Cyber Security Midterm Multiple Choice
Subject attributes, object attributes and environment attributes are the three types of attributes in the __________ model.
ABAC
The ______ is an optional key that may be present on any PIV card, does not require PIN entry, and whose purpose is to authenticate the card and therefore its possessor.
CAK
For general-purpose block-oriented transmission you would typically use _______ mode.
CBC
For general-purpose stream-oriented transmission you would typically use _______ mode.
CFB
______ mode is typically used for a general-purpose block-oriented transmission and is useful for high-speed requirements.
CTR
__________ refers to setting a maximum number with respect to roles.
Cardinality
__________ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization.
Constraints
__________ is the traditional method of implementing access control.
DAC
The most widely used encryption scheme is based on the _________ adopted in 1977 by the National Bureau of Standards.
DES
The National Institute of Standards and Technology has published Federal Information Processing Standard FIPS PUB 186, known as the __________.
DSS
The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.
DSS
___________ was the first published public-key algorithm.
Diffie-Hellman
The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead.
ECC
__________ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.
EFT
Issued as RFC 2104, __________ has been chosen as the mandatory-to-implement MAC for IP Security.
HMAC
________ includes data processing and storage equipment, transmission and networking facilities, and offline storage media.
Information system hardware
The _________ module analyzes LAN traffic and reports the results to the central manager.
LAN monitor agent
__________ controls access based on comparing security labels with security clearances.
MAC
_________ attacks have several approaches, all equivalent in effort to factoring the product of two primes.
Mathematical
For stream-oriented transmission over noisy channel you would typically use _______ mode.
OFB
__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
Privacy
__________ is based on the roles the users assume in a system rather than the user's identity.
RBAC
__________ defines user authentication as "the process of verifying an identity claimed by or for a system entity".
RFC 4949
The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.
RSA
In 2005, NIST announced the intention to phase out approval of _______ and move to a reliance on the other SHAversions by 2010.
SHA-1
The DSS makes use of the _________ and presents a new digital signature technique, the Digital Signature Algorithm (DSA).
SHA-1
The _______ module performs end-to-end encryption and obtains session keys on behalf of users.
SSM
_______ facilities include electrical power, communication services, and environmental controls such as heat and humidity.
Supporting
________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
System Integrity
_________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.
Timing attacks
_______ includes destruction of equipment and data.
Vandalism
_______ should be located on the floor of computer rooms as well as under raised floors, and should cut off power automatically in the event of a flood.
Water sensors
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.
access control
The __________ component deals with the management and control of the ways entities are granted access to resources.
access management
_________ are either individuals or members of a larger group of outsider attackers who are motivated by social or political causes.
activists
The ________ is responsible for determining if an intrusion has occurred.
analyzer
_________ involves the collection of data relating to the behavior of legitimate users over a period of time.
anomaly detection
A (n) __________ is a hacker with minimal technical skill who primarily uses existing attack toolkits.
apprentice
An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) __________.
attack
__________ is verification that the credentials of a user or other system entity are valid.
authentication
_________ is the granting of a right or permission to a system entity to access a system resource.
authorization
A ________ attack involves trying all possible private keys.
brute-force
To counter threats to remote user authentication, systems generally rely on some form of ___________ protocol.
challenge-response
A __________ type of attack exploits properties of the RSA algorithm.
chosen ciphertext
If the analyst is able to get the source system to insert into the system a message chosen by the analyst, then a ________ attack is possible.
chosen-plaintext
A __________ is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path.
client attack
A loss of _________ is the unauthorized disclosure of information.
confidentiality
A(n) __________ is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that correct action can be taken.
countermeasure
The assurance that data received are exactly as sent by an authorized entity is __________.
data integrity
Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences.
deception
The _________ is the encryption algorithm run in reverse.
decryption algorithm
The _________ prevents or inhibits the normal use or management of communications facilities.
denial of service
A prevalent concern that is often overlooked is ________.
dust
Each individual who is to be included in the database of authorized users must first be __________ in the system.
enrolled
The security classification for a restricted area containing a security interest is _____.
exclusion
A threat action in which sensitive data are directly released to an unauthorized entity is __________.
exposure
The most common means of human-to-human identification are __________.
facial characteristics
There are _____ modes of operation defined by NIST that are intended to cover virtually all the possible applications of encryption for which a block cipher could be used.
five
__________ systems identify features of the hand, including shape, and lengths and widths of fingers.
hand geometry
A ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.
high
The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central manager.
host agent
__________ is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored.
host attack
_________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.
host-based IDS
________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.
human-caused
A(n) _________ is an attempt to learn or make use of information from the system that does not affect system resources.
inside attack
An institution that issues debit cards to cardholders and is responsible for the cardholder's account and authorizing transactions is the _________.
issuer
__________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.
key distribution technique
A restricted area within close proximity of a security interest has a classification of ______.
limited
________ security protects computer-based data from software-based and communication-based threats.
logical
A concept that evolved out of requirements for military information security is ______ .
mandatory access control
An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
masquerade
A ________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.
network-based IDS
A(n) __________ is a resource to which access is controlled.
object
A __________ is a password guessing program.
password cracker
A ________ is a key used between entities for the purpose of distributing session keys.
permanent key
_________ is the original message or data that is fed into the algorithm as input.
plaintext
________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.
premises
A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.
reactive password checking
A __________ attack involves an adversary repeating a previously captured user response.
replay
A __________ is a named job function within the organization that controls this computer system.
role
The exact substitutions and transformations performed by the algorithm depend on the ________.
secret key
A __________ is any action that compromises the security of information owned by an organization.
security attack
A _________ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.
security intrusion
__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.
signature detection
Recognition by fingerprint, retina, and face are examples of __________.
static biometrics
The role of physical security is affected by the operating location of the information system, which can be characterized as ______
static, mobile, portable
The final permission bit is the _________ bit.
sticky
A __________ is an entity capable of accessing objects.
subject
Cryptographic systems are generically classified by _________.
the type of operations used for transforming plaintext to ciphertext the number of keys used the way in which the plaintext is processed
Eavesdropping and wiretapping fall into the ________ category.
theft
Although the _________ attack is a serious threat, there are simple countermeasures that can be used such as constant time calcs, random delays or blinding computations.
timing
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.
timing
__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
traffic padding
An area of a facility that has no security interest is classified as _________.
unrestricted
The __________ strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords.
user education
Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.
verification step
A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy is a(n) __________.
vulnerability
SHA-1 produces a hash value of __________ bits.
160
Public-key encryption was developed in the late ________.
1970s
Relative humidity should be maintained between ________ to avoid the threats from both low and high humidity.
40% and 60%
