253 Cybersecurity Chapter 1 - 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a message authentication code?

A secret key to generate a small block of data. A cryptographic checksum on data that uses a session key to detect both accidental and intentional modifications of the data.

The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________. A) AES B) DSS C) RSA D) SHA

A) AES

__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance. A) Access control B) Resource control C) System control D) Audit control

A) Access control

__________ is verification that the credentials of a user or other system entity are valid. A) Authentication B) Authorization C) Adequacy D) Audit

A) Authentication

_________ is the granting of a right or permission to a system entity to access a system resource. A) Authorization B) Control C) Monitoring D) Authentication

A) Authorization

A concept that evolved out of requirements for military information security is ______ . A) mandatory access control B) discretionary input C) reliable input D) open and closed policies

A) mandatory access control

A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key. A) secret key B) digital signature C) keystream D) one way hash function

B) digital signature

The most common means of human-to-human identification are __________. A) signatures B) facial characteristics C) fingerprints D) retinal patterns

B) facial characteristics

A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords. A) proactive password checking B) reactive password checking C) user education D) computer-generated password

B) reactive password checking

A _________ protects against an attack in which one party generates a message for another party to sign. A) digital signature B) strong hash function C) weak hash function D) data authenticator

B) strong hash function

__________ controls access based on comparing security labels with security clearances. A) RBAC B) DAC C) MAC D) MBAC

C) MAC

__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed. A) System Integrity B) Availability C) Privacy D) Data Integrity

C) Privacy

________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system. A) Availability B) Confidentiality C) System Integrity D) Data Integrity

C) System Integrity

A loss of _________ is the unauthorized disclosure of information. A) integrity B) authenticity C) confidentiality D) availability

C) confidentiality

Transmitted data stored locally are referred to as __________ . A) ECC B) ciphertext C) data at rest D) DES

C) data at rest

A(n) _________ is an attempt to learn or make use of information from the system that does not affect system resources. A) outside attack B) active attack C) passive attack D) inside attack

C) passive attack

Recognition by fingerprint, retina, and face are examples of __________. A) token authentication B) dynamic biometrics C) static biometrics D) face recognition

C) static biometrics

The __________ strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords. A) proactive password checking B) reactive password checking C) user education D) computer-generated password

C) user education

A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy is a(n) __________. A) countermeasure B) adversary C) vulnerability D) risk

C) vulnerability

Consider a telephone switching system that routes calls through a switching network based on the telephone number requested by the caller. Give examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement.

Confidentiality - This is extremely important since offenders can monitor and record user conversations and track their calls. Integrity - This is important because customers expect calls to be routed to the right number accurately. Availability - This is somewhat important because customers should be able to use telephone switching systems whenever they need them.

__________ is the traditional method of implementing access control. A) MBAC B) MAC C) RBAC D) DAC

D) DAC

__________ systems identify features of the hand, including shape, and lengths and widths of fingers. A) Fingerprint B) Palm print C) Signature D) Hand geometry

D) Hand geometry

An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) __________. A) asset B) risk C) vulnerability D) attack

D) attack

A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. A) hash function B) mode of operation C) cryptanalysis D) brute-force attack

D) brute-force attack

A(n) __________ is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that correct action can be taken. A) protocol B) attack C) adversary D) countermeasure

D) countermeasure

Each individual who is to be included in the database of authorized users must first be __________ in the system. A) verified B) identified C) authenticated D) enrolled

D) enrolled

The purpose of a __________ is to produce a "fingerprint" of a file, message, or other block of data. A) digital signature B) secret key C) keystream D) hash function

D) hash function

A ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. A) moderate B) low C) normal D) high

D) high

Combined one byte at a time with the plaintext stream using the XOR operation, a __________ is the output of the pseudorandom bit generator. A) digital signature B) secure hash C) message authentication code D) keystream

D) keystream

A __________ is a password guessing program. A) password hash B) password salt C) password biometric D) password cracker

D) password cracker

__________ access control controls access based on the identity of the requestor and on access rules stating what requestors are or are not allowed to do.

Discretionary

Depending on the details of the overall authentication system, the registration authority issues some sort of electronic credential to the subscriber.

False

External devices such as firewalls cannot provide access control services.

False

Like the MAC, a hash function also takes a secret key as input.

False

Public-key algorithms are based on simple operations on bit patterns.

False

Security labels indicate which system entities are eligible to access certain resources.

False

The "A" in the CIA triad stands for "authenticity".

False

The authentication function determines who is trusted for a given purpose.

False

The purpose of the DSS algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

False

Threats are attacks carried out.

False

User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.

False

A good technique for choosing a password is to use the first letter of each word of a phrase.

True

An auditing function monitors and keeps a record of user accesses to system resources.

True

An important element in many computer security services and applications is the use of cryptographic algorithms.

True

Availability assures that systems works promptly and service is not denied to authorized users.

True

Computer security is protection of the integrity, availability, and confidentiality of information system resources.

True

Data integrity assures that information and programs are changed only in a specified and authorized manner.

True

Identification is the means of establishing the validity of a claimed identity provided by a user.

True

The more critical a component or service, the higher the level of availability required.

True

The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner.

True

The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.

True

User authentication is the basis for most types of access control and for user accountability.

True

Replay, masquerade, modification of messages, and denial of service are example of _________ attacks.

active

There are three key elements to an ABAC model: attributes which are defined for entities in a configuration; a policy model, which defines the ABAC policies; and the __________ model, which applies to policies that enforce access control.

architecture

A(n) _________ is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat consequence.

attack

An independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy and procedures is a(n) __________.

audit

A loss of _________ is the disruption of access to or use of information or an information system.

availability

A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.

biometric

A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block

block cipher

A(n) _________ is any means taken to deal with a security attack.

countermeasure

The assets of a computer system can be categorized as hardware, software, communication lines and networks, and _________.

data

A __________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.

denial of service

A __________ access control scheme is one in which an entity may be granted access rights that permit the entity, by its own volition, to enable another entity to access some resource.

discretionary

Voice pattern, handwriting characteristics, and typing rhythm are examples of __________ biometrics

dynamic

The simplest approach to multiple block encryption is known as __________ mode, in which plaintext is handled b bits at a time and each block of plaintext is encrypted using the same key.

electronic codebook

Access control is the central element of computer security.

True

Many users choose a password that is too short or too easy to guess.

True

Public-key cryptography is asymmetric.

True

Reliable input is an access control requirement.

True

Some form of protocol is needed for public-key distribution.

True

User authentication is the fundamental building block and the primary line of defense.

True

Role hierarchies make use of the concept of __________ to enable one role to implicitly include access rights associated with a subordinate role.

inheritance

A host generated random number is often called a __________.

nonce

Release of message contents and traffic analysis are two types of _________ attacks.

passive

A __________ dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role and can be used to structure the implementation of the least privilege concept.

prerequisite

The __________ is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption.

public and private key

A __________ is a separate file from the user IDs where hashed passwords are kept.

shadow password file

A __________ processes the input elements continuously, producing output one element at a time.

stream cipher

Objects that a user possesses for the purpose of user authentication are called ______

tokens

The two criteria used to validate that a sequence of numbers is random are independence and _________ .

uniform distribution


Ensembles d'études connexes

Information Technology Project Management Mid Term

View Set

APUSH Chapter 13-17 Exam questions

View Set

Read & Interact: Wild: Chapter 9

View Set

Insurance exam review 9. Life Insurance

View Set

Chapter 21: Care of the Normal Newborn

View Set

International Business Final Exam

View Set

Unit 1: Sexuality -STI HPV (Human Papillomavirus)

View Set

5.4.2 Standard Deviation and Variance

View Set

Customer Service Chapter 4 Vocabulary

View Set