Information Security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The Current record for unamplified 802.11 wireless connection is approximately ____ miles.

240

Which of the following is not a biometric identifier?

A complicated password.

If we are using an identification card as the basis of our authentication scheme, what step might we add to the process to move to multifactor authentication?

A software-based security token

This process allows, limits, denies or revokes the uses of resources.

Access control

Which type of access control would be used in the case where we want to prevent users from logging in to their accounts after business hours?

Attribute-based access controls

Establishment of whether a claim of identity is correct.

Authorization

Why does access control based on MAC addresses of the systems on our network not provide strong security?

Because MAC addresses can be changed with software.

CAPTCHA is an acronym which stands for

Completely Automated Public Turing test to tell Computers and Humans Apart.

___________ accounts are user accounts which are created automatically when an operating system is installed.

Default

This access control model allows the owner of a resource to decide who does and does not have access.

Discretionary access control

What is authentication?

Establishment of whether a claim of identity is correct.

A chief weakness of symmetric key cryptography is the use two different keys.

False

Accountability is of little value against misbehavior

False

Authentication is provides a means to trace activities and accountability is a set of methods used to establish identity.

False

Biometric identifiers are impossible to falsify.

False

Insuring information is available means preventing it from being fabricated, modified or interrupted

False

One of the first encryption tools invented was the Moses Cipher.

False

Regular and timely updates to operating systems and applications are NOT critical to maintaining strong security.

False

Secure protocols send traffic over the network in creartext form.

False

Signature-based intrusion detection systems do not rely on a signature database.

False

The Parkerian hexad is the oldest and simplest model used to discuss information security issues.

False

Which of the following is not a factor in the performance of a biometric system?

False acquaintances

When many operating systems are installed, a default account called a _____________ account is usually created by default.

Guest

Which category of attack is an attack against confidentiality

Interception

What do we call the process in which the client authenticates to the server and the server authenticates to the client?

Mutual authentication

Which of the protocols below is a non-secure protocol?

POP

What biometric factor describes how well a characteristic resists change over time?

Permanence

Preserving the integrity of information means

Preventing information from being favricated, modified or interrupted

In information security, the acronym PKI stands for

Public Key Infrastructure.

Which of the following is a secure protocol?

SFTP

What type of cipher is a Caesar cipher?

Substitution

What is identity verification?

Support for the claim of what someone or something is.

Which of the following best describes plaintext?

Text after it has been decrypted.

Which of the following best describes ciphertext

Text after it has been encrypted.

Which of the following best describes plaintext?

Text before it is encrypted.

A certificate authority (CA) is a trusted entity that handles. digital certificates.

True

Access control lists (ACLs) are a very common choice of access control implementation.

True

Anomaly-based intrusion detection systems can produce a large number of false positives.

True

Host intrusion detection systems are used to analyze the activities on or directed at the network interface of a particular host.

True

In a legal setting, it is often easier to introduce records when the records are produced from a regulated and consistent tracking system.

True

Kerchkhoffs' Principle outlined six principles around which a cryptographic system should be based.

True

Logging mechanisms are often configurable and can be set up to log anything.

True

Non-secure protocols send traffic over a network in cleartext form.

True

Physical security makes it more difficult for attackers to physically access and steal storage media.

True

Sometimes, firewalls are placed in the internal network to prevent network traffic of a sensitive nature from being accessed some users.

True

The ultimate goal in performing assessments is to find and fix vulnerabilities before attackers do.

True

The use of honeypots are somewhat controversial.

True

Threats exploit or take advantage of existing vulnerabilities.

True

_____________ can provide us with a solution for sending sensitive traffic over non-secure networks.

VPN

Which of the following is NOT a method for wireless networks?

WPZ

An audit is

a methodical examination and review

Nmap is an example of

a vulnerability assessment tool

The two main methods of access controls are

access control lists and capabilities.

The chief security officer for your company creates a new set of security guidelines in order to keep customers data more secure. This is an example of

administrative control

Defense in depth is a concept which

advocates multiple layers should be used to help prevent information security attacks.

Proper network design

can help prevent some attacks entirely and mitigate others

Which of the items below would we not want to audit for information security purposes.

company's stock price

Anomaly-based intrusion detection systems

consider traffic different than baseline traffic to be abnormal

Network segmentation boosts network performance by

containing certain network traffic to areas where it needs to be accessed

Two words which mean the same thing as decryption

decode, decipher

In information security, DMZ is an acronym for

demilitarized zone

Firewalls use packet filtering to

determine whether the traffic will be allowed to pass

Network segmentation is

dividing a network into multiple smaller networks called subnets

Two other terms which mean the same thing as encrypt

encode, encipher

The following are logical controls:

encryption, passwords and usernames.

A block cipher

encrypts a predetermined number of bits in the plain text message.

A stream cipher

encrypts each bit in the plain text message 1 bit at a time.

The principle of least privilege dictates

give bare minimum access to a user based on that user's functionality.

A collection of honeypots working together is called a

honeynet

A firewall is a network security device which controls traffic that flows

into and out of networks

A vulnerability

is a weakness that can be used to harm us.

Some people consider accountability a bad idea because it

is akin to Big Brother watching over your shoulder.

Identification

is the claim of what someone or something is.

One benefit of logging is

it gives a history of activities that have taken place in a computing environment.

Many employers utilize proxy servers to

keep employees from visiting inappropriate web sites

Confidentiality refers to

keeping information private

Intrusion detection systems

monitors network traffic as it comes into the network

We typically place firewalls

on the border of a network

One of the easiest ways to lessen threats and vulnerabilities on computing devices is

operating system hardening.

Network ACLs typically control access with Internet Protocol (IP) addresses, Media Access Control (MAC) addresses and

ports

VPNs are often used to allow __________ workers to connect to the internal resources of an organization.

remote

Operating system hardening involves all of the following except

removing power from systems.

A protocol analyzer is also known as a

sniffer

In nonrepudiation

sufficient evidence exists as to prevent denial of an action.

The DMZ is primarily for systems

that need to be exposed to the Internet

Allowing a user account the absolute minimum permission needed for it to carry out its necessary functions is

the principle of least privilege

Attack surface of a computing system refers to

the total number of available avenues through which operating systems might be attacked.

Deep packet inspection firewalls are controversial because

they can allow someone to eavesdrop on emails, web browsing and instant messaging conversations

We should configure and turn on logging and auditing features for our systems

to keep an accurate and complete record of the important processes and activities.

A _____________ is an encrypted connection between two points.

tunnel

The most complex passwords consists of.

uppercase and lowercase letters and numbers and symbols.

Symmetric key algorithms

use one key to both encrypt and decrypt plain text.

Asymmetric algorithms

use one key to encrypt plain text and another key to decrypt cipher text.

A stateful firewall

utilizes a state table to keep track of the connections made through the firewall

A honeypot is

vulnerable system usually place in the DMZ

Signature-based intrusion detection systems

work like antivirus systems


Ensembles d'études connexes

Ch.16 - Integrated Marketing Communications (IMC)

View Set

Psychology Module 41- Anxiety Disorders, OCD, and PTSD

View Set

Lecture/Studies Note/ Social Psychology Exam #3 Study Guide

View Set

Gero Chapter 21: Cognitive Impairment

View Set

Med Surge Musculoskeletal Prep U

View Set

Ch. 3 The Language of the DeafWorld

View Set