CIS 350

Ace your homework & exams now with Quizwiz!

IEEE ____ addresses both weaknesses of WEP by allowing the keys, encryption algorithms, and negotiation to be dynamically assigned, and by adopting the AES encryption based on the Rijndael algorithm with 128-, 192-, or 256-bit keys.

802.11i

A ____ is a list of certificates that have been revoked before their originally scheduled expiration date

certificate revocation list (CRL)

A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key

digital signature

A(n) ____ is the computer program that converts plaintext into an enciphered form

encryption algorithm

An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____

integrity checking

A ____ virus is a common type of virus that is programmed into an attached macro file

macro

One very common technique to attack a system is to deliver an e-mail or Web page that contains a malicious piece of code called a ____

mobile malicious code

A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters

monoalphabetic

The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers

packet filter

Perhaps the most common form of protection from unauthorized use of a computer system is the ___

password

A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available

ping

A ____ virus mutates with every infection, thus making them difficult to locate

polymorphic

The concept of two keys, public and private, is called ____ cryptography

public key

Some common types of denial of service include e-mail bombing, ____, and ping storm

smurfing

If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____

spoofing

The opposite of asymmetric encryption is ____ encryption, in which one key is used to encrypt and decrypt

symmetric

A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved

transposition-based

Many people consider the Trojan horse to be a form of computer ___

virus

cable represented a major improvement in the ability of transmission media to secure sensitive data.

Fiber-optic

is a set of protocols created to support the secure transfer of data at the IP layer

IPsec (IP security)

_ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography

Kerberos

_ is data before any encryption has been performed

Plaintext

____ is the combination of encryption techniques, software, and services that involves all the necessary pieces to support digital certificates, certificate authorities, and public key generation, storage, and management.

Public key infrastructure (PKI)

is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast addressing and other aspects of Internet operation

Smurfing

___ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth.

Spread spectrum

_ may be considered a form of physical protection

Surveillance

Possibly the earliest example of a polyalphabetic cipher is the ____ cipher

Vigenére

The first security protocol for wireless LANs was ____

Wired Equivalency Protocol (WEP)

Many certificates conform to the ____ standard

X.509

usually involves having a software program that monitors every transaction within a system

Computer auditing

The ____ is a commonly employed encryption method used by businesses to send and receive secure transactions

Data Encryption Standard (DES)

spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values

Direct sequence


Related study sets

Bio 183 Practice Final Daddy Jacquet

View Set

Exercise 10: The Appendicular Skeleton

View Set

Психіатрія на одну відповідь

View Set

Leadership and Management of Care Quiz VATI

View Set