CPSC 353 FINAL TERMS

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The most widely used encryption scheme is based on the _________ adopted in 1977 by the National Bureau of Standards. AES 3DES CES DES

DES

The wireless environment lends itself to a ______ attack because it is so easy for the attacker to direct multiple wireless messages at the target. DoS man-in-the-middle network injection identity theft

DoS

________ requires that a user prove his or her identity for each service invoked and, optionally, requires servers to prove their identity to clients. FIM Kerberos X.509 PKI

Kerberos

______ security protects computer-based data from software-based and communication-based threats. Infrastructure Premises Physical Logical

Logical

_______ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards. Premises Infrastructure Logical Physical

Premises

______ includes data processing and storage equipment, transmission and networking facilities, and offline storage media. Supporting facilities Physical facilities Information system hardware Infrastructure facilities

Premises Information system hardware

The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption. SHA-1 HMAC MD5 RSA

RSA

________ facilities include electrical power, communication services, and environmental controls such as heat and humidity. Supporting Information Physical All of the above

Supporting

______ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack. Human-caused Technical EMI Environmental

Technical

What is the kernel space in Linux-based operation systems? a. Refers to memory used by the Linux kernel and its loadable modules e.g. device drivers b. Is a thin layer of air surrounding the CPU core c. A video game that's part of many Linux distributions d. Refers to memory used by the Linux kernel swapped onto the main hard drive

a. Refers to memory used by the Linux kernel and its loadable modules e.g. device drivers

What does EAL stand for in the context of trusted operating systems? a. Escalation Access Level b. Evaluation Assurance Level c. Equal Assurance Logistics d. None of the above

b. Evaluation Assurance Level

Security awareness, training, and education programs can serve as a deterrent to fraud and actions by disgruntled employees by increasing employees' knowledge of their ________ and of potential penalties. a. regulations b. accountability c. liability d. incidents

b. accountability

A _______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes that are indicated for countermeasures. a. security audit trail b. security audit c. user-level audit d. system-level audit trail

b. security audit

A ________ attack involves trying all possible private keys. mathematical timing brute-force chosen ciphertext

brute-force

Which are an example of components in Windows that make up the fundamental security infrastructure? a. Active Directory (AD) b. The Local Security Authority (LSA) c. A and B d. Neither A nor B

c. A and B

If the analyst is able to get the source system to insert into the system a message chosen by the analyst, then a ________ attack is possible. known-plaintext chosen-plaintext chosen ciphertext chosen text

chosen-plaintext

What are common flaws in operating systems a. Size: millions of lines of code make vulnerabilities difficult to recognize b. One compromised application can impact entire computer c. Applications cannot authenticate themselves to each other d. All of the above

d. All of the above

______ is a benefit of security awareness, training, and education programs to organizations. a. Improving employee behavior b. Increasing the ability to hold employees accountable for their actions c. Mitigating liability of the organization for an employee's behavior d. All of the above

d. All of the above

The defenses with Windows can be grouped into four broad categories a. User defenses, Memory corruption defenses, Network defenses, Application defenses b. Device defenses, Memory corruption defenses, Internet defenses, Account defenses c. Memory corruption defenses, Network defenses, Account defenses d. Browser defenses, Memory corruption defenses, Network defenses, Account defenses

d. Browser defenses, Memory corruption defenses, Network defenses, Account defenses

_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the target system without authorization or payment, or to alter the integrity of data or interfere with the availability of the computer or server. a. Computers as targets b. Computers as storage devices c. Computers as mediums d. Computers as communication tools

d. Computers as communication tools

A benefit of IPsec is __________. a. that it is below the transport layer and transparent to applications. b. there is no need to revoke keying material when users leave the organization c. it can provide security for individual users if needed d. all of the above

d. all of the above

Security auditing can: a. provide data that can be used to define anomalous behavior b. maintain a record useful in computer forensics c. generate data that can be used in after-the-fact analysis of an attack d. all of the above

d. all of the above

The most complex part of TLS is the __________. signature message header payload handshake protocol

handshake protocol

A _______ is a generic term used to denote any method for storing certificates and CRLs so that they can be retrieved by end entities. RA registration repository CA

repository

The exact substitutions and transformations performed by the algorithm depend on the ________. ciphertext decryption algorithm secret key encryption algorithm

secret key


Ensembles d'études connexes

Hubspot Inbound Marketing part 4

View Set

Anatomy Chapter 11 Autonomic Nervous System

View Set

Conectores de Causa y de Consecuencia

View Set