Domain 3 Flashcards

1
Q

Algorithm is now considered as insecure

A

Merkle-Hellman Knapsack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access data on 1 account/customer and cannot access other accounts

A

Brewer Nash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNS Poisoning can result to

A

Man in the Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

two modes that provide both confidentiality and data authenticity

A

GCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Maximum bit SHA can provide

A

256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

doubles the length of any message it encrypts

A

El Gamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cipher mode allows you to break encryption into multiple independent steps

A

CBC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Poses greater risk of accidental discharge in Data Center

A

Wet Pipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is best type water based fire suppression for a computer facility

A

Preaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

proprietary system that uses unpublished protocols

A

Closed system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DOS Attack uses ICMP echoes and work in Layer 3

A

Smurf Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DOS Attack uses UDP works in Layer 4

A

Fraggle Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

attack causing type of external fault such as application high voltage electricity

A

Fault Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attack rely on flaw in the cryptographic algorithm

A

Implementation Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Syn Attack is working in which OSI Layer

A

Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Contains list of public key that has been revoked

A

CRL

17
Q

CRL disadvantage introduce

A

Latency

18
Q

RSA use Cipher or Prime Numbers

A

Prime numbers

19
Q

is a security standard that is focused on security governance

ISO27001 or ISO27002

A

ISO 27001

20
Q

Is security standard based on industry standard security based control

A

ISO 27002

21
Q

Linear cryptanalysis is known

A

Plaintext attack

22
Q

Too much data sent to the same memory location

A

Buffer overflow

23
Q

allows the exchange of symmetric encryption keys betweeen two parties over an insecure channel

A

DH

24
Q

provides confidentiality integrity and authentication

A

AES

25
Q

are outdated and no longer considered secure

A

DES and 3DES

26
Q

Used to increase the strength of cryptography by creating a unique ciphertext every time the same message is encrypted with the same key

A

IV

27
Q

Digital signature provides which of the following?

Integrity
Authentication
Confidentiality

A

Integrity

28
Q

strong star states that enforces that a subject can only perform both read/write within same security level

A

Bell Lapadula