Study IT

¡Supera tus tareas y exámenes ahora con Quizwiz!

The first 802.11 standard to gain broad industry acceptance was _________.

802.11b

The master session key is also known as the __________ key

AAA

The _________ is the node that is attempting to access the network and may be any device that is managed by the network access control system

AR

_________ attacks include impersonating another user, altering messages in transit between client and server and altering information on a Web site .

Active

__________ attacks attempt to alter system resources or affect their operation.

Active

__________ approach is vulnerable to man-in-the-middle attacks

Anonymous Diffie-Hellman

An SSL session is an association between a client and a server and is created by the ___________

Handshake Protocol

__________ provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet.

IPsec

_________ is a professional membership society with worldwide organizational and individual membership that provides leadership in addressing issues that confront the future of the Internet and is the organization home for the groups responsible for Internet infrastructure standards, including the IETF and the IAB.

ISOC

_________ enables customers to combine basic computing services, such as number crunching and data storage, to build highly adaptable computer systems.

IaaS

__________ is a centralized, automated approach to provide enterprise wide access to resources by employees and other authorized individuals, with a focus of defining an identity for each user, associating attributes with the identity, and enforcing a means by which a user can verify identity

Identity management

A ___________ is a service or user that is known to the Kerberos system and is identified by its principal name

Kerberos principal

_________ is software that collects information from a computer and transmits it to another system

Spyware

The SSL Internet standard version is called _________

TLS

A ________ takes as input a source that is effectively random and is often referred to as an entropy source.

TRNG

If the message includes a _________ the receiver is assured that the message has not been delayed beyond that normally expected for network transit

Timestomp

The _________ method uses information contained on an infected victim machine to find more hosts to scan.

Topological

The _________ payload allows peers to identify packet flows for processing by IPsec services.

Traffic Selector

_________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

Traffic padding

A polymorphic virus creates copies during replication that are functionally equivalent but have distinctly different bit patterns, in order to defeat programs that scan for viruses.

True

An end user whose system is equipped with IP security protocols can make a local call to an ISP and gain secure access to a company network.

True

As a default, PGP compresses the message after applying the signature but before encryption.

True

Data must be secured while at rest, in transit, and in use, and access to the data must be controlled.

True

IP security is a capability that can be added to either current version of the Internet Protocol by means of additional headers.

True

MAC spoofing occurs when an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network privileges

True

Malware can be put into two broad categories, based first on how it spreads or propagates to reach the desired targets and then on the actions or payloads it performs once a target is reached.

True

Network access control authenticates users logging into the network and determines what data they can access and actions they can perform.

True

One of the major roles of public-key encryption is to address the problem of key distribution.

True

PGP incorporates tools for developing public-key certificate management and a public-key trust model

True

Propagation mechanisms include system corruption, bots, phishing, spyware, and rootkits.

True

SSL/TLS includes protocol mechanisms to enable two TCP users to determine the security mechanisms and services they will use.

True

Server authentication occurs at the transport layer, based on the server possessing a public/private key pair.

True

The Extensible Authentication Protocol supports multiple authentication methods.

True

The Security Parameters Index identifies a security association

True

The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets

True

The automated key distribution approach provides the flexibility and dynamic characteristics needed to allow a number of users to access a number of servers and for the servers to exchange data with each other.

True

The key legitimacy field is derived from the collection of signature trust fields in the entry.

True

The main advantage of HMAC over other proposed hash based schemes is that HMAC can be proven secure, provided that the embedded hash function has some reasonable cryptographic strengths.

True

The objective of MIME Transfer Encodings is to provide reliable delivery across the largest range of environments.

True

The principal underlying standard for federated identity is the Security Assertion Markup Language (SAML) which defines the exchange of security information between online business partners.

True

The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.

True

Viruses and worms are two examples of software attacks.

True

The term used for certified 802.11b products is ___________

Wi-Fi

The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity is _________ .

accountability

A Pseudorandom Function takes as input:

all of the above

The __________ mechanism assures that a received packet was in fact transmitted by the party identified as the source in the packet header and assures that the packet has not been altered in transit.

authentication

If the analyst is able to get the source system to insert into the system a message chosen by the analyst, a _________ attack is possible.

chosen plaintext

The specification of a protocol along with the chosen key length is known as a __________

cipher suite

Broad network access, measured service, resource pooling, and rapid elasticity are essential characteristics of ___________

cloud computing

A ________ is a person, organization, or entity responsible for making a service available to interested parties.

cloud provider

It is computationally infeasible to find any pair (x, y) such that H(x) = H(y). A hash function with this property is referred to as __________ .

collision resistant

With a _________ infrastructure, the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns.

community cloud

The protection of data from unauthorized disclosure is _________ .

data confidentiality

PGP provides authentication through the use of _________

digital signatures

The _________ algorithm performs various substitutions and transformations on the plaintext.

encryption

The __________ enables the recipient to determine if the correct public key was used to decrypt the message digest for authentication

leading two octets of message digest

A __________ takes place when one entity pretends to be a different entity.

masquerade

The __________ subtype is used when the different parts are independent but are to be transmitted together. They should be presented to the receiver in the order that they appear in the mail message

multipart/mixed

A symmetric block cipher processes _________ of data at a time.

one block

A _________ is a key used between entities for the purpose of distributing session keys.

permanent key

A __________ virus is a virus that mutates with every infection, making detection by the "signature" of the virus impossible.

polymorphic

X.800 defines _________ as a service that is provided by a protocol layer of communicating open systems and that ensures adequate security of the systems or of data transfers.

security service

A __________ processes the input elements continuously, producing output one element at a time, as it goes along

stream cipher

If both sender and receiver use the same key the system is referred to as _________ encryption

symmetric

In order to solve the problem of minimizing the number of times that a user has to enter a password and the problem of a plaintext transmission of the password a __________ server is used.

ticket granting

Authentication applied to the entire original IP packet is _________ .

tunnel mode

With each element of the list defining both a key exchange algorithm and a CipherSpec, the list that contains the combination of cryptographic algorithms supported by the client in decreasing order of preference is the __________

CipherSuite

A _________ attack is an attack on a computer system or network that causes a loss of service to users.

DDoS

_________ are entities that obtain and employ data maintained and provided by identity and attribute providers, which are often used to support authorization decisions and to collect audit information.

Data Consumers

The purpose of the _________ algorithm is to enable two users to exchange a secret key securely that then can be used for subsequent encryption of messages and depends on the difficulty of computing discrete logarithms for its effectiveness.

Diffie-Hellman

With the ________ mode if there is an error in a block of the transmitted ciphertext only the corresponding plaintext block is affected

ECB

A connection-oriented integrity service deals with individual messages without regard to any larger context and generally provides protection against message modification only

False

A loss of confidentiality is the unauthorized modification or destruction of information.

False

A means of generating predictable PGP session keys is needed.

False

A network access server does not include its own authentication services.

False

An individual SA can implement both the AH and the ESP protocol

False

Cryptographic hash functions generally execute slower in software than conventional encryption algorithms such as DES

False

Data origin authentication provides protection against the duplication or modification of data units.

False

IEEE 802.11 defines seven services that need to be provided by the wireless LAN to achieve functionality equivalent to that which is inherent to wired LANs

False

IPSec can guarantee that all traffic designated by the network administrator is authenticated but cannot guarantee that it is encrypted.

False

If an opponent captures an unexpired service granting ticket and tries to use it they will be denied access to the corresponding service

False

It is not necessary for a certification authority to maintain a list of certificates issued by that CA that were not expired but were revoked.

False

Message encryption alone provides a secure form of authentication.

False

Microsoft Word, Excel files, and Adobe PDF are document files that are safe from being infected by viruses.

False

Patient allergy information is an example of an asset with a moderate requirement for integrity.

False

Phase 3 completes the setting up of a secure connection of the Handshake Protocol.

False

Security policies for mobile devices should assume that any mobile device will not be stolen or accessed by a malicious party

False

Sensors and robots, are not vulnerable to physical attacks.

False

The encryption of the compressed message plus the MAC must increase the content length by more than 1024 bytes.

False

The security of the Diffie-Hellman key exchange lies in the fact that, while it is relatively easy to calculate exponentials modulo a prime, it is very easy to calculate discrete logarithms.

False

The use of 802.1X cannot prevent rogue access points and other unauthorized devices from becoming insecure backdoors.

False

Worms cannot spread through shared media, such as USB drives or CD and DVD data disks.

False

Typically housed in the user's computer, a _________ is referred to as a client e-mail program or a local network e-mail server

Message User Agent

_________ identifies the type of data contained in the payload data field by identifying the first header in that payload

Next Header

___________ and links, such as personal network Bluetooth devices, barcode readers, and handheld PDAs, pose a security risk in terms of both eavesdropping and spoofing

Nontraditional networks

_________ is the original message or data that is fed into the algorithm as input

Plaintext

MIME is an extension to the ________ framework that is intended to address some of the problems and limitations of the use of SMTP

RFC 5322

The most important hash function is ________

SHA

Secure Hash Algorithms with hash value lengths of 256, 384, and 512 bits are collectively known as _________

SHA-2


Conjuntos de estudio relacionados

US Gov / Econ Chapter 1 Study Guide:

View Set

Chapter 25, Newborn Nutrition and Feeding

View Set

Chapt 1 Introduction to Computer Programming

View Set

Review Nernst and Goldman Equations

View Set

Chapter 14: Consumer Decision Process and Problem Recognition

View Set

Ch. 1 - Body cavities and membranes

View Set

Module 2 American History Study Guide

View Set

QUE S'EST-IL PASSE AVEC LE COMMANDEMENT DU SABBAT ?

View Set