Information Security
The Current record for unamplified 802.11 wireless connection is approximately ____ miles.
240
Which of the following is not a biometric identifier?
A complicated password.
If we are using an identification card as the basis of our authentication scheme, what step might we add to the process to move to multifactor authentication?
A software-based security token
This process allows, limits, denies or revokes the uses of resources.
Access control
Which type of access control would be used in the case where we want to prevent users from logging in to their accounts after business hours?
Attribute-based access controls
Establishment of whether a claim of identity is correct.
Authorization
Why does access control based on MAC addresses of the systems on our network not provide strong security?
Because MAC addresses can be changed with software.
CAPTCHA is an acronym which stands for
Completely Automated Public Turing test to tell Computers and Humans Apart.
___________ accounts are user accounts which are created automatically when an operating system is installed.
Default
This access control model allows the owner of a resource to decide who does and does not have access.
Discretionary access control
What is authentication?
Establishment of whether a claim of identity is correct.
A chief weakness of symmetric key cryptography is the use two different keys.
False
Accountability is of little value against misbehavior
False
Authentication is provides a means to trace activities and accountability is a set of methods used to establish identity.
False
Biometric identifiers are impossible to falsify.
False
Insuring information is available means preventing it from being fabricated, modified or interrupted
False
One of the first encryption tools invented was the Moses Cipher.
False
Regular and timely updates to operating systems and applications are NOT critical to maintaining strong security.
False
Secure protocols send traffic over the network in creartext form.
False
Signature-based intrusion detection systems do not rely on a signature database.
False
The Parkerian hexad is the oldest and simplest model used to discuss information security issues.
False
Which of the following is not a factor in the performance of a biometric system?
False acquaintances
When many operating systems are installed, a default account called a _____________ account is usually created by default.
Guest
Which category of attack is an attack against confidentiality
Interception
What do we call the process in which the client authenticates to the server and the server authenticates to the client?
Mutual authentication
Which of the protocols below is a non-secure protocol?
POP
What biometric factor describes how well a characteristic resists change over time?
Permanence
Preserving the integrity of information means
Preventing information from being favricated, modified or interrupted
In information security, the acronym PKI stands for
Public Key Infrastructure.
Which of the following is a secure protocol?
SFTP
What type of cipher is a Caesar cipher?
Substitution
What is identity verification?
Support for the claim of what someone or something is.
Which of the following best describes plaintext?
Text after it has been decrypted.
Which of the following best describes ciphertext
Text after it has been encrypted.
Which of the following best describes plaintext?
Text before it is encrypted.
A certificate authority (CA) is a trusted entity that handles. digital certificates.
True
Access control lists (ACLs) are a very common choice of access control implementation.
True
Anomaly-based intrusion detection systems can produce a large number of false positives.
True
Host intrusion detection systems are used to analyze the activities on or directed at the network interface of a particular host.
True
In a legal setting, it is often easier to introduce records when the records are produced from a regulated and consistent tracking system.
True
Kerchkhoffs' Principle outlined six principles around which a cryptographic system should be based.
True
Logging mechanisms are often configurable and can be set up to log anything.
True
Non-secure protocols send traffic over a network in cleartext form.
True
Physical security makes it more difficult for attackers to physically access and steal storage media.
True
Sometimes, firewalls are placed in the internal network to prevent network traffic of a sensitive nature from being accessed some users.
True
The ultimate goal in performing assessments is to find and fix vulnerabilities before attackers do.
True
The use of honeypots are somewhat controversial.
True
Threats exploit or take advantage of existing vulnerabilities.
True
_____________ can provide us with a solution for sending sensitive traffic over non-secure networks.
VPN
Which of the following is NOT a method for wireless networks?
WPZ
An audit is
a methodical examination and review
Nmap is an example of
a vulnerability assessment tool
The two main methods of access controls are
access control lists and capabilities.
The chief security officer for your company creates a new set of security guidelines in order to keep customers data more secure. This is an example of
administrative control
Defense in depth is a concept which
advocates multiple layers should be used to help prevent information security attacks.
Proper network design
can help prevent some attacks entirely and mitigate others
Which of the items below would we not want to audit for information security purposes.
company's stock price
Anomaly-based intrusion detection systems
consider traffic different than baseline traffic to be abnormal
Network segmentation boosts network performance by
containing certain network traffic to areas where it needs to be accessed
Two words which mean the same thing as decryption
decode, decipher
In information security, DMZ is an acronym for
demilitarized zone
Firewalls use packet filtering to
determine whether the traffic will be allowed to pass
Network segmentation is
dividing a network into multiple smaller networks called subnets
Two other terms which mean the same thing as encrypt
encode, encipher
The following are logical controls:
encryption, passwords and usernames.
A block cipher
encrypts a predetermined number of bits in the plain text message.
A stream cipher
encrypts each bit in the plain text message 1 bit at a time.
The principle of least privilege dictates
give bare minimum access to a user based on that user's functionality.
A collection of honeypots working together is called a
honeynet
A firewall is a network security device which controls traffic that flows
into and out of networks
A vulnerability
is a weakness that can be used to harm us.
Some people consider accountability a bad idea because it
is akin to Big Brother watching over your shoulder.
Identification
is the claim of what someone or something is.
One benefit of logging is
it gives a history of activities that have taken place in a computing environment.
Many employers utilize proxy servers to
keep employees from visiting inappropriate web sites
Confidentiality refers to
keeping information private
Intrusion detection systems
monitors network traffic as it comes into the network
We typically place firewalls
on the border of a network
One of the easiest ways to lessen threats and vulnerabilities on computing devices is
operating system hardening.
Network ACLs typically control access with Internet Protocol (IP) addresses, Media Access Control (MAC) addresses and
ports
VPNs are often used to allow __________ workers to connect to the internal resources of an organization.
remote
Operating system hardening involves all of the following except
removing power from systems.
A protocol analyzer is also known as a
sniffer
In nonrepudiation
sufficient evidence exists as to prevent denial of an action.
The DMZ is primarily for systems
that need to be exposed to the Internet
Allowing a user account the absolute minimum permission needed for it to carry out its necessary functions is
the principle of least privilege
Attack surface of a computing system refers to
the total number of available avenues through which operating systems might be attacked.
Deep packet inspection firewalls are controversial because
they can allow someone to eavesdrop on emails, web browsing and instant messaging conversations
We should configure and turn on logging and auditing features for our systems
to keep an accurate and complete record of the important processes and activities.
A _____________ is an encrypted connection between two points.
tunnel
The most complex passwords consists of.
uppercase and lowercase letters and numbers and symbols.
Symmetric key algorithms
use one key to both encrypt and decrypt plain text.
Asymmetric algorithms
use one key to encrypt plain text and another key to decrypt cipher text.
A stateful firewall
utilizes a state table to keep track of the connections made through the firewall
A honeypot is
vulnerable system usually place in the DMZ
Signature-based intrusion detection systems
work like antivirus systems