EXAM 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The difference between centralized and decentralized infrastructures is ____. A. the key pairs and certificates do not have a set lifetime in centralized infrastructures B. in the location at which the cryptographic key is generated and stored C. the network administrator sets up the distribution points in centralized infrastructures D. the certificate may have an extended lifetime in a decentralized infrastructure

B. The difference between centralized and decentralized infrastructures is in the location at which the cryptographic key is generated and stored.

The process of going through a target's trash is known as ____. A. social engineering B. dumpster diving C. piggybacking D. shoulder surfing

B. The process of going through a target's trash is known as dumpster diving.

What is a hash function?

A hash function is a one-way function that ideally produces a unique output for each input.

What is a structured threat?

A structured threat is an attack that uses coordination, insiders, and lasts for a long time.

What are the different fields within a digital certificate? A. Version number, subject, public key, issuer, serial number, validity, certificate usage, signature algorithm, and extensions. B. Key encipherment, data encipherment, CRL sign, keycert sign, and nonrepudiation. C. End-entity, CA, cross-certification, and policy certification. D. CA identity, individual or party identification, company, and destination

A. A digital certificate should include information about the version number, subject, public key, issuer, serial number, validity, certificate usage, signature algorithm, and extensions.

A process that allows for lost keys to be recovered is called ____. A. key recovery B. key escrow C. key archiving system D. private key protection

A. A process that allows for lost keys to be recovered is called key recovery.

What is a registration authority (RA)? A. An entity that requires proof of identity from the individual requesting a certificate. B. An entity that generates a digitally signed identification certificate. C. A centralized directory in which the registered certificate is stored. D. An entity that generates electronic credentials

A. A registration authority (RA) is an entity that requires proof of identity from the individual requesting a certificate

What is access control? A. All security features used to prevent unauthorized access to a computer system or network. B. Employing security guards. C. Assigning the same access to all users. D. Limiting the Web sites users who are allowed to visit.

A. All security features used to prevent unauthorized access to a computer system or network is called access control.

What is the most common threat to information security in an organization? A. Computer viruses B. Power Surges C. Forgotten Passwords D. SPAM

A. Computer viruses are the most common threat to information security in an organization.

What could happen when a user installs unauthorized hardware such as communication software and a modem to connect to his machine at work?

By installing unauthorized hardware such as communication software and a modem, the user sets up a backdoor into the network. This backdoor can be used by attackers to circumvent all other security mechanisms that the organization has in place.

Individuals who lack technical expertise to develop scripts or discover new vulnerabilities in software, but have only enough understanding to run scripts that others have developed are called ____. A. Script kiddies B. Hacktivist C. Elite hackers D. Intruders

A. Individuals who lack technical expertise to develop scripts or discover new vulnerabilities in software, but have only enough understanding to run scripts that others have developed are called script kiddies.

What is network security? A. Controlling access to internal computers from external entities. B. Limiting the characters used in passwords. C. Ensuring the IIS ports are open on all computers. D. Enabling unauthorized users to access the network

A. Network security refers to controlling access to internal computers from external entities.

What is the most common authentication mechanism? A. Something you know (knowledge factor) B. Something you have (possession factor) C. Something about you (something that you are; inherent factor)

A. The most common authentication mechanism provides something the valid user should know

The process of ____________ involves erasing/wiping a hard disk drive or magnetic tape by changing the magnetic field. A. Degaussing B. Aggregation C. Hacking D. Assemblage

A. The process of degaussing involves erasing/wiping a hard disk drive or magnetic tape by changing the magnetic field

Briefly describe the vulnerabilities that wireless communications create.

Access to wireless networks cannot be tightly controlled, thus, they are more open to attacks. Many wireless systems are installed without any security and the security built into standards such as 802.11 contains many flaws.

__________________________ is the current gold standard for symmetric encryption

Advanced Encryption Standard

What is a digital certificate? A. A means of establishing the validity of an offer. B. A centralized directory in which the registered certificate is stored. C. A means of establishing the user credentials electronically when doing business or other transactions on the Web. D. An entity that generates electronic credentials

C. A digital certificate is a means of establishing the user credentials electronically when doing business or other transactions on the Web

A trust domain is defined as ____. A. the agreed upon, trusted third party B. a scenario where one user needs to validate the other's certificate C. a construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection D. a scenario in which the certificate's issuer and subject fields hold the same information

C. A trust domain is defined as a construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection

A virtual private network (VPN) is a construct used to provide ____. A. users' own Web space on the network B. storage area for employees C. secure communication channel between users across public networks such as the Internet D. a learning area for programming languages

C. A virtual private network (VPN) is a construct used to provide secure communication channel between users across public networks such as the Internet

Which of the following is NOT one of the three basic ways to protect electromagnetic emanations? A. Placing the equipment beyond the point that the emanations can be picked up. B. Providing shielding for the equipment itself. C. Creating a reverse magnetic field around the equipment to cancel waves emanating from or going to the equipment. D. Providing a shielded enclosure (such as a room) to keep the equipment.

C. Creating a reverse magnetic field around the equipment to cancel waves emanating from or going to the equipment does not protect electromagnetic emanations

What is the problem described by the van Eck phenomenon and studied under TEMPEST? A. Electromagnetic pulses destroying sensitive computer equipment. B. Magnetic fields that interfere with signals crossing Local Area Network (LAN) cables. C. Electromagnetic eavesdropping. D. Piggybacking on electromagnetic communications

C. Electromagnetic eavesdropping is the problem described by Eck phenomenon and studied under TEMPEST

What fire-suppression system is recommended for areas with expensive computer equipment? A. Water (sprinklers) B. Hand-held fire extinguishers C. Gas-based D. Sand buckets

C. Gas-based fire-suppression system is recommended for areas with expensive computer equipment

Guidelines in the context of security implementation in an organization are ____. A. Mandatory elements regarding the implementation of a policy B. Step-by-step instructions that describe exactly how employees are expected to act in a given situation or to accomplish a specific task C. Recommendations relating to a policy D. Rules that define the scope of security implementations

C. Guidelines in the context of security implementation in an organization are recommendations relating to a policy

What is "Least Privilege"? A. Setting all system privileges to the same level. B. Learning to teach new employees the system of keeping records. C. User should have only the necessary rights and privileges to perform their. D. Employing individuals from third world countries.

C. Least privilege means users should have only the necessary rights and privileges to perform their tasks.

What kind of media stores data through the rearrangement of magnetic particles on a nonmagnetic substrate? A. Laser B. Optical C. Magnetic D. Static

C. Magnetic media stores data through the rearrangement of magnetic particles on a nonmagnetic substrate.

What is nonrepudiation? A. Never repeating a password. B. Deals with the modification of data. C. The ability to verify that a message has been sent and received. D. Breaking into others' networks.

C. Nonrepudiation refers to the ability to verify that a message has been sent and received.

One of the steps necessary to validate a certificate is to ____. A. explore private key protection B. know certificate authorities C. calculate a message digest for the certificate D. identify the different types of PKIs

C. One of the steps necessary to validate a certificate is to calculate a message digest for the certificate.

Why should organizations construct and implement a PKI? A. To eliminate certificate authorities. B. To provide identification of individuals. C. To provide a higher level of trust than can be obtained through other applications and protocols. D. To enable a centralized directory to store the registered certificate

C. Organizations should construct and implement a PKI to provide a higher level of trust than can be obtained through other applications and protocols

Which of the following programs caused buffer-overflow vulnerability in computers running Microsoft's SQL Server or Microsoft SQL Server Desktop Engine? A. The Morris Worm B. The Love Letter Worm C. The Slammer Worm D. The Code-Red Worm

C. The Slammer worm caused buffer-overflow vulnerability in computers running Microsoft's SQL Server or Microsoft SQL Server Desktop Engine.

What is the main disadvantage of gas-based fire suppression systems? A. It tends to destroy electronic equipment. B. It is extremely difficult to install. C. It is lethal to humans. D. It is very difficult to clean these systems.

C. The main disadvantage of gas-based fire suppression systems is that it is lethal to humans.

What are the security equation attributes of the computer security operational model? A. Prevention = Protection + (Detection) B. Protection = Prevention + (Assurance + Response) C. Protection = Prevention + (Detection + Response) D. Protection = Prevention + (Auditability + Response)

C. The operational model of computer security includes one security equation with these attributes Protection = Prevention + (Detection + Response)

What is the threefold goal of computer security? A. Security, analysis, and database. B. Programming, physical security, and control. C. Confidentiality, integrity, and availability. D. Limits, authority, and customization.

C. The threefold goal of computer security is confidentiality, integrity, and availability.

Which of the following types of passwords would a user generally choose? A. Cryptic passwords. B. Passwords that are 50 characters long. C. Passwords that are easy to remember. D. Special characters only

C. Users generally choose passwords that are easy to remember.

What is cryptanalysis?

Cryptanalysis is the process of analyzing available information and returning the encrypted information in plain text.

What is cryptography?

Cryptography is the study of encrypting data.

What is a certificate repository? A. A directory that calculates a message digest for the certificate. B. An entity that generates electronic credentials. C. A directory that requires a centralized infrastructure. D. A centralized directory in which the registered certificate is stored

D. A certificate repository is a centralized directory in which the registered certificate is stored.

What is an Access Control List (ACL)? A. A list containing all hackers in an area. B. A list of protocols to enter a building. C. A list of unauthorized Web sites. D. A list that contains the subjects that have access rights to a particular object.

D. An access control list is the list that contains the subjects that have access rights to a particular object

True or false? Reverse social engineering is where the attacker contacts the target to gain information.

False. In reverse social engineering, the attacker hopes to convince the target to initiate the contact.

True or false? Insiders attempting access to unauthorized information on the organization server is a harmless activity

False. Insiders attempting access to unauthorized information on the organization server is a form of social engineering.

Fill in the blank: HTTP-based services available over the Internet are collectively called the ____________________.

HTTP-based services available over the Internet are collectively called the WWW or World Wide Web.

What are high-level statements made by the management laying out the organization's position on some issue called? A. Procedures B. Policies C. Guidelines D. Standards

High-level statements made by the management laying out the organization's position on some issue are called policies.

What is information warfare?

Information warfare is warfare conducted against the information and information-processing equipment.

____ _______ is a system by which a private key is stored in a recoverable format

Key escrow.

Asymmetric public and private keys are ____________ linked.

Mathematically.

Fill in the blanks: Media can be divided into ____________________, ____________________, and ____________________ categories

Media can be divided into magnetic, optical, and electronic categories.

Fill in the blank: Modem is short for ____________________.

Modem is short for modulator/demodulator

_____________ means that the senders cannot later deny that they sent the message

Nonrepudiation

What are the common practices organizations enforce regarding passwords?

Organizations encourage users to mix uppercase and lowercase characters and use numbers and special characters in their password. They may also be required to change their passwords frequently. Another consideration is to use different passwords for different accounts.

What poor security practices are followed within an organization?

Poor security practices may be individual practices where users do not follow established security policies or processes, or they may be caused due to lack of security policies, procedures, or training

Fill in the blank: A technique in which attackers position themselves in such a way as to be able to observe the password entered by an authorized user to gain access to a building or log into a system is called ____________________.

Shoulder Surfing

Define symmetric cryptography.

Symmetric cryptography is based on the principle of a shared key that is used for both encrypting and decrypting data

What type of cryptography is faster, symmetric or asymmetric?

Symmetric cryptography is much faster than asymmetric cryptography.

How did the love letter Worm Spread? How is it different from the Melissa virus?

The Love Letter Worm spread via e-mail attachments. Melissa is a macro-type virus that attached itself to documents for programs that had limited macro programming capabilities, whereas in case of the Love Letter worm, the attachments were VBScript programs

What algorithm type is best suited for designing and using cryptography?

The best algorithms are always public algorithms that have been published for peer review by other cryptographic and mathematical experts.

What are the four concerns in security that cryptography attempts to solve?

The four major concerns in security include confidentiality, integrity, nonrepudiation, and authentication

The greatest danger to networks comes from ____. A. Foreign hackers B. Attacks coming across the public switched telephone network C. Natural disasters D. Insiders

The greatest danger to networks comes from insiders.

Fill in the blank: The technique in which an attacker uses various deceptive practices to obtain unauthorized sensitive information is known as ____________________.

The technique in which an attacker uses various deceptive practices to obtain unauthorized sensitive information is known as social engineering.

What are the three elements upon which physical access controls are based?

The three elements upon which physical access controls are based are something you have, something you are, and something you know

Fill in the blank: The two most common modes of virus transfer are transfer of an infected file from one machine to another and ____________________.

The two most common modes of virus transfer are transfer of an infected file from one machine to another and e-mail.

What are the two types of IDSs based on the method of detection?

The two types of IDSs based on the method of detection are signature-based and anomaly-based

What is a public key infrastructure? A. It is a structure that enables e-mail. B. It is a structure that provides all the necessary components to enable users and entities to communicate in a secure and a predictable manner. C. It is a structure that enables secure chat rooms. D. It is another term for digital signature.

B. A public key infrastructure is a structure that provides all the necessary components to enable users and entities to communicate in a secure and a predictable manner

A(n) ____ is a power source (generally powered by batteries) that prevents the halt of processing for critical systems when a power outage or fluctuation occurs. A. Universal Power Source B. Uninterruptible Power Supply C. Universal Power Supply D. Uninhibited Power Service

B. A(n) Uninterruptible Power Supply is a power source (generally powered by batteries) that prevents the halt of processing for critical systems when a power outage or fluctuation occurs.

An in-house certificate authority is ____. A. a CA that is already established and being used by many individuals and companies B. a CA that is maintained and controlled by the company that implemented it C. a CA that provides dedicated services, and possibly equipment, to an individual company D. a CA that provides more flexibility for companies

B. An in-house certificate authority is a CA that is maintained and controlled by the company that implemented it.

Applications that are designed to detect, log, and respond to unauthorized network or host use are ____. A. operating systems B. intrusion detection systems (IDS) C. firewalls D. twisted Wire pairs

B. Applications that are designed to detect, log, and respond to unauthorized network or host use are Intrusion detection systems (IDS)

Computers in a network that host applications and data for everyone to share are ____. A. Linux boxes B. servers C. firewalls D. cryptography

B. Computers in a network that host applications and data for everyone to share are servers.

What is diversity of defense? A. Ensuring data redundancy issues are resolved. B. Making layers of security dissimilar. C. Implementing an affirmative action program. D. Enabling virus protection.

B. Diversity of defense involves making layers of security dissimilar

A hacker whose activities are motivated by a personal cause or position is called a(n) ____. A. Elite hacker B. Hacktivist C. Script kiddies D. Insider

B. Hacktivist

Why is the Morris Worm significant? A. It caused a number of bank transfers (an estimated $10 million). B. It was the first large-scale attack on the internet? C. It deleted all of the design and production programs for a company. D. it disrupted the airport services to the FAA control Tower.

B. Morris worm was the first large-scale attack on the internet.

Preventing unauthorized physical access to a server is the ____. A. responsibility of the CFO of an organization B. primary security concern for a system administrator C. least concern of an organization D. the reason to implement firewalls

B. Preventing unauthorized physical access to a server is the primary security concern for a system administrator.

What is host security? A. Downloading and installing a human firewall. B. Protecting each computer and device individually. C. Adopting a physical security protocol. D. Ensuring software is safe from outsiders.

B. Protecting each computer and device individually is called host security.

Remote Access Service (RAS) ____. A. normalizes database tables automatically B. allows the connection between a client and a server via a dial-up telephone connection C. reads and writes to a hard drive D. allows users to download from the Internet

B. Remote Access Service (RAS) allows the connection between a client and a server via a dial-up telephone connection

What is social engineering? A. The study and design of systems that manage the flow and interaction of people within the system. B. The process of convincing an authorized individual to provide confidential information or access to an unauthorized individual. C. The process of designing an information system that helps to reduce the threat of human weakness. D. A psychological study of how humans interact with computers

B. Social engineering is the process of convincing an authorized individual to provide confidential information or access to an unauthorized individual

What is the technique to counter a shoulder surfing attack?

To counter shoulder surfing, users should ensure that nobody follows them too closely or is in a position to observe their actions

True or False? A switch can be accessed using SNMP and programmed remotely

True. A switch can be accessed using SNMP and programmed remotely

True or false? An insider is more dangerous than an outsider.

True. An insider is more dangerous than an outsider.

True or false? Organizations need to address the issues of providing access to its facility to contractors, consultants, partners, and delivery personnel in addition to employees and nighttime custodial crewmembers and security guards

True. Organizations need to address the issues of providing access to its facility to contractors, consultants, partners, and delivery personnel in addition to employees and nighttime custodial crewmembers and security guards

True or false? Organizations run the risk of information compromise from personnel who not only have physical access to the facility but also have network access.

True. Organizations run the risk of information compromise from personnel who not only have physical access to the facility but also have network access

True/False. Psychological acceptability refers to the users' acceptance of security measures.

True. Psychological acceptability refers to the users' acceptance of security measures

True or false? The technique of closely following a person who has just used an access card or PIN to enter a room or a building is called piggybacking

True. The technique of closely following a person who has just used an access card or PIN to enter a room or a building is called piggybacking

True or false? When people are in a hurry, they do not follow good physical security practices and procedures. Attackers know this and may attempt to exploit this characteristic of the human behavior

True. When people are in a hurry, they do not follow good physical security practices and procedures. Attackers know this and may attempt to exploit this characteristic of the human behavior.

True or False? Workstations are the primary mode of entry for a virus into a network

True. Workstations are the primary mode of entry for a virus into a network.

What are critical infrastructures and how are they related to information warfare?

Water, electricity, oil and gas refineries and distribution, banking and finance, and telecommunications fall into the category of critical infrastructures. In information warfare, the attacker can target these critical infrastructures. Loss of critical infrastructures would have a severe detrimental impact on the nation.

What is a Private Branch Exchange (PBX)?

A Private Branch Exchange (PBX) is a computer-based switching equipment designed to connect telephones to the local phone system.

Who are elite hackers?

An elite hacker is a skilled hacker, who can not only writes scripts that exploit vulnerabilities but also discovers new vulnerabilities

What is an unstructured threat?

An unstructured threat is an attack that is uncoordinated, nonspecific, and lasts for a short time.

Define asymmetric cryptography

Asymmetric cryptography is based on the principle of two keys, one that is public and one that is private. The same key cannot be used for encrypting and decrypting.

Why is social engineering so successful?

Attackers can use social engineering techniques to gain information using various deceptive practices. Since the employees are unaware about what information is sensitive, attackers can gain information by asking a question, evoking sympathy, or appealing to an individual's ego

What is a certificate authority? A. An entity that requires proof of identity from the individual requesting a certificate. B. An entity that generates a digitally signed identification certificate. C. A centralized directory in which the registered certificate is stored. D. An entity that generates electronic credentials

B. A certificate authority is an entity that generates a digitally signed identification certificate

A process of giving keys to a third party so that they can decrypt and read sensitive information is called ____. A. key recovery B. key escrow C. key archiving system D. private key protection

B. A process of giving keys to a third party so that they can decrypt and read sensitive information is called key escrow.

Why should an organization implement the concept of least privilege? A. Helps provide a stable economy for third world countries. B. Ensures all users know the record keeping system. C. Makes users aware about Java. D. Helps an organization protect its most sensitive resources and helps ensure that whoever is interacting with these resources has a valid reason to do so.

D. An organization should implement the concept of least privilege because it helps protect the company's most sensitive resources and helps ensure that whoever is interacting with these resources has a valid reason to do so.

Which of the following is not a common wireless communications method? A. 802.11 standard communications B. Bluetooth C. Cellular D. E.A.R.S. system

D. E.A.R.S. system is not a common wireless communications method

What is authentication? A. Troubleshooting "bugs" in a program. B. Learning to program in HTML. C. Ensuring the network is available to employees. D. Ensuring that individuals are who they claim to be.

D. Ensuring that individuals are who they claim to be is authentication.

An in-house certificate authority is ____. A. a CA that is already established and being used by many individuals and companies B. a CA that is maintained and controlled by the company that implemented it C. a CA that provides dedicated services, and possibly equipment, to an individual company D. a CA that provides more flexibility for companies

D. It provides dedicated services, and possibly equipment, to an individual company.

____ are characterized by the use of a laser to read data stored on a physical device. A. Authentication rules B. FTP sites C. Modems D. Optical media

D. Optical media are characterized by the use of a laser to read data stored on a physical device

What is "Phreaking"? A. Hacking of computer systems used by a phone company. B. Using malicious software on computer systems. C. Writing books about hacking. D. Programming in VB.NET

D. Phreaking refers to the hacking of computer systems used by a phone company.

What is the critical concept common to all PKIs? A. Cryptographic hardware is required for PKI construction. B. The server that centrally stores the keys should not be available. C. The private key must be computer generated and centrally stored. D. Private keys must remain private.

D. The critical concept common to all PKIs is that private keys must remain private.


Ensembles d'études connexes

Chapter 22 VIDE (ADHD), ch 22 NCLEX questions, Chapter 22, Chapter 22: Neurodevelopmental Disorders, Psych CH 22

View Set

Chapter 12 Postpartum Physiological Assessments and Nursing Care

View Set

135 Linux-Pro Chapter 2 to 9 & 13

View Set

Chapter 1 Foundations of Government

View Set

Alterations in Cardiac Function - Chapter 32

View Set