -Create files to which she will have "write" access -Seek files in that directory -Delete files for which she has "write" access -Read files in the directory for which she has "read" access

List files in the directory Seek files in that directory Read files in the directory for which she has "read" access

We use a special error detection calculation to authenticate the data on a hard drive that as being used as evidence in court. Which type of error detection calculation is typically used? One-way hash Cyclic redundancy check Parity Checksum

One-way hash

Which basic principle is most closely associated with the troubles that a buffer overflow can cause? Chain of control Continuous improvement Open design Defense in depth

Open design

Users with the right to read files in the folder have which of the following? Select all that apply. Owner rights Read/write rights Reader rights

Owner rights Read/write rights Reader rights

Car ignition locks are an example of what type of decision? Rule-based Requirement-based Relativistic-based Hunter's dilemma

Rule-based

We are trying to protect a household computer. We have implemented password-based authentication to protect sensitive data. Which levels of attacker motivation can this authentication typically protect against in this situation? Select all that apply. Stealth motivation Medium motivation Scant motivation No motivation

Stealth motivation Scant motivation No motivation

Match the following terms with the most accurate description. Control section - area in RAM that contains instructions to execute Data Section - area in RAM that data read by or written to by instructions BIOS - Instructions in ROM used when the computer boots up

Control section - area in RAM that contains instructions to execute Data Section - area in RAM that data read by or written to by instructions BIOS - Instructions in ROM used when the computer boots up

The program counter points to locations in RAM. If we add one to the address in the program counter, what will it always point to? The next byte in RAM The next control section in RAM The next bit in RAM The next instruction in RAM

The next byte in ram

True or False? A vulnerability is a security measure intended to protect an asset.

False

True or False? All attacks cause damage to a system. True False

False

True or False? Application programs are the only executable files on a typical operating system. True False

False

True or False? At a crime scene, the computer must be analyzed on the spot and documented after it is considered safe. True False

False

True or False? Biometrics have a fault tolerance of 0. True False

False

True or False? Information security architecture often relies on boundaries outside the computer to protect important information or programs from error-prone or malicious programs. True False

False

True or False? Part of the reason why the Morris worm was successful was that the finger process had Least Privilege instead of Most Privilege. True False

False

True or False? Read-only memory (ROM) is another type of non-persistent storage. True False

False

True or False? The programmer who creates a program has two rights—read and execute—which yields "RX." True False

False

True or False? Your fingerprint is a "something you have" factor. True False

False

True or False? A certificate authority is a trusted third party that issues certificates on behalf of some organization. True False

True

True or False? A computer's basic input/output system (BIOS) is a computer program stored in read-only memory (ROM). True False

True

True or False? A supervisory control and data acquisition (SCADA) device is a computer that controls motors, valves, and other devices in industrial applications. True False

True

True or False? After encrypting a plaintext file, it should actively erase the plaintext file's context and save the encryption. True False

True

What is the single most important feature of stream encryption that could prevent reused key streams? Using a large crypto key Using a truly random crypto key Incorporating a one-way hash Incorporating a nonce

Incorporating a nonce

Section 8.1.1 discusses NIST recommendations for cryptoperiods. Which of the following best summarizes the recommendations? -Issue a new key at least every 2 years but keep using the previous key to ensure that all users retain access to the data. -Issue a new key at least every 2 years and use that key for all subsequent encryption tasks. Use old keys for decryption only as needed. -Issue a new key at least every 2 years and use that key to reencrypt all encrypted data. -Issue a new key at least every 2 years but keep using the previous key(s) to encrypt and decrypt older files.

Issue a new key at least every 2 years and use that key for all subsequent encryption tasks. Use old keys for decryption only as needed.

True or False? Botnets can (often) perform distributed denial of service (DDoS) attacks in which thousands of individual computers send overwhelming amounts of traffic at a victim's computer. True False

True

True or False? Dictionary attacks differ from trial and error attacks because dictionary attacks focus on likely passwords. True False

True

True or False? Every executable file begins with a "file header" that describes the structure and format of the program. True False

True

True or False? Input/output (I/O) circuits provide the electronics to connect other components to the computer. True False

True

True or False? Keyloggers can be hardware or software based. True False

True

True or False? The Advanced Encryption Standard (AES) is stronger than the Data Encryption Standard (DES). True False

True

True or False? The term "security theater" refers to security measures intended to make potential victims feel safe and secure without regard to their effectiveness. True False

True

True or False? When you visit a website with an "https" prefix in the address, the site uses encryption on the web data it sends and receives. True False

True

CIA properties do not include: confidentiality. integrity. authentication. availability.

authentication.

A typical hard drive has an arm, a read/write head, and: All of these are correct. platters. tape reels. a CPU.

platters.

An algorithm is a type of: procedure. unreadable data. readable data. security principle.

procedure.

To switch between two processes, the operating system maintains a collection of data called the: process state. multi-tasking. multi-threading. hyper-threading.

process state.

The term for recovering from computer-related attacks, incidents, and compromises is: premeditation. investigation. remediation. digital forensics.

remediation.

A security decision, such as locking your vehicle when not in use, is an example of: integrity. the hunter's dilemma. rule-based security. None of these is correct.

rule-based security.

The directory access right that allows a user to search for a name in a file's path, but not examine the directory as a whole, is called: delete. read. seek. create.

seek.

The following are fundamental strategies for authenticating people on computer systems, except: something you make. something you have. something you know. something you are.

something you make.

The primary element on a computer motherboard that runs programs and makes the computer work is: firmware. random access memory (RAM). the central processing unit (CPU). an input/output (I/O) circuit.

the central processing unit (CPU).

Supervisory control and data acquisition (SCADA) devices are most often associated with: universities. business offices. retail stores. utilities.

utilities.

True of False? Offline attacks are easily detected. True False

False

The U.S. government standards published by NIST recommended that a secret key be used for no more than _______ years before changing it. 3 1 4 2

2

We have accidentally deleted an important file from the FAT file system. We wish to undelete it. Which of the following statements about the undelete process are true? Select all that apply. -The deleted file's directory entry must still contain the cluster number of the file's first block. -The deleted file's directory entry must still contain enough information for us to identify the file. -We use the FAT to follow the deleted file's cluster chain. -We can always undelete a file from the FAT file system. -All clusters in the deleted file must be stored sequentially.

-The deleted file's directory entry must still contain the cluster number of the file's first block. -The deleted file's directory entry must still contain enough information for us to identify the file. -All clusters in the deleted file must be stored sequentially.

Bob is trying to hide some secret information by using an undersized file system to set aside space for his secrets. Which of the following are true? Select all that apply. -The hidden section may be wiped out accidentally if the normal operating system tries to use too much space on the drive. -The hidden section uses storage that the operating system ignores, except when Bob uses special software. -The hidden storage uses space taken from the regular file system: The regular system is told to only use part of the available space in the partition, and the remaining space is used by the hidden data. -The hidden storage uses extra space on the drive that is made available by special low-level formatting.

-The hidden sections uses storage that the operating system ignores, except when Bob uses special software. -The hidden storage uses space taken from the regular file system: The regular system is told to only use part of the available space in the partition, and the remaining space is used by the hidden data.

Modern storage systems, including hard drives and USB drives, suffer from several types of fragmentation. Which of the following describe typical kinds of fragmentation? Select all that apply. -Wasted space between the end of a file and the end of a cluster -Wasted clusters left in gaps between files on the drive -Delays caused by having a file stored in clusters spread across the drive -Wasted space because a volume partition is too small for a particular collection of files

-Wasted space between the end of a file and the end of a cluster. -Delays caused by having a file stored in clusters spread across the drive. -Wasted space because a volume partition is too small for a particular collection of files.

The fundamental job of every operating system is to run programs, and this relies on: random access memory (RAM) management. All of these are correct. input/output (I/O) management. process management.

All of these are correct.

What are the risks of logging into a system routing as "root" or some other administrative identity? All of these are correct. Exposing the system to a virus or malicious website Files could be erased. Files could be altered.

All of these are correct.

evin is accused by his employer of unauthorized access to a company computer. The employer pursues this as a private action. Which of the following are true about this dispute? Select all that apply. -Based on a shared relationship, like employer and employee -May be resolved informally between the perpetrator and victim, or their legal representatives -The perpetrator is charged with breaking a law. -Requires evidence admissible in court -May require a third party to resolve the issue, like a mediator, judge, and/or jury

Based on a shared relationship, like employer and employee. May be resolved informally between the perpetrator and victim, or their legal representatives.

Which decryption procedure requires two inputs? Select all that apply. Ciphertext Plaintext A key An algorithm

Ciphertext A key

Which of the following is a person who has learned specific attacks on computer systems and can use those specific attacks? Hacker Script kiddy Cracker Phone phreak

Cracker

Below is a list of different access right settings. We want to implement shared update of certain files between Bob and Alice, but with no one else. Which of the following settings achieve this? Select all that apply. -Put Bob and Alice is a user group, and give the group RWX access to the shared files. -Set world access of the shared files to RWX. -Use Windows basic file sharing and make Bob and Alice co-owners of the files. -Assign Bob ownership to Alice's files, and Alice ownership to Bob's files.

Put Bob and Alice is a user group, and give the group RWX access to the shared files. Use Windows basic file sharing and make Bob and Alice co-owners of the files.

The part of a FAT volume that stores files and subdirectories is the: clusters. FAT. boot blocks. root.

clusters.


Conjuntos de estudio relacionados

UNIT 3 EXAM Intracranial Regulation + Infection Exemplars: Seizures and Meningitis

View Set

Spanish 1 Semester 2 Culture review

View Set

PART 7   Ambulance Operations Gaining Access EMS Operations

View Set