CECS 378 MIDTERM

Ace your homework & exams now with Quizwiz!

__________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key. Question options: 1) Session key 2) Subkey 3) Key distribution technique 4) Ciphertext key

Key distribution technique

__________ controls access based on comparing security labels with security clearances. Question options: 1) MAC 2) DAC 3) RBAC 4) MBAC

MAC

_________ attacks have several approaches, all equivalent in effort to factoring the product of two primes. Question options: 1) Mathematical 2) Brute-force 3) Chosen ciphertext 4) Timing

Mathematical

__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic. Question options: 1) Cryptanalysis 2) Decryption 3) Message authentication 4) Collision resistance

Message authentication

For stream-oriented transmission over noisy channel you would typically use _______ mode. Question options: 1) ECB 2) CTR 3) OFB 4) CBC

OFB

_________ is the original message or data that is fed into the algorithm as input. Question options: 1) Plaintext 2) Encryption algorithm 3) Decryption algorithm 4) Ciphertext

Plaintext

__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed. Question options: 1) Availability 2) System Integrity 3) Privacy 4) Data Integrity

Privacy

__________ is based on the roles the users assume in a system rather than the user's identity. Question options: 1) DAC 2) RBAC 3) MAC 4) URAC

RBAC

__________ defines user authentication as "the process of verifying an identity claimed by or for a system entity". Question options: 1) RFC 4949 2) RFC 2298 3) RFC 2493 4) RFC 2328

RFC 4949

The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption. Question options: 1) SHA-1 2) HMAC 3) MD5 4) RSA

RSA

__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n. Question options: 1) DSS 2) RSA 3) SHA 4) AES

RSA

__________ specifies the minimum requirements for telecommunications infrastructure of data centers. Question options: 1) TIA-492 2) RFC-4949 3) NIST-7883 4) RSA-298

RSA-298

In 2005, NIST announced the intention to phase out approval of _______ and move to a reliance on the other SHA versions by 2010. Question options: 1) SHA-1 2) SHA-512 3) SHA-256 4) SHA-2

SHA-1

The DSS makes use of the _________ and presents a new digital signature technique, the Digital Signature Algorithm (DSA). Question options: 1) HMAC 2) XOR 3) RSA 4) SHA-1

SHA-1

The _______ module performs end-to-end encryption and obtains session keys on behalf of users. Question options: 1) PKM 2) RCM 3) SSM 4) CCM

SSM

__________ is an organization that receives the encrypted data from a data owner and makes them available for distribution to clients. Question options: 1) User 2) Client 3) Data owner 4) Server

Server

________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system. Question options: 1) System Integrity 2) Data Integrity 3) Availability 4) Confidentiality

System Integrity

_________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number. Question options: 1) Digital standards 2) Mathematical attacks 3) Ciphers 4) Timing attacks

Timing attacks

"The plaintext is 64 bits in length and the key is 56 bits in length; longer plaintext amounts are processed in 64-bit blocks" is a description of the DES algorithm. Question options:1) True2) False

True

A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained. Question options:1) True2) False

True

A constraint is a defined relationship among roles or a condition related to roles. Question options:1) True2) False

True

A data center generally includes backup power supplies. Question options:1) True2) False

True

A good technique for choosing a password is to use the first letter of each word of a phrase. Question options:1) True2) False

True

A hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret key. Question options:1) True2) False

True

A message authentication code is a small block of data generated by a secret key and appended to a message. Question options:1) True2) False

True

A query language provides a uniform interface to the database. Question options:1) True2) False

True

A smart card contains an entire microprocessor. Question options:1) True2) False

True

A user may belong to multiple groups. Question options:1) True2) False

True

Access control is the central element of computer security. Question options:1) True2) False

True

An ABAC model can define authorizations that express conditions on properties of both the resource and the subject. Question options:1) True2) False

True

An access right describes the way in which a subject may access an object. Question options:1) True2) False

True

An auditing function monitors and keeps a record of user accesses to system resources. Question options:1) True2) False

True

An important element in many computer security services and applications is the use of cryptographic algorithms. Question options:1) True2) False

True

Any program that is owned by, and SetUID to, the "superuser" potentially grants unrestricted access to the system to any user executing that program. Question options:1) True2) False

True

Availability assures that systems work promptly and service is not denied to authorized users. Question options:1) True2) False

True

Computer security is essentially a battle of wits between a perpetrator who tries to find holes and the administrator who tries to close them. Question options:1) True2) False

True

Computer security is protection of the integrity, availability, and confidentiality of information system resources. Question options:1) True2) False

True

Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES. Question options:1) True2) False

True

Data integrity assures that information and programs are changed only in a specified and authorized manner. Question options:1) True2) False

True

Depending on the application, user authentication on a biometric system involves either verification or identification. Question options:1) True2) False

True

Encryption becomes the last line of defense in database security. Question options:1) True2) False

True

Enrollment creates an association between a user and the user's biometric characteristics. Question options:1) True2) False

True

HMAC can be proven secure provided that the embedded hash function has some reasonable cryptographic strengths. Question options:1) True2) False

True

Hardware is the most vulnerable to attack and the least susceptible to automated controls. Question options:1) True2) False

True

Identification is the means of establishing the validity of a claimed identity provided by a user. Question options:1) True2) False

True

Identifiers should be assigned carefully because authenticated identities are the basis for other security services. Question options:1) True2) False

True

In a biometric scheme some physical characteristic of the individual is mapped into a digital representation. Question options:1) True2) False

True

In the context of security our concern is with the vulnerabilities of system resources. Question options:1) True2) False

True

In using encryption, we need to decide what to encrypt and where the encryption gear should be located. Question options:1) True2) False

True

It is possible to convert any block cipher into a stream cipher by using the cipher feedback (CFB) mode. Question options:1) True2) False

True

Key distribution can be achieved for two parties A and B by a third party selecting the key and physically delivering it to A and B. Question options:1) True2) False

True

Many security administrators view strong security as an impediment to efficient and user-friendly operation of an information system. Question options:1) True2) False

True

Many users choose a password that is too short or too easy to guess. Question options:1) True2) False

True

Modes of operation are the alternative techniques that have been developed to increase the security of symmetric block encryption for large sequences of data. Question options:1) True2) False

True

Network security is extremely important in a facility in which such a large collection of assets is concentrated in a single place and accessible by external network connections. Question options:1) True2) False

True

One desirable property of a stream cipher is that the ciphertext be of the same length as the plaintext. Question options:1) True2) False

True

Public-key cryptography is asymmetric. Question options:1) True2) False

True

RSA is a block cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for some n. Question options:1) True2) False

True

Reliable input is an access control requirement. Question options:1) True2) False

True

SHA is perhaps the most widely used family of hash functions. Question options:1) True2) False

True

SHA-3 algorithms must be designed to resist any potentially successful attack on SHA-2 functions. Question options:1) True2) False

True

SQL Server allows users to create roles that can then be assigned access rights to portions of the database. Question options:1) True2) False

True

Security specifically tailored to databases is an increasingly important component of an overall organizational security strategy. Question options:1) True2) False

True

Some form of protocol is needed for public-key distribution. Question options:1) True2) False

True

Symmetric encryption is also referred to as secret-key or single-key encryption. Question options:1) True2) False

True

Symmetric encryption is used primarily to provide confidentiality. Question options:1) True2) False

True

The Diffie-Hellman algorithm depends for its effectiveness on the difficulty of computing discrete logarithms. Question options:1) True2) False

True

The National Bureau of Standards is now the National Institute of Standards and Technology. Question options:1) True2) False

True

The appeal of HMAC is that its designers have been able to prove an exact relationship between the strength of the embedded hash function and the strength of HMAC. Question options:1) True2) False

True

The ciphertext-only attack is the easiest to defend against. Question options:1) True2) False

True

The database management system makes use of the database description tables to manage the physical database. Question options:1) True2) False

True

The default set of rights should always follow the rule of least privilege or read-only access. Question options:1) True2) False

True

The first step in devising security services and mechanisms is to develop a security policy. Question options:1) True2) False

True

The key exchange protocol is vulnerable to a man-in-the-middle attack because it does not authenticate the participants. Question options:1) True2) False

True

The more critical a component or service, the higher the level of availability required. Question options:1) True2) False

True

The one-way hash function is important not only in message authentication but also in digital signatures. Question options:1) True2) False

True

The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner. Question options:1) True2) False

True

The secret key is input to the encryption algorithm. Question options:1) True2) False

True

The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm. Question options:1) True2) False

True

The value of a primary key must be unique for each tuple of its table. Question options:1) True2) False

True

Two disadvantages to database encryption are key management and inflexibility. Question options:1) True2) False

True

Two of the most important applications of public-key encryption are digital signatures and key management. Question options:1) True2) False

True

Unlike RSA, DSS cannot be used for encryption or key exchange. Question options:1) True2) False

True

User authentication is the basis for most types of access control and for user accountability. Question options:1) True2) False

True

User authentication is the fundamental building block and the primary line of defense. Question options:1) True2) False

True

X.800 architecture was developed as an international standard and focuses on security in the context of networks and communications. Question options:1) True2) False

True

The __________ component deals with the management and control of the ways entities are granted access to resources. Question options: 1) resource management 2) access management 3) privilege management 4) policy management

access management

Cryptographic systems are generically classified by _________. Question options: 1) the type of operations used for transforming plaintext to ciphertext 2) the number of keys used 3) the way in which the plaintext is processed 4) all the above

all the above

A(n) __________ is a user who has administrative responsibility for part or all of the database. Question options: 1) administrator 2) database relations manager 3) application owner 4) end user other than application owner

application owner

An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) __________. Question options: 1) risk 2) asset 3) attack 4) vulnerability

attack

A ________ attack involves trying all possible private keys. Question options: 1) mathematical 2) timing 3) brute-force 4) chosen ciphertext

brute-force

A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. Question options: 1) mode of operation 2) hash function 3) cryptanalysis 4) brute-force attack

brute-force attack

To counter threats to remote user authentication, systems generally rely on some form of ___________ protocol. Question options: 1) eavesdropping 2) Trojan horse 3) challenge-response 4) denial-of-service

challenge-response

If the analyst is able to get the source system to insert into the system a message chosen by the analyst, then a ________ attack is possible. Question options: 1) known-plaintext 2) chosen-plaintext 3) chosen ciphertext 4) chosen text

choosen-plaintext

A __________ type of attack exploits properties of the RSA algorithm. Question options: 1) timing 2) brute-force 3) chosen ciphertext 4) mathematical

chosen ciphertext

__________ is the scrambled message produced as output. Question options: 1) Plaintext 2) Ciphertext 3) Secret key 4) Cryptanalysis

ciphertext

A __________ is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path. Question options: 1) client attack 2) eavesdropping attack 3) host attack 4) Trojan horse attack

client attack

A ___________ is the portion of the data center that houses data processing equipment. Question options: 1) computer room 2) main distribution area 3) entrance room 4) horizontal distribution area

computer room

A loss of _________ is the unauthorized disclosure of information. Question options: 1) confidentiality 2) integrity 3) authenticity 4) availability

confidentiality

Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________. Question options: 1) identification step 2) verification step 3) authentication step 4) corroboration step

corroboration step

A(n) __________ is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that correct action can be taken. Question options: 1) attack 2) countermeasure 3) adversary 4) protocol

countermeasure

Transmitted data stored locally are referred to as __________. Question options: 1) ciphertext 2) DES 3) data at rest 4) ECC

data at rest

The assurance that data received are exactly as sent by an authorized entity is __________. Question options: 1) authentication 2) data confidentiality 3) access control 4) data integrity

data integrity

A(n) __________ is a structured collection of data stored for use by one or more applications. Question options: 1) attribute 2) database 3) tuple 4) inference

database

Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences. Question options: 1) unauthorized disclosure 2) deception 3) disruption 4) usurpation

deception

The _________ is the encryption algorithm run in reverse. Question options: 1) decryption algorithm 2) ciphertext 3) plaintext 4) secret key

decryption algorithm

The __________ is the encryption algorithm run in reverse. Question options: 1) decryption algorithm 2) plaintext 3) ciphertext 4) encryption algorithm

decryption algorithm

The _________ prevents or inhibits the normal use or management of communications facilities. Question options: 1) passive attack 2) traffic encryption 3) denial of service 4) masquerade

denial of service

A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key. Question options: 1) digital signature 2) keystream 3) one-way hash function 4) secret key

digital signature

A threat action in which sensitive data are directly released to an unauthorized entity is __________. Question options: 1) corruption 2) disruption 3) intrusion 4) exposure

disruption

An end user who operates on database objects via a particular application but does not own any of the database objects is the __________. Question options: 1) application owner 2) end user other than application owner 3) foreign key 4) administrator

end user other than application owner

Each individual who is to be included in the database of authorized users must first be __________ in the system. Question options: 1) verified 2) authenticated 3) identified 4) enrolled

enrolled

The most common means of human-to-human identification are __________. Question options: 1) facial characteristics 2) signatures 3) retinal patterns 4) fingerprints

facial characteristics

There are _____ modes of operation defined by NIST that are intended to cover virtually all the possible applications of encryption for which a block cipher could be used. Question options: 1) three 2) five 3) seven 4) seven

five

On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack. Question options: 1) one-fourth 2) half 3) two-thirds 4) three-fourths

half

__________ systems identify features of the hand, including shape, and lengths and widths of fingers. Question options: 1) Signature 2) Hand geometry 3) Fingerprint 4) Palm print

hand geometry

The purpose of a __________ is to produce a "fingerprint" of a file, message, or other block of data. Question options: 1) secret key 2) digital signature 3) keystream 4) hash function

hash function

A ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Question options: 1) low 2) normal 3) moderate 4) high

high

__________ houses cross-connects and active equipment for distributing cable to the equipment distribution area. Question options: 1) Main distribution area 2) Equipment distribution area 3) Horizontal distribution area 4) Zone distribution area

horizontal distribution area

A __________ is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored. Question options: 1) eavesdropping attack 2) denial-of-service attack 3) client attack 4) host attack

host attack

__________ is the process of performing authorized queries and deducing unauthorized information from the legitimate responses received. Question options: 1) Perturbation 2) Inference 3) Compromise 4) Partitioning

inference

__________ encompasses intrusion detection, prevention and response. Question options: 1) Intrusion management 2) Security assessments 3) Database access control 4) Data loss prevention

intrusion management

Combined one byte at a time with the plaintext stream using the XOR operation, a __________ is the output of the pseudorandom bit generator. Question options: 1) keystream 2) digital signature 3) secure hash 4) message authentication code

keystream

A concept that evolved out of requirements for military information security is ______. Question options: 1) reliable input 2) mandatory access control 3) open and closed policies 4) discretionary input

mandatory access control

An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user. Question options: 1) masquerade 2) interception 3) repudiation 4) inference

masquerade

Although the _________ attack is a serious threat, there are simple countermeasures that can be used such as constant time calcs, random delays or blinding computations. Question options: 1) timing 2) chosen ciphertext 3) mathematical 4) none of the above

none of the above

A(n) __________ is a resource to which access is controlled. Question options: 1) object 2) owner 3) world 4) subject

object

A(n) _________ is an attempt to learn or make use of information from the system that does not affect system resources. Question options: 1) passive attack 2) inside attack 3) outside attack 4) active attack

passive attack

A __________ is a password guessing program. Question options: 1) password hash 2) password cracker 3) password biometric 4) password salt

password cracker

A ________ is a key used between entities for the purpose of distributing session keys. Question options: 1) permanent key 2) session key 3) distribution key 4) all of the above

permanent key

The original message or data that is fed into the algorithm is __________. Question options: 1) encryption algorithm 2) secret key 3) decryption algorithm 4) plaintext

plaintext

A _________ is defined to be a portion of a row used to uniquely identify a row in a table. Question options: 1) foreign key 2) query 3) primary key 4) data perturbation

primary key

An institution that issues debit cards to cardholders and is responsible for the cardholder's account and authorizing transactions is the _________. Question options: 1) cardholder 2) auditor 3) issuer 4) processor

processor

Digital signatures and key management are the two most important applications of __________ encryption. Question options: 1) private-key 2) public-key 3) preimage resistant 4) advanced

public-key

A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords. Question options: 1) user education 2) proactive password checking 3) reactive password checking 4) computer-generated password

reactive password checking

In relational database parlance, the basic building block is a __________, which is a flat table. Question options: 1) attribute 2) tuple 3) primary key 4) relation

relation

The basic building block of a __________ is a table of data, consisting of rows and columns, similar to a spreadsheet. Question options: 1) relational database 2) query set 3) DBMS 4) perturbation

relational database

A __________ attack involves an adversary repeating a previously captured user response. Question options: 1) client 2) replay 3) Trojan horse 4) eavesdropping

replay

A __________ is a named job function within the organization that controls this computer system. Question options: 1) user 2) role 3) permission 4) session

role

The exact substitutions and transformations performed by the algorithm depend on the ________. Question options: 1) ciphertext 2) decryption algorithm 3) secret key 4) encryption algorithm

secret key

A __________ is any action that compromises the security of information owned by an organization. Question options: 1) security mechanism 2) security attack 3) security policy 4) security service

security attack

Recognition by fingerprint, retina, and face are examples of __________. Question options: 1) face recognition 2) dynamic biometrics 3) static biometrics 4) token authentication

static biometrics

The final permission bit is the _________ bit. Question options: 1) superuser 2) kernel 3) set user 4) sticky

sticky

A _________ protects against an attack in which one party generates a message for another party to sign. Question options: 1) data authenticator 2) strong hash function 3) weak hash function 4) digital signature

strong hash function

A __________ is an entity capable of accessing objects. Question options: 1) group 2) object 3) subject 4) owner

subject

The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption but can be adapted to work with any implementation that does not run in fixed time. Question options: 1) mathematical 2) timing 3) chosen ciphertext 4) brute-force

timing

__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts. Question options: 1) Traffic padding 2) Traffic routing 3) Traffic control 4) Traffic integrity

traffic padding

In a relational database rows are referred to as _________. Question options: 1) relations 2) attributes 3) views 4) tuples

tuples

If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________. Question options: 1) use longer keys 2) use shorter keys 3) use more keys 4) use less keys

use longer keys

The __________ strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords. Question options: 1) reactive password checking 2) proactive password checking 3) computer-generated password 4) user education

user education

A _________ is a virtual table. Question options: 1) tuple 2) query 3) view 4) DBMS

view

A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy is a(n) __________. Question options: 1) countermeasure 2) vulnerability 3) adversary 4) risk

vulnerability

SHA-1 produces a hash value of __________ bits. Question options: 1) 256 2) 160 3) 384 4) 180

160

Public-key encryption was developed in the late ________. Question options: 1) 1950s 2) 1970s 3) 1960s 4) 1980s

1970's

Subject attributes, object attributes and environment attributes are the three types of attributes in the __________ model. Question options: 1) DSD 2) RBAC 3) ABAC 4) SSD

ABAC

The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________. Question options: 1) SHA 2) RSA 3) AES 4) DSS

AES

__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance. Question options: 1) Audit control 2) Resource control 3) System control 4) Access control

Access control

__________ is verification that the credentials of a user or other system entity are valid. Question options: 1) Adequacy 2) Authentication 3) Authorization 4) Audit

Authentication

_________ is the granting of a right or permission to a system entity to access a system resource. Question options: 1) Authorization 2) Authentication 3) Control 4) Monitoring

Authoritization

For general-purpose block-oriented transmission you would typically use _______ mode. Question options: 1) CBC 2) CTR 3) CFB 4) OFB

CBC

For general-purpose stream-oriented transmission you would typically use _______ mode. Question options: 1) CTR 2) CFB 3) ECB 4) CBC

CFB

______ mode is typically used for a general-purpose block-oriented transmission and is useful for high-speed requirements. Question options: 1) ECB 2) OFB 3) CFB 4) CTR

CTR

__________ refers to setting a maximum number with respect to roles. Question options: 1) Cardinality 2) Prerequisite 3) Exclusive 4) Hierarchy

Cardinality

__________ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization. Question options: 1) Constraints 2) Mutually Exclusive Roles 3) Cardinality 4) Prerequisites

Constraints

__________ is the traditional method of implementing access control. Question options: 1) MAC 2) RBAC 3) DAC 4) MBAC

DAC

The most widely used encryption scheme is based on the _________ adopted in 1977 by the National Bureau of Standards. Question options: 1) AES 2) 3DES 3) CES 4) DES

DES

The National Institute of Standards and Technology has published Federal Information Processing Standard FIPS PUB 186, known as the __________. Question options: 1) XOR 2) MD5 3) MAC 4) DSS

DSS

The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange. Question options: 1) ECC 2) RSA 3) DSS 4) XOR

DSS

_________ is an organization that produces data to be made available for controlled release, either within the organization or to external users. Question options: 1) Client 2) Data owner 3) User 4) Server

Data owner

___________ was the first published public-key algorithm. Question options: 1) NIST 2) Diffie-Hellman 3) RC4 4) RSA

Diffie-Hellman

The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead. Question options: 1) ECC 2) MD5 3) Diffie-Hellman 4) none of the above

ECC

__________ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide. Question options: 1) EFT 2) POS 3) BTM 4) ATF

EFT

"Each block of 64 plaintext bits is encoded independently using the same key" is a description of the CBC mode of operation. Question options:1) True2) False

False

A foreign key value can appear multiple times in a table. Question options:1) True2) False

False

A single countermeasure is sufficient for SQLi attacks. Question options:1) True2) False

False

A user program executes in a kernel mode in which certain areas of memory are protected from the user's use and certain instructions may not be executed. Question options:1) True2) False

False

A view cannot provide restricted access to a relational database so it cannot be used for security purposes. Question options:1) True2) False

False

AES uses a Feistel structure. Question options:1) True2) False

False

An individual's signature is not unique enough to use in biometric applications. Question options:1) True2) False

False

Assurance is the process of examining a computer product or system with respect to certain criteria. Question options:1) True2) False

False

Contingency planning is a functional area that primarily requires computer security technical measures. Question options:1) True2) False

False

Cryptanalytic attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. Question options:1) True2) False

False

Depending on the details of the overall authentication system, the registration authority issues some sort of electronic credential to the subscriber. Question options:1) True2) False

False

External devices such as firewalls cannot provide access control services. Question options:1) True2) False

False

Fixed server roles operate at the level of an individual database. Question options:1) True2) False

False

If both sender and receiver use the same key the system is referred to as asymmetric. Question options:1) True2) False

False

Keylogging is a form of host attack. Question options:1) True2) False

False

Like the MAC, a hash function also takes a secret key as input. Question options:1) True2) False

False

Memory cards store and process data. Question options:1) True2) False

False

One disadvantage of the link encryption approach is that the message must be decrypted each time it enters a frame switch. Question options:1) True2) False

False

Plaintext is the scrambled message produced as output. Question options:1) True2) False

False

Public-key algorithms are based on simple operations on bit patterns. Question options:1) True2) False

False

SHA-1 is considered to be very secure. Question options:1) True2) False

False

SHA-2 shares the same structure and mathematical operations as its predecessors and this is a cause for concern. Question options:1) True2) False

False

Security labels indicate which system entities are eligible to access certain resources. Question options:1) True2) False

False

Security mechanisms typically do not involve more than one particular algorithm or protocol. Question options:1) True2) False

False

Site security of the data center itself includes barriers to entry, coupled with authentication techniques for gaining physical access. Question options:1) True2) False

False

Stream ciphers are far more common than block ciphers. Question options:1) True2) False

False

The "A" in the CIA triad stands for "authenticity". Question options:1) True2) False

False

The advantage of a stream cipher is that you can reuse keys. Question options:1) True2) False

False

The authentication function determines who is trusted for a given purpose. Question options:1) True2) False

False

The operations performed during a round consist of circular shifts, and primitive Boolean functions based on DSS, MD5, SHA, and RSA. Question options:1) True2) False

False

The purpose of the DSS algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages. Question options:1) True2) False

False

Threats are attacks carried out. Question options:1) True2) False

False

Timing attacks are only applicable to RSA. Question options:1) True2) False

False

To create a relationship between two tables, the attributes that define the primary key in one table must appear as attributes in another table, where they are referred to as a foreign key. Question options:1) True2) False

False

Traditional RBAC systems define the access rights of individual users and groups of users. Question options:1) True2) False

False

Triple DES takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits. Question options:1) True2) False

False

User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic. Question options:1) True2) False

False

Issued as RFC 2104, __________ has been chosen as the mandatory-to-implement MAC for IP Security. Question options: 1) RSA 2) SHA-3 3) DSS 4) HMAC

HMAC


Related study sets

Chemistry Chapter 5.1 Models of the Atom

View Set

Chapter 2 Economics Key Questions 1-7

View Set

LearnKey Photoshop CS6 Session 3 Labs and Post Assessment.

View Set

3-8 The Caribbean Today Reading Support

View Set