Management of Information Security Chapter 12
True
Biometrics are the use of physiological characteristics to provide authentication of an identification. __________
False
Boundary controls regulate the admission of users into trusted areas of the organization. __________
transport mode
In IPSec, an encryption method in which only a packet's IP data is encrypted, not the IP headers themselves; this method allows intermediate nodes to read the source and destination addresses.
True
In an IDPS, a sensor is a piece of software that resides on a system and reports back to a management server. __________
False
In e-commerce situations, some cryptographic tools can be used for misrepresentation in order to assure that parties to the transaction are authentic, and that they cannot later deny having participated in a transaction. __________
single bastion host
In the _________ firewall architecture, a single device configured to filter packets serves as the sole security point between the two networks.
permutation
In which cipher method are values rearranged within a block to create the ciphertext?
digital certificate
Public key container files that allow PKI system components and end users to validate a public key and identify its owner.
True
Secure Shell (SSH) provides security for remote access connections over public networks by creating a secure and persistent connection.
False
Technical controls alone, when properly configured, can secure an IT environment.
False
The "something a person has" authentication mechanism takes advantage of something inherent in the user that is evaluated using biometrics.
True
The KDC component of Kerberos knows the secret keys of all clients and servers on the network.
True
The false accept rate is the rate at which fraudulent users or nonusers are allowed access to systems or areas as a result of a failure in the biometric device. __________
demilitarized zone
The intermediate area between trusted and untrusted networks is referred to as which of the following?
footprinting
The organized research and investigation of Internet addresses owned or controlled by a target organization.
asymmetric encryption
A cryptographic method that incorporates mathematical operations involving both a public key and a private key to encipher or decipher a message.
Vernam cipher
A cryptographic technique developed at AT&T and known as the "one-time pad," this cipher uses a set of characters for encryption operations only one time and then discards it.
True
A firewall is any device that prevents a specific type of information from moving between the untrusted network and the trusted network.
content filter
A software program or hardware/software appliance that allows administrators to restrict content that comes into or leaves a network—for example, restricting user access to Web sites with material that is not related to business, such as pornography or entertainment.
False
A semialphabetic substitution cipher is one that incorporates two or more alphabets in the encryption process.
False
A validity table is a tabular record of the state and context of each packet in a conversation between an internal and external user or system. __________
Both of these are correct.
In an IDPS, a piece of software that resides on a system and reports back to a management server is known as a(n) __________.
False
In wireless networking, the waveprint is the geographic area in which there is sufficient signal strength to make a network connection. __________
False
Intense packet inspection is a firewall function that involves examining multiple protocol headers and even content of network traffic, all the way through the TCP/IP layers and including encrypted, compressed, or encoded data. __________
dual-homed host
The bastion host is usually implemented as a __________, as it contains two network interfaces: one that is connected to the external network and one that is connected to the internal network, such that all traffic must go through the device to move between the internal and external networks.
socket
The combination of a system's TCP/IP address and a service port is known as a __________.
something a person says
Which of the following is NOT among the three types of authentication mechanisms?
replacement
Which of the following is NOT one of the administrative challenges to the operation of firewalls?
True
A password should be difficult to guess. __________
cryptanalysis
The process of obtaining the plaintext message from a ciphertext message without knowing the keys used to perform the encryption is known as __________.
false reject rate
The rate at which authentic users are denied or prevented access to authorized areas as a result of a failure in the biometric device is known as the __________.
False
A bollard host is a device placed between an external, untrusted network and an internal, trusted network. __________
transposition cipher
A cryptographic operation that involves simply rearranging the values within a block based on an established pattern.
False
A smart chip is an authentication component, similar to a dumb card, that contains a computer chip to verify and validate several pieces of information instead of just a PIN. __________
True
A packet filtering firewall is a networking device that examines the header information of data packets that come into a network and determines whether to drop them (deny) or forward them to the next network connection (allow), based on its configuration rules. __________
VPN
A private, secure network operated over a public and insecure network.
True
A wireless access point is a device used to connect wireless networking users and their devices to the rest of the organization's network(s). __________
PKI
An integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely through the use of digital certificates.
False
The action level is a predefined assessment level of an IDPS that triggers a predetermined response when surpassed. __________
SSL
Was developed by Netscape in 1994 to provide security for online e-commerce transactions.
honey pot
What is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulated rich content areas while the software notifies the administrator of the intrusion?
digital signature
What is most commonly used for the goal of nonrepudiation in cryptography?
fingerprinting
What is the next phase of the pre-attack data gathering process after an attacker has collected all of an organization's Internet addresses?
footprinting
What is the organized research and investigation of Internet addresses owned or controlled by a target organization?
packet sniffer
What tool would you use if you want to collect information as it is being transmitted on the network and analyze the contents for the purpose of solving network problems?
Evaluate how the new technology will enhance employee skills.
When an information security team is faced with a new technology, which of the following is NOT a recommended approach?
authentication
Which of the following access control processes confirms the identity of the entity seeking access to a logical or physical area?
fingerprint recognition
Which of the following biometric authentication systems is considered to be truly unique, suitable for use, and currently cost-effective?
signature recognition
Which of the following biometric authentication systems is the most accepted by users?
face geometry
Which of the following characteristics currently used for authentication purposes is the LEAST unique?
sending DoS packets to the source
Which of the following is NOT a method employed by IDPSs to prevent an attack from succeeding?
key distribution center
Which of the following is a Kerberos service that initially exchanges information with the client and server by using secret keys?
crossover error rate
Which of the following is a commonly used criterion for comparing and evaluating biometric technologies?
Firewalls deal strictly with defined patterns of measured observation.
Which of the following is true about firewalls and their ability to adapt in a network?
It uses a secret key to encrypt and decrypt.
Which of the following is true about symmetric encryption?
key
Which of the following is used in conjunction with an algorithm to make computer data secure from anybody except the intended recipient of the data?
ticket granting service
Which of the following provides an identification card of sorts to clients who request services in a Kerberos system?
port-address translation
Which technology employs sockets to map internal private network addresses to a public address using one-to-many mapping?
IP Security Protocol
Which technology has two modes of operation: transport and tunnel?
port scanner
Which tool can best identify active computers on a network?
anomaly-based
Which type of IDPS is also known as a behavior-based intrusion detection system?
signature-based
Which type of IDPS works like antivirus software?
dynamic packet filtering firewall
Which type of device can react to network traffic and create or modify configuration rules to adapt?
proxy server
Which type of device exists to intercept requests for information from external users and provide the requested information by retrieving it from an internal server?
stateful packet inspection
Which type of firewall keeps track of each network connection established between internal and external systems?