CIS 350
IEEE ____ addresses both weaknesses of WEP by allowing the keys, encryption algorithms, and negotiation to be dynamically assigned, and by adopting the AES encryption based on the Rijndael algorithm with 128-, 192-, or 256-bit keys.
802.11i
A ____ is a list of certificates that have been revoked before their originally scheduled expiration date
certificate revocation list (CRL)
A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key
digital signature
A(n) ____ is the computer program that converts plaintext into an enciphered form
encryption algorithm
An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____
integrity checking
A ____ virus is a common type of virus that is programmed into an attached macro file
macro
One very common technique to attack a system is to deliver an e-mail or Web page that contains a malicious piece of code called a ____
mobile malicious code
A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters
monoalphabetic
The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers
packet filter
Perhaps the most common form of protection from unauthorized use of a computer system is the ___
password
A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available
ping
A ____ virus mutates with every infection, thus making them difficult to locate
polymorphic
The concept of two keys, public and private, is called ____ cryptography
public key
Some common types of denial of service include e-mail bombing, ____, and ping storm
smurfing
If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____
spoofing
The opposite of asymmetric encryption is ____ encryption, in which one key is used to encrypt and decrypt
symmetric
A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved
transposition-based
Many people consider the Trojan horse to be a form of computer ___
virus
cable represented a major improvement in the ability of transmission media to secure sensitive data.
Fiber-optic
is a set of protocols created to support the secure transfer of data at the IP layer
IPsec (IP security)
_ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography
Kerberos
_ is data before any encryption has been performed
Plaintext
____ is the combination of encryption techniques, software, and services that involves all the necessary pieces to support digital certificates, certificate authorities, and public key generation, storage, and management.
Public key infrastructure (PKI)
is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast addressing and other aspects of Internet operation
Smurfing
___ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth.
Spread spectrum
_ may be considered a form of physical protection
Surveillance
Possibly the earliest example of a polyalphabetic cipher is the ____ cipher
Vigenére
The first security protocol for wireless LANs was ____
Wired Equivalency Protocol (WEP)
Many certificates conform to the ____ standard
X.509
usually involves having a software program that monitors every transaction within a system
Computer auditing
The ____ is a commonly employed encryption method used by businesses to send and receive secure transactions
Data Encryption Standard (DES)
spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values
Direct sequence
