Management of Information Security Chapter 12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

True

Biometrics are the use of physiological characteristics to provide authentication of an identification. __________

False

Boundary controls regulate the admission of users into trusted areas of the organization. __________

transport mode

In IPSec, an encryption method in which only a packet's IP data is encrypted, not the IP headers themselves; this method allows intermediate nodes to read the source and destination addresses.

True

In an IDPS, a sensor is a piece of software that resides on a system and reports back to a management server. __________

False

In e-commerce situations, some cryptographic tools can be used for misrepresentation in order to assure that parties to the transaction are authentic, and that they cannot later deny having participated in a transaction. __________

single bastion host

In the _________ firewall architecture, a single device configured to filter packets serves as the sole security point between the two networks.

permutation

In which cipher method are values rearranged within a block to create the ciphertext?

digital certificate

Public key container files that allow PKI system components and end users to validate a public key and identify its owner.

True

Secure Shell (SSH) provides security for remote access connections over public networks by creating a secure and persistent connection.

False

Technical controls alone, when properly configured, can secure an IT environment.

False

The "something a person has" authentication mechanism takes advantage of something inherent in the user that is evaluated using biometrics.

True

The KDC component of Kerberos knows the secret keys of all clients and servers on the network.

True

The false accept rate is the rate at which fraudulent users or nonusers are allowed access to systems or areas as a result of a failure in the biometric device. __________

demilitarized zone

The intermediate area between trusted and untrusted networks is referred to as which of the following?

footprinting

The organized research and investigation of Internet addresses owned or controlled by a target organization.

asymmetric encryption

A cryptographic method that incorporates mathematical operations involving both a public key and a private key to encipher or decipher a message.

Vernam cipher

A cryptographic technique developed at AT&T and known as the "one-time pad," this cipher uses a set of characters for encryption operations only one time and then discards it.

True

A firewall is any device that prevents a specific type of information from moving between the untrusted network and the trusted network.

content filter

A software program or hardware/software appliance that allows administrators to restrict content that comes into or leaves a network—for example, restricting user access to Web sites with material that is not related to business, such as pornography or entertainment.

False

A semialphabetic substitution cipher is one that incorporates two or more alphabets in the encryption process.

False

A validity table is a tabular record of the state and context of each packet in a conversation between an internal and external user or system. __________

Both of these are correct.

In an IDPS, a piece of software that resides on a system and reports back to a management server is known as a(n) __________.

False

In wireless networking, the waveprint is the geographic area in which there is sufficient signal strength to make a network connection. __________

False

Intense packet inspection is a firewall function that involves examining multiple protocol headers and even content of network traffic, all the way through the TCP/IP layers and including encrypted, compressed, or encoded data. __________

dual-homed host

The bastion host is usually implemented as a __________, as it contains two network interfaces: one that is connected to the external network and one that is connected to the internal network, such that all traffic must go through the device to move between the internal and external networks.

socket

The combination of a system's TCP/IP address and a service port is known as a __________.

something a person says

Which of the following is NOT among the three types of authentication mechanisms?

replacement

Which of the following is NOT one of the administrative challenges to the operation of firewalls?

True

A password should be difficult to guess. __________

cryptanalysis

The process of obtaining the plaintext message from a ciphertext message without knowing the keys used to perform the encryption is known as __________.

false reject rate

The rate at which authentic users are denied or prevented access to authorized areas as a result of a failure in the biometric device is known as the __________.

False

A bollard host is a device placed between an external, untrusted network and an internal, trusted network. __________

transposition cipher

A cryptographic operation that involves simply rearranging the values within a block based on an established pattern.

False

A smart chip is an authentication component, similar to a dumb card, that contains a computer chip to verify and validate several pieces of information instead of just a PIN. __________

True

A packet filtering firewall is a networking device that examines the header information of data packets that come into a network and determines whether to drop them (deny) or forward them to the next network connection (allow), based on its configuration rules. __________

VPN

A private, secure network operated over a public and insecure network.

True

A wireless access point is a device used to connect wireless networking users and their devices to the rest of the organization's network(s). __________

PKI

An integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely through the use of digital certificates.

False

The action level is a predefined assessment level of an IDPS that triggers a predetermined response when surpassed. __________

SSL

Was developed by Netscape in 1994 to provide security for online e-commerce transactions.

honey pot

What is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulated rich content areas while the software notifies the administrator of the intrusion?

digital signature

What is most commonly used for the goal of nonrepudiation in cryptography?

fingerprinting

What is the next phase of the pre-attack data gathering process after an attacker has collected all of an organization's Internet addresses?

footprinting

What is the organized research and investigation of Internet addresses owned or controlled by a target organization?

packet sniffer

What tool would you use if you want to collect information as it is being transmitted on the network and analyze the contents for the purpose of solving network problems?

Evaluate how the new technology will enhance employee skills.

When an information security team is faced with a new technology, which of the following is NOT a recommended approach?

authentication

Which of the following access control processes confirms the identity of the entity seeking access to a logical or physical area?

fingerprint recognition

Which of the following biometric authentication systems is considered to be truly unique, suitable for use, and currently cost-effective?

signature recognition

Which of the following biometric authentication systems is the most accepted by users?

face geometry

Which of the following characteristics currently used for authentication purposes is the LEAST unique?

sending DoS packets to the source

Which of the following is NOT a method employed by IDPSs to prevent an attack from succeeding?

key distribution center

Which of the following is a Kerberos service that initially exchanges information with the client and server by using secret keys?

crossover error rate

Which of the following is a commonly used criterion for comparing and evaluating biometric technologies?

Firewalls deal strictly with defined patterns of measured observation.

Which of the following is true about firewalls and their ability to adapt in a network?

It uses a secret key to encrypt and decrypt.

Which of the following is true about symmetric encryption?

key

Which of the following is used in conjunction with an algorithm to make computer data secure from anybody except the intended recipient of the data?

ticket granting service

Which of the following provides an identification card of sorts to clients who request services in a Kerberos system?

port-address translation

Which technology employs sockets to map internal private network addresses to a public address using one-to-many mapping?

IP Security Protocol

Which technology has two modes of operation: transport and tunnel?

port scanner

Which tool can best identify active computers on a network?

anomaly-based

Which type of IDPS is also known as a behavior-based intrusion detection system?

signature-based

Which type of IDPS works like antivirus software?

dynamic packet filtering firewall

Which type of device can react to network traffic and create or modify configuration rules to adapt?

proxy server

Which type of device exists to intercept requests for information from external users and provide the requested information by retrieving it from an internal server?

stateful packet inspection

Which type of firewall keeps track of each network connection established between internal and external systems?


Set pelajaran terkait

The individual firm supply curve is the marginal cost curve above the:

View Set

Natural resources and environmental impact

View Set

Victims of Abuse or Neglect NCLEX

View Set

Chemistry Test #2 chapter 5 and 6

View Set

Occupational Safety & Ergonomics - Exam 1

View Set