CSS 310 Final Exam Study Session

Ace your homework & exams now with Quizwiz!

What term is used to describe a type of cryptography that uses a cipher with two separate keys, one for encryption and one for decryption, so that correspondents do not first have to exchange secret information to communicate securely?

Asymmetric key cryptography

As of 2013, Cisco estimated that there were more than________ devices connected to the Internet.

7 Billion

________ is a document produced by the IETF thatcontains standards as well as other specifications or descriptive contents.

A Request for Comment (RFC)

Which of the following describes the American National Standards Institute (ANSI)?

A U.S. standards organization whose goal is to empower its members and constituents to strengthen the U.S. marketplace position in the global economy, while helping to ensure the safety and health of consumers and the protection of the environment.

Which of the following is the definition of botnet?

A botnet consists of a network of compromised computers that attackers use to launch attacks and spread malware.

____________ is exercised by frequently evaluating whether countermeasures are performing as expected.

Due diligence

Which regulating agency has oversight for the Children's Internet Protection Act?

FCC

With more than 425,000 members in approximately 160 countries, the ISO has the largest number of members of any technical professional organization in the world.

False

The most difficult and slowest option for IT security training is studying materials yourself.

False (That's the best)

The term incident describes the magnitude of harm that could be caused by a threat exercising a vulnerability.

False -> its ..

Quantitative analysis defines risk using a scenario that describes it.

False it is..

A smurf attack tricks users into providing logon information on what appears to be a legitimate Web site but is in fact a Web site set up by an attacker to obtain this information.

False it is:

The standard bachelor's designation is a four-year diploma program.

False, not a diploma

IP addresses are eight-byte addresses that uniquely identify every device on the network.

False. Its 32 bit

SOX doesn't apply to publicly traded companies.

False. it applies

Decryption is the act of scrambling plaintext into ciphertext.

False.. It is

The purpose of continuing education is to provide informal training courses for interested students.

False: formal training I guess?

The ________ provides oversight for architecture for Internet protocols and procedures, processes used to create standards, editorial and publication procedures for RFCs, and confirmation of IETF chair and technical area directors. It also provides much of the high-level management and validation of the processes of conducting IETF business.

IAB

The _____________ is the preeminent organization for developing and publishing international standards for technologies related to electrical and electronic devices and processes.

International Electrotechnical Commission (IEC)

The four main credentials of the ________ are Systems Security Certified Practitioner (SSCP®), Certified Information Systems Security Professional (CISSP®), Certified Authorization Professional (CAP®), and Certified Secure Software Lifecycle Professional (CSSLP®).

International Information Systems Security Certification Consortium, Inc. (ISC)<sup>2</SUP>

The ________________ is a subcommittee of the IETF that serves as an advisory body to the Internet Society (ISOC). It is composed of independent researchers and professionals who have a technical interest in the well-being of the Internet.

Internet Architecture Board (IAB)

Organizations currently use several symmetric algorithms, including ________, which is a substitution-permutation algorithm similar to DES. Unlike DES, its authors made its design criteria public. This 64-bit symmetric block cipher can use keys from 40 to 256 bits. Although it is patented (U.S. patent 5,511,123), its inventors, C.M. Adams and S.E. Tavares, made it available for free use.

CAST

Which is the highest level of Check Point certification for network security?

CCMA

The ________ is a simple review of a plan by managers and the business continuity team to make sure that contact numbers are current and that the plan reflects the company's priorities and structure.

Checklist test

________is a one-way calculation of information that yields a result usually much smaller than the original message.

Checksum

A method to restrict access to a network based on identity or other rules is the definition of ________.

NAC

What term is used to describe a type of virus that includes a separate encryption engine that stores the virus body in encrypted format while duplicating the main body of the virus?

polymorphic virus

The four main areas in NIST SP 800-50 are awareness, training, education, and __________________.

professional development

_______________ enables you to prevent a party from denying a previous statement or action.

Nonrepudiation

A firewall that examines each packet it receives and compares the packet to a list of rules configured by the network administrator.

Packet filtering

________ attempts to describe risk in financial terms and put a dollar value on all the elements of a risk.

Quantitative risk analysis

___________ is the likelihood that a particular threat exposes a vulnerability that could damage your organization.

Risk

________ uses various controls to reduce identified risks. These controls might be administrative, technical, or physical.

Risk Mitigation

________ is a risk management phase that includes assessment of various types of controls to mitigate the identified risks, selection of a control strategy, and justification of choice of controls.

Risk assesment

(ISC)2 offers the ________ credential, which is ideal for those who are working toward or already hold positions as senior network security engineers, senior security systems analysts, or senior security administrators. It covers the seven domains of best practices for information security.

Systems Security Certified Practitioner

A control that is carried out or managed by a computer system is the definition of ________.

Technical control

A salt value is a set of random characters that you can combine with an actual input key to create the encryption key.

True

An information security safeguard is also called an information security control.

True

Certifications that require additional education generally specify the number of credits each certificate requires.

True

FISMA requires federal agencies to secure national security systems (NSSs) using a risk-based approach.

True

Many Trojans spread through e-mail messages or Web site downloads.

True

The FTC Safeguards Rule requires a financial institution to create a written information security program that must state how the institution collects and uses customer data. It also must describe the controls used to protect that data.

True

The Infotec Security Certified Program (SCP) certification programs apply mainly to network security topics and are most appropriate for professionals involved in securing network components within the IT infrastructure.

True

The OSI Reference Model is a theoretical model of networking with interchangeable layers.

True

The Office of Personnel Management (OPM) requires that federal agencies provide the training suggested by the NIST guidelines.

True

The best-known standard that relates to information security is the IEEE 802 LAN/MAN standard family.

True

The extent of damage a threat can do determines the level of risk.

True

The purpose of BCM is to mitigate incidents.

True

The purpose of DoD Directive 8570.01 is to reduce the possibility that unqualified personnel can gain access to secure information.

True

The term detective control refers to a control that determines that a threat has landed in your system.

True

The term network access control (NAC) describes a method to restrict access to a network based on identity or other rules.

True

Today, much of the IEC's focus includes standards that address emerging power needs and how they affect other functional areas.

True

Under CIPA, a library or school must be able to disable the technology protection measure for any adult. If you can't disable the TPM, you run the risk of violating the adult's First Amendment rights.

True

Under SEC rules, ICFR are processes that provide reasonable assurance that an organization's financial reports are reliable.

True

The ________ identifies staff reaction and response times as well as inefficiencies or previously unidentified vulnerabilities. All members of the staff involved in operations or procedures participate in the test.

Simulation test

One of the ways that malicious code can threaten businesses is by causing economic damage or loss due to the theft, destruction, or unauthorized manipulation of sensitive data. These are known as ________.

attacks against data integrity (because the question mentions) manipulation

An educational program that is generally associated with a college or university that provides formal courses that do not lead to degrees is the definition of ________.

continuing education

A(n) ________ is a measurable occurrence that has an impact on the business.

corrective control

Health plans, health care clearinghouses, and any health care provider that transmits PHI in an electronic form are known as ________ under HIPAA.

covered entities

What name is given to patient health information that is computer based?

electronic protected health information (EPHI)

A ________ is an encryption key used to encrypt other keys before transmitting them.

key-encrypting key

The number of possible keys to a cipher is a ___________.

keyspace

What term is used to describe the probability that a potential vulnerability might be exercised within the construct of an associated threat environment?

likelihood

What term is used to describe an encryption algorithm that has no corresponding decryption algorithm?

one-way algorithm

What is meant by multipartite virus?

A type of virus that infects other files and spreads in multiple ways.

The ____________ concentration from (ISC)2 is the road map for incorporating security into projects, applications, business processes, and all information systems.

CISSP-ISSEP&reg;

The best fits for (ISC)2's_____________ are personnel responsible for developing and implementing processes used to assess risk and for establishing security requirements.

Certified Authorization Professional

A ________ is a virus that attacks and modifies executable programs (like COM, EXE, SYS, and DLL files).

File Infector

A _____________ contains rules that define the types of traffic that can come and go through a network.

Firewall

The ________ is the committee of the ITU responsible for ensuring the efficient and effective production of standards covering all fields of telecommunications for all nations.

ITU Telecommunication Sector (ITU-T)

________ is a suite of protocols designed to connect sites securely using IP networks.

IPSec

________ is an international security standard that documents a comprehensive set of controls that represent information systems best practices.

ISO/IEC 27002

________include a separate encryption engine that stores the virus body in encrypted format while duplicating the main body of the virus.

Polymorphic viruses

A process that creates the first secure communications session between a client and a server is the definition of ________.

SSL handshake (session between a client and a server)


Related study sets

FUNDAMENTALS OF NURSING PRACTICE QUESTIONS

View Set

HK Book 8 L3 Where were you last night?

View Set

Econ 202 Chapter 2 UL Cary Heath

View Set

Chapter 59 Assessment and Management of Problems Related to Male Reproductive Processes

View Set

Chapter 2 - Network Infrastructure and Documentation

View Set

APUSH Periods 1-8 Identifies by Donald Chau

View Set