Info Sec Midterm study

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In information security PKI stands for_________________

Public Key Infrastructure

Examples of Asymm Encryption algorithms

RSA ElGamal

Examples of digital signature algorithsm

RSA Elliptic Curve DSA

Octal Codes Read Write Execute

Read 4 Write 2 Execute 1

In a PKI, what role does the CA play? (Choose all that apply) Revokes Cerificates Uses its private key to digitally sign certifictaes Uses its public key to digitally sign certifictaes Filters malicious packets

Revokes Cerificates Uses its private key to digitally sign certifictaes

Which two authentication factors are used when a server sends your cell phone a code and asks you to enter your password for the site? (There may be more than one. Choose all that apply) Something you know Something you have Something you are None of these

Something you know Something you have

Match the statement to True or False. Asking a user for a pin number and a password would qualify for two-factor authentication. Authentication implies what the authenticated party is allowed to do. Uniqueness is an important characteristic to have for biometric authentication. Hardware tokens may implement something you are factor.

T F T T

Confidentiality

The data can be viewed by only authorized users

Which of the following are true about passwords in Linux ? (Choose two.) The passwd file can be viewed by all users. The shadow file can be viewed by all users. Passwords are stored in plaintext The shadow file contains the hashes of the user passwords User passwords are stored in a file called passwd

The passwd file can be viewed by all users. The shadow file contains the hashes of the user passwords

Principle of least privilege

allow the bare minum of access to a subject

Problems with Asymm Encryption

Authentication•How does Bob know that the message is indeed from Alice?•Someone else might have used Bob's public key, sent him the message, and claimed he/she was Alice! •Integrity•How does Bob know that the message was not altered on the way (in transit)? •Even if Bob is able to authenticate that the message is from Alice, it may be that someone altered the message on the way. How can he avoid this?

__________ is the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated.

Nonrepudiation

RWX R-X --x

Owner: Read Write Execute Group: Read ---- Execute Other: Execute

Octal Code: 754

Owner: Read write execute Group: Read Execute Other: Read

Based on the Parkerian hexad, what principles are immediately affected if we lose a shipment of encrypted backup tapes that contain personal and payment information of our customers? Confidentiality and integrity Only confidentiality Confidentiality and ownership Ownership and availability

Ownership and availability

Which of the following does a digital certificate NOT include? Choose 2. Question options: Private key of owner Public key of the owner (subject) Private key of issuer Validity period The algorithm used for signing

Private key of owner Private key of issuer

Defense in depth is a strategy that formulates a __________defense mechanism to prevent single point of failure.

layered

When someone working in a sales department is not allowed access to data in human resources principle of ________________ is followed. least privlege Kerckhoff confused deputy problem noe of the above

least privelage

fabrication

making unwanted data

In _________ access control access to a resource is determined by a group or individual who has the authority to set access on resources. Mandatory Role-based Discretionary Attribute-based

mandatory

An authentication mechanism in which both parties (server and client) authenticate each other is called ________________. multifactor authentication symmetric authentication mutual authentication multi-party authentication

mutual authentication

integrity

only authorized users change

rainbow table

pre computed hash values

incident response steps

prep detection containment eradication recovery post incident

Assume Alice and Bob both have public and private keys in a public key setting. If Alice and Bob want to agree on a secret value, then Alice uses her ________________ key and Bob's ____________ key to compute the secret value. private /private public / private public / public private / public

private / public

In order to reduce rainbow table attacks against passwords random bits are added to the password before hashing. This sequence of random bits is called _________

salt

Kerckhoff's Principle

should be secure if the system is known

authenticity

the data originates from claimed user

Capabilities

use token to control access

Symmetric Key

uses same key, only 2 parties know

Order risk management:

asset identification threat identification vulnerability identification risk assessment risk mitigation

chosen plaintext attack

attacker has ciphertext and can choose a limited number of plaintexts and compute corresponding cipher text You have the opportunity to choose a plaintext and get its ciphertext (without knowing the key). What would you choose for the plaintext?

known plaintext attacks

attacker has ciphertext and plaintext - You know that HELLO encrypts to MJQQT. Can you find the key

chosen ciphertext attacks

attacker has same ability with chosen plain text attacksm but can query a limited number of ciphertexts and get the plaintext for them You have the opportunity to choose a ciphertext and get the plaintext for it (without knowing the key). What would you choose for the ciphertext

chiphertext only attacks

attacker only has ciphertexts How can you proceed to break the cipher if all you have is the ciphertext, GJFZYNKZQ IFD

Brute force

attempts all posibilities

Which should take place first, authorization or authentication?

authentication

dictionary

dictionary of common words

Assume Alice and Bob both have public and private keys in a pubic key setting. If Alice wants to send Bob a signed message, Alice first hashes her message and _______ the hash using ______'s ____________ key. Question options: encrypts/Alice/private encrypts/ Bob/public decrypts/ Alice/ private decrypts/ Bob/ private

enecrypt - Alice - private

Alice uses a shift cipher with a shift of 4 to encrypt her message to Bob. If the ciphertext she obtains is "ksshpygo", what is her message in plaintext?

goodluck

Order the steps in risk management. ____ Risk assessment ____ Vulnerability assessment ____ Asset identification ____ Threat identification ____ Risk mitigation

Asset identification Threat ident Vulnerability assessment Risk assess Risk mitigation

Digital Certificates include

A digital certificate is an electronic document that binds a public key with an entity (person, organization).• It includes •The owner (subject) name/id• The public key of the owner• The digital signature (seal) of the issuing entity (authority) • Validity period of the certificate• Algorithms used

Steps to Risk management

1. identify assets 2. identify threats 3. assess vulnerabilities 4. assess risk 5. mitigate

To verify a signature on a message from Alice, Bob uses _____________. Question options: Alice's public key Alice's private key his private key his public key

Alice's public key

Assume Alice and Bob both have public and private keys in a public key setting. If Alice wants to send Bob a secret message, Alice encrypts her message using _________________ key and Bob decrypts it using ___________________key. Alice's private Bob's public Alice's private Bob's private Bob's public Bob's private Alice's public Bob's private

Bob's public Bob's private

In ____________is the study of the frequency of letters or groups of letters in a ciphertext.

Frequency Analysis

are used to tell a human from a bot.

CAPTCHAs

In which of these attack scenarios is the attacker most powerful? Ciphertext only attacks Incorrect Response Known plaintext attacks Correct Answer Chosen plaintext attack The attacker always has the same power

Chosen plaintext attack

Main tenets of info sec

Confidentiality integrity authenticity nonrepudiation

CIA stands for:

Confidentiality, Integrity, Availability

Which of the following are symmetric key ciphers? Select all that apply. RSA DES AES Diffie-Hellman

DES AES

Examples of Keyy Agreement Schemes

Diffle Hellman Elliptic Curve

Uses of Hash Functions

Digital signatures password files intrusion/ virus detection construction of pseudorandom numbers file synch

public key cryptography

Each user has a public and private key public keys are published private keys are secret

Public Key (Asymmetric) Encryption

Encrypt the shared secret key for symmetric ciphers using asymmetric (public key) encryption and send over the (not secure) channel.

Which of the following measures the rate at which we fail to authenticate legitimate users in a biometric system. EER FAR FRR FER

FRR

Order the steps for access control. ____ Auhtorization ____ Accountability ____ Identification ____ Authentication

Identification Authentication Authorization Accountability

Which of the following are true about passwords in Linux ? (Choose two.) The shadow file contains the hashes of the user passwords Passwords are stored in plaintext The passwd file can be viewed by all users. User passwords are stored in a file called passwd The shadow file can be viewed by all users

The shadow file contains the hashes of the user passwords The passwd file can be viewed by all users.

Software licensing can and should be audited in a company. True False

Tr

interception

Unauthorized access of information (e.g. Tapping, sniffing, unsecured wireless communication, emanations)

Order the steps for access control. ____ Auhtorization ____ Accountability ____ Identification ____ Authentication

__1__ Identification __2__ Authentication __3__ Auhtorization __4__ Accountability

Key Agreement Algorithms

Use public and private keys to agree on a key without exchanging any private information.

attribute-based access control ABAC

based on subject attributes, example: height requirement for a ride

Role-Based Access Control (RBAC)

based on the role of the subject

ACL Access control list

built for a specific resource includes subjects and access rights R W X

Which type of access control would be used in the case where we wish to prevent users from logging in to their accounts after business hours? Capabilities Access control list Both of these None of these

capabilities

interruption

causing asset to be unusable

A user with username student logs in to a Linux machine and executes the following commands in the given order: student$ mkdir homework student$ mkdir homework/hw1 student$ cd homework student$ mkdir hw2 student$ cd hw2 Choose the commands that would end the user in hw1 directory. (There are two of them) cd ~/hw1 cd ../hw1 cd ../../hw1 cd /home/student/homework/hw1

cd ../hw1 cd /home/student/homework/hw1

In which of these attacks does the attacker construct or modify the site in order to place an invisible layer over something the client would normally click on, in order to cause the client to execute a command differing from what they actually think they are performing? None of these XSS CSRF Clickjacking

clickjacking

Interception attacks are primarily against __________of information.

confidentiality

mandatory access control

decided by group or individual

Discretionary Access Control (DAC)

determined by owner

hybrid

dictionary attack but mixes in numbers and symbols


संबंधित स्टडी सेट्स

Chapter 6 - Business Markets & Business Buyer Behavior

View Set

Accounting 2301 Quiz #1 (Ch 1-4)

View Set

ALL 3 MACRO TESTS - use for final

View Set

Which wonders of the Ancient world are created by Greece?-How could a Greek citizen gain favor from the gods?

View Set

6.4 AVIATION FLIGHT CLASSIFICATIONS

View Set

2.4 Average Rate of Change of a Function

View Set