infosex 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What type of application attack occurs when data goes beyond the memory areas allocated to the application?

buffer overflow

What technology should you implement to ensure that an individual cannot later claim that he or she did not sign a given document?

digital signature

What kind of integrity does a database have when all its rows have a unique identifier called a primary key?

entity integrity

A user has a large amount of data that needs to be kept confidential. Which algorithm would best meet this requirement?

3DES

Which algorithm will Windows use by default when a user intends to encrypt files and folders in an NTFS volume?

AES

An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?

Availability

What vulnerability occurs when data is written beyond the memory areas allocated to an application?

Buffer overflow

An organization's IT department reports that their web server is receiving an abnormally high number of web page requests from different locations simultaneously. What type of security attack is occurring?

Ddos

A security specialist is asked for advice on a security measure to prevent unauthorized hosts from accessing the home network of employees. Which measure would be most effective?

Implement a firewall.

Which of the following firewalls filters traffic based on source and destination IP addresses?

Network layer firewall

Which of the following firewalls filters web content requests such as URLs and domain names?

Proxy server

You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select?

SHA-256

Which protocol would be used to provide security for employees that access systems remotely from home?

SSH

What is a feature of a cryptographic hash function?

The hash function is a one-way mathematical function.

Passwords, passphrases, and PINs are examples of which security term?

authentication

What is the most difficult part of designing a cryptosystem?

key management

Which methods can be used to implement multifactor authentication?

passwords and fingerprints

What technique creates different hashes for the same password?

salting

What is a nontechnical method that a cybercriminal would use to gather sensitive information from an organization?

social engineering

Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network?

worm


Ensembles d'études connexes

Chapter 4 : Application Software : Vocabulary

View Set

AP World History Must Know Dates: 1900-Present

View Set

The advantages and disadvantages of modern technology

View Set