Week 3 - Practice Test

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is the most basic type of firewall?

Screening firewall

Which of the following is the best definition for spyware?

Software that monitors activity on a computer

What does SPI stand for?

Stateful packet inspection

If a company purchases a high-end UNIX server to use for its research and development department, what is probably the most valuable part of the system?

The information on the server

Which of the following is most true regarding certified encryption methods?

There is no such thing as certified encryption.

Which of the following is most true regarding binary operations and encryption?

They can form a part of viable encryption methods.

Which binary mathematical operation can be used for a simple (but unsecured) encryption method and is, in fact, a part of modern symmetric ciphers?

XOR

Information is an asset to your company if it:

costs any sum of money to produce.

Which of the following types of information would be a likely target for industrial espionage?

All of these

In the context of preventing industrial espionage, why might you wish to limit the number of company CD burners and control access to them in your organization?

An employee could use such media to take sensitive data.

Which of the following methods uses a variable-length symmetric key?

Blowfish

How do most antispyware packages work?

By looking for known spyware

Which of the following is the oldest encryption method?

Caesar cipher

It is important to understand the concepts and application of cryptography. Which of the following most accurately defines encryption?

Changing a message so it can only be easily read by the intended recipient

Which of the following is a symmetric key system that uses 64-bit blocks?

DES

What is the greatest security risk to any company?

Disgruntled employees

What is the usual motivating factor for corporate/industrial espionage?

Economic

Which of the following is the correct term for making a system less attractive to intruders?

Intrusion deterrence

What is the advantage of a symmetric key system using 64-bit blocks?

It is fast.

Which of the following is most likely to be true of an encryption method that is advertised as unbreakable?

It is likely to be exaggerated.

Many classic ciphers are easy to understand but not secure. What is the main problem with simple substitution?

It is too simple.

Accurate statistics on corporate espionage are difficult to obtain. One reason is that the victims don't always report the crime, as they often don't want the incidents to become public. Which of the following is a likely reason that an organization might be reluctant to admit it has been a victim of corporate espionage?

It might cause stock value to decline.

Which of the following is a disadvantage of using an application gateway firewall?

It uses a great deal of resources.

What is a major weakness with a network host-based firewall?

Its security depends on the underlying operating system.

What is one way of checking emails for virus infections?

Look for subject lines that are from known virus attacks.

Which of the following is most true regarding new encryption methods?

Never use them until they have been proven.

What is the difference between corporate and industrial espionage?

None; they are interchangeable terms.

Which of the following methods is available as an add-in for most email clients?

PGP

What is the term for blocking an IP address that has been the source of suspicious activity?

Preemptive blocking

What is PGP?

Pretty Good Privacy, a public key encryption method

What type of encryption uses different keys to encrypt and decrypt the message?

Public key

Information is a valuable asset. It can be useful to calculate that value in order to determine how much effort should be put into protecting it. What formula can you use to calculate the value of information?

Resources needed to produce the information plus resources gained from the information

What is the term for a firewall that is software installed on an existing server?

Screened host

What are TSR programs?

Terminate and stay resident programs, which stay in memory after you shut them down

Why would you want to scan an employee's computer when he leaves the organization?

To check for signs of corporate espionage

Which of the following is the most common way for a virus scanner to recognize a virus?

To compare a file to known virus attributes

Terrance is trying to explain industrial espionage to a group of new security techs. What is the ultimate goal of espionage?

To obtain information not otherwise available

In order to truly understand industrial espionage, you need to understand the mindset of the spy. What is the best outcome for a spy attempting an espionage activity?

To obtain information without the target even realizing he did so

What is the reason for encrypting hard drives on laptop computers?

To prevent a thief from getting data off of a stolen laptop

What size key does a DES system use?

56 bit

Classic ciphers were improved with the addition of multiple shifts (multiple substitution alphabets). Which of the following is an encryption method that uses two or more different shifts?

Multi-alphabet encryption

What is the highest level of security you can expect to obtain?

A level of security that makes the effort required to get information more costly than the value of the information

What method do most IDS software implementations use?

Anomaly detection

Why is binary mathematical encryption not secure?

It does not change the letter or word frequency.

Which of the following is not one of the basic types of firewalls?

Heuristic firewall

What is the name for scanning that depends on complex rules to define what is and is not a virus?

Heuristic scanning

What is the term for a fake system designed to lure intruders?

Honey pot

What should you be most careful of when looking for an encryption method to use?

How long the algorithm has been around


Ensembles d'études connexes

Letra Ñ Español palabras con la letra eñe

View Set

APUSH Native American Policy and Issues

View Set

Psychological Inquiry 2021 Fall Semester Final Study Guide

View Set

Biology in Focus Textbook: Chapter 7 - Cellular Respiration and Fermentation

View Set

Health Promotion Across the Lifespan

View Set

Unit 1: Oxygenation/Respiratory Function

View Set

Lecture 08—The Coming of the Germans and Visigothic Spain

View Set