Cyber Security Midterm Multiple Choice

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Subject attributes, object attributes and environment attributes are the three types of attributes in the __________ model.

ABAC

The ______ is an optional key that may be present on any PIV card, does not require PIN entry, and whose purpose is to authenticate the card and therefore its possessor.

CAK

For general-purpose block-oriented transmission you would typically use _______ mode.

CBC

For general-purpose stream-oriented transmission you would typically use _______ mode.

CFB

______ mode is typically used for a general-purpose block-oriented transmission and is useful for high-speed requirements.

CTR

__________ refers to setting a maximum number with respect to roles.

Cardinality

__________ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization.

Constraints

__________ is the traditional method of implementing access control.

DAC

The most widely used encryption scheme is based on the _________ adopted in 1977 by the National Bureau of Standards.

DES

The National Institute of Standards and Technology has published Federal Information Processing Standard FIPS PUB 186, known as the __________.

DSS

The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.

DSS

___________ was the first published public-key algorithm.

Diffie-Hellman

The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead.

ECC

__________ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.

EFT

Issued as RFC 2104, __________ has been chosen as the mandatory-to-implement MAC for IP Security.

HMAC

________ includes data processing and storage equipment, transmission and networking facilities, and offline storage media.

Information system hardware

The _________ module analyzes LAN traffic and reports the results to the central manager.

LAN monitor agent

__________ controls access based on comparing security labels with security clearances.

MAC

_________ attacks have several approaches, all equivalent in effort to factoring the product of two primes.

Mathematical

For stream-oriented transmission over noisy channel you would typically use _______ mode.

OFB

__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

Privacy

__________ is based on the roles the users assume in a system rather than the user's identity.

RBAC

__________ defines user authentication as "the process of verifying an identity claimed by or for a system entity".

RFC 4949

The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.

RSA

In 2005, NIST announced the intention to phase out approval of _______ and move to a reliance on the other SHAversions by 2010.

SHA-1

The DSS makes use of the _________ and presents a new digital signature technique, the Digital Signature Algorithm (DSA).

SHA-1

The _______ module performs end-to-end encryption and obtains session keys on behalf of users.

SSM

_______ facilities include electrical power, communication services, and environmental controls such as heat and humidity.

Supporting

________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

System Integrity

_________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.

Timing attacks

_______ includes destruction of equipment and data.

Vandalism

_______ should be located on the floor of computer rooms as well as under raised floors, and should cut off power automatically in the event of a flood.

Water sensors

__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

access control

The __________ component deals with the management and control of the ways entities are granted access to resources.

access management

_________ are either individuals or members of a larger group of outsider attackers who are motivated by social or political causes.

activists

The ________ is responsible for determining if an intrusion has occurred.

analyzer

_________ involves the collection of data relating to the behavior of legitimate users over a period of time.

anomaly detection

A (n) __________ is a hacker with minimal technical skill who primarily uses existing attack toolkits.

apprentice

An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) __________.

attack

__________ is verification that the credentials of a user or other system entity are valid.

authentication

_________ is the granting of a right or permission to a system entity to access a system resource.

authorization

A ________ attack involves trying all possible private keys.

brute-force

To counter threats to remote user authentication, systems generally rely on some form of ___________ protocol.

challenge-response

A __________ type of attack exploits properties of the RSA algorithm.

chosen ciphertext

If the analyst is able to get the source system to insert into the system a message chosen by the analyst, then a ________ attack is possible.

chosen-plaintext

A __________ is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path.

client attack

A loss of _________ is the unauthorized disclosure of information.

confidentiality

A(n) __________ is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that correct action can be taken.

countermeasure

The assurance that data received are exactly as sent by an authorized entity is __________.

data integrity

Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences.

deception

The _________ is the encryption algorithm run in reverse.

decryption algorithm

The _________ prevents or inhibits the normal use or management of communications facilities.

denial of service

A prevalent concern that is often overlooked is ________.

dust

Each individual who is to be included in the database of authorized users must first be __________ in the system.

enrolled

The security classification for a restricted area containing a security interest is _____.

exclusion

A threat action in which sensitive data are directly released to an unauthorized entity is __________.

exposure

The most common means of human-to-human identification are __________.

facial characteristics

There are _____ modes of operation defined by NIST that are intended to cover virtually all the possible applications of encryption for which a block cipher could be used.

five

__________ systems identify features of the hand, including shape, and lengths and widths of fingers.

hand geometry

A ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.

high

The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central manager.

host agent

__________ is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored.

host attack

_________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.

host-based IDS

________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.

human-caused

A(n) _________ is an attempt to learn or make use of information from the system that does not affect system resources.

inside attack

An institution that issues debit cards to cardholders and is responsible for the cardholder's account and authorizing transactions is the _________.

issuer

__________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.

key distribution technique

A restricted area within close proximity of a security interest has a classification of ______.

limited

________ security protects computer-based data from software-based and communication-based threats.

logical

A concept that evolved out of requirements for military information security is ______ .

mandatory access control

An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.

masquerade

A ________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.

network-based IDS

A(n) __________ is a resource to which access is controlled.

object

A __________ is a password guessing program.

password cracker

A ________ is a key used between entities for the purpose of distributing session keys.

permanent key

_________ is the original message or data that is fed into the algorithm as input.

plaintext

________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.

premises

A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

reactive password checking

A __________ attack involves an adversary repeating a previously captured user response.

replay

A __________ is a named job function within the organization that controls this computer system.

role

The exact substitutions and transformations performed by the algorithm depend on the ________.

secret key

A __________ is any action that compromises the security of information owned by an organization.

security attack

A _________ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.

security intrusion

__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.

signature detection

Recognition by fingerprint, retina, and face are examples of __________.

static biometrics

The role of physical security is affected by the operating location of the information system, which can be characterized as ______

static, mobile, portable

The final permission bit is the _________ bit.

sticky

A __________ is an entity capable of accessing objects.

subject

Cryptographic systems are generically classified by _________.

the type of operations used for transforming plaintext to ciphertext the number of keys used the way in which the plaintext is processed

Eavesdropping and wiretapping fall into the ________ category.

theft

Although the _________ attack is a serious threat, there are simple countermeasures that can be used such as constant time calcs, random delays or blinding computations.

timing

The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.

timing

__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

traffic padding

An area of a facility that has no security interest is classified as _________.

unrestricted

The __________ strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords.

user education

Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.

verification step

A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy is a(n) __________.

vulnerability

SHA-1 produces a hash value of __________ bits.

160

Public-key encryption was developed in the late ________.

1970s

Relative humidity should be maintained between ________ to avoid the threats from both low and high humidity.

40% and 60%


Set pelajaran terkait

Chapter 5 - The Nervous System - Neurology and Psychiatry

View Set

Ch 9, Ch 10, Ch 11, Ch 12, Ch 13, Ch14 International Business

View Set

HRM Chapter 7 HW Study Questions

View Set

Greek Gods and their domains/animals/symbols

View Set

Health Care in the United States

View Set

Chem quiz 3, Chem exam 2, Chem exam #4 (chapters 7 & 8), Exam 3 Study Guide, Chem test 3, chem ch 7, CHEM chapter 7, Chemistry 1601 final set, Chem chapter 7, 8, INTRO TO CHEM FINAL STUDY GUIDE

View Set