CYBERSECURITY final guide - copied

Ace your homework & exams now with Quizwiz!

repository

A _____ is a generic term used to denote any method for storing certificates and CRLs so that they can be retrieved by end entities.

all of the above

IT security management functions include: A. determining organizational IT security objectives, strategies, and policies. B. detecting and reacting to incidents C. specifying appropriate safeguards D. all of the above

true

T/F: Because the responsibility for IT security is shared across the organization, there is a risk of inconsistent implementation of security and a loss of central monitoring and control.

true

T/F: HMAC can be proven secure provided that the embedded hash function has some reasonable cryptographic strengths.

false

T/F: Kerberos is designed to counter only one specific threat to the security of a client/server dialogue.

true

T/F: MIME is an extension to the old RFC 822 specification of an Internet mail format.

false

T/F: MIME provides the ability to sign and/or encrypt email messages.

true

T/F: SHA is perhaps the most widely used family of hash functions.

false

T/F: SHA-1 is considered to be very secure.

true

T/F: SHA-2 shares the same structures and mathematical operations as its predecessors and this is a cause for concern.

true

T/F: a brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained.

false

T/F: all controls are applicable to all technologies.

false

T/F: although important, security auditing is not a key element in computer security.

true

T/F: an obvious security risk is that of impersonation.

true

T/F: as an alternative the RSA public-key encryption algorithm can be used with either the SHA-1 or the MD5 message digest algorithm for forming signatures.

false

T/F: audit trails are different from audit logs.

true

T/F: company wireless LANs or wireless access points to wired LANs in close proximity may create overlapping transmission ranges.

true

T/F: complying with regulations and contractual obligations is a benefit of security awareness, training, and education programs.

true

T/F: detection and recovery controls provide a means to restore lost computing resources.

false

T/F: employee behavior is not a critical concern in ensuring the security of computer systems.

true

T/F: employees cannot be expected to follow policies and procedures of which they are unaware.

false

T/F: if both sender and receiver use the same key the system is referred to as asymmetric.

false

T/F: it is not critical that an organization's IT security policy have full approval or buy-in by senior management.

true

T/F: management controls refer to issues that management needs to address.

true

T/F: means are needed to generate and record a security audit trail and to review and analyze the audit trail to discover and investigate attacks and security compromises.

false

T/F: once the IT management process is in place and working the process never needs to be repeated.

false

T/F: operational controls range from simple to complex measures that work together to secure critical and sensitive data, information, and IT systems functions.

true

T/F: organizational security objectives identify what IT security outcomes should be achieved.

true

T/F: organizational security policies identify what needs to be done.

false

T/F: plaintext is the scrambled message produced as output.

true

T/F: recipients without S/MIME capability can view the message content, although they cannot verify the signature.

true

T/F: symmetric encryption is also referred to as secret-key or single-key encryption.

true

T/F: the approach taken by Kerberos is using authentication software tied to a secure authentication server.

false

T/F: the assignment of responsibilities relating to the management of IT security and the organizational infrastructure is not addressed in a corporate security policy.

false

T/F: the audit analyzer prepares human-readable security reports.

true

T/F: the authentication server shares a unique secret key with each server.

true

T/F: the basic audit objective is to establish accountability for system entities that initiate or participate in security-relevant events and actions.

true

T/F: the ciphertext-only attack is the easiest to defend against.

true

T/F: the concerns for wireless security, in terms of threats, and countermeasures, are different to those found in a wired environments, such as an Ethernet LAN or a wired wide-area network.

false

T/F: the education and experience learning level provides the foundation of subsequent training by providing a universal baseline of key security terms and concepts.

true

T/F: the most significant source of risk in wireless networks in the underlying communications medium.

true

T/F: the one-way hash function is important not only in message authentication but also in digital signatures.

true

T/F: the overall scheme of Kerberos is that of a trusted third-party authentication service.

true

T/F: the recipient of a message can decrypt the signature using DSS and the sender's public DSS key.

true

T/F: the transmission medium carries the radio waves for data transfer.

true

T/F: the wireless access point provides a connection to the network or service.

true

T/F: water damage protection is included in security control.

management

____ controls focus on security policies, planning, guidelines, and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization's mission.

IT security management

____ ensures that critical assets are sufficiently protected in a cost-effective manner.

supporting

____ facilities include electrical power, communication services, and environmental controls such as heat and humidity.

logical

____ security protects computer-based data from software-based and communication-based threats.

premises

____ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.

information system hardware

_____ includes data processing and storage equipment, transmission and networking facilities, and offline storage media.

Kerberos

_____ requires that a user prove his or her identity for each service invoked and, optionally, requires servers to prove their identity to clients.

technical

_____ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.

all of the above

______ is a benefit of security awareness, training, and education programs to organizations. A. improving employee behavior. B. increasing the ability to hold employees accountable for their actions. C. mitigating liability of the organization for an employee's behavior D. All of the above

computers as targets

______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the target system without authorization or payment, or to alter the integrity of data or interfere with the availability of the computer or server.

brute-force

a _____ attack involves trying all possible private keys.

security audit

a ______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes that are indicated for countermeasures.

all of the above

a benefit of IPsec is _______. A. that it is below the transport layer and transparent to applications. B. there is no need to revoke keying material when users leave the organization C. it can provide security for individual users if needed D. all of the above

larger, more detailed

a contingency plan for a systems critical to a large organization would be ______ than that for a small business. A. smaller, less detailed B. larger, less detailed C. larger, more detailed D. smaller, more detailed

chosen-plaintext

if the analyst is able to get the source system to insert into the system a message chosen by the analyst, then a ______ attack is possible.

all of the above

security auditing can: A. provide data that can be used to define anomalous behavior. B. maintain a record useful in computer forensics. C. generate data that can be used in after-the-fact analysis of an attack. D. all of the above.

accountability

security awareness, training, and education programs can serve as a deterrent to fraud and actions by disgruntled employees by increasing employees' knowledge of their ______ an of potential penalties.

true

security awareness, training, and education programs may be needed to comply with regulations and contractual obligations.

RSA

the ______ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.

browser defenses, memory corruption defenses, network defenses, account defenses

the defenses with Windows can be grouped into four broad categories:

secret key

the exact substitutions and transformations performed by the algorithm depend on the ______.

corporate security policy

the intent of the _____ is to provide a clear overview of how an organization's IT infrastructure supports its overall business objectives.

handshake protocol

the most complex part of TLS is the ______.

DES

the most widely used encryption scheme is based on the ______ adopted in 1977 by the National Bureau of Standards.

DoS

the wireless environment lends itself to a ______ attack because it is so easy for the attacker to direct multiple wireless messages at the target.

all of the above

what are common flaws in operating systems: A. size: millions of lines of code make vulnerabilities difficult to recognize B. one compromised application can impact entire computer C. applications cannot authenticate themselves to each other D. all of the above

evaluation assurance level

what does EAL stand for in the context of trusted operating system?

refers to memory used by the Linux kernel and its loadable modules e.g. device drivers

what is the kernel space in Linux-based operation systems?

A and B

which are an example of components in Windows that make up the fundamental security infrastructure? A. Active Directory(AD) B. The Local Security Authority(LSA) C. A and B D. neither A nor B


Related study sets

History of Photo E1 Terms/Main Reading Arguments

View Set

IELTS WRITING TASK 2: Example conclusion phrases

View Set

Data analysis: Chapter 6: Discrete Probability Distributions

View Set

Computer Network CH4 Review 8th Edition

View Set

Module 6: Chapter 57 Drugs Affecting Gastrointestinal Secretions

View Set

Chapter 06: Reproductive System Concerns ANS

View Set

Information Security & Awareness Midterm

View Set

ευκαρυωτικα κυτταρα

View Set