COP4360 Final Review Multiple Choice Flashcards
(129 cards)
A __________ is any action that compromises the security of information owned by an organization.
security mechanism
security attack
security policy
security service
Security Attack
The assurance that data received are exactly as sent by an authorized entity is __________.
data integrity
access control
data confidentiality
authentication
Data Intgerity
A threat action in which sensitive data are directly released to an unauthorized entity is __________.
disruption
corruption
intrusion
exposure
Exposure
A loss of _________ is the unauthorized disclosure of information.
integrity
confidentiality
availability
authenticity
Confidentiality
__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
Traffic routing
Traffic integrity
Traffic control
Traffic padding
Traffic Padding
A ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.
low
normal
moderate
high
high
Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences.
deception
disruption
usurpation
unauthorized disclosure
deception
An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
interception
repudiation
inference
masquerade
Masquerade
On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack
two-thirds
three-fourths
one-fourth
half
Half
A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
secret key
digital signature
keystream
one way hash function
Digital Signature
The purpose of a __________ is to produce a “fingerprint” of a file, message, or other block of data.
keystream
secret key
digital signature
hash function
Hash Function
__________ is the scrambled message produced as output.
Cipher text
Secret key
Plain text
Cryptanalyst
Cipher Text
__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.
DSS
SHA
RSA
AES
RSA
The original message or data that is fed into the algorithm is __________.
encryption algorithm
secret key
decryption algorithm
plain text
Plain Text
The __________ is the encryption algorithm run in reverse.
decryption algorithm
cipher text
plain text
encryption algorithm
Decryption Algorithm
The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________.
AES
DSS
RSA
SHA
AES
__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.
Decryption
Collision resistance
Message authentication
Cryptanalysis
Message Authentication
If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________.
user more keys
use less keys
use shorter keys
user longer keys
user longer keys
Recognition by fingerprint, retina, and face are examples of __________.
face recognition
static biometrics
dynamic biometrics
token authentication
Static Biometrics
__________ defines user authentication as “the process of verifying an identity claimed by or for a system entity”.
RFC 2493
RFC 4949
RFC 2298
RFC 2328
RFC 4949
The most common means of human-to-human identification are __________.
retinal patterns
facial characteristics
signatures
fingerprints
Facial Recognition
Each individual who is to be included in the database of authorized users must first be __________ in the system.
authenticated
verified
enrolled
identified
Enrolled
Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.
identification step
authentication step
verification step
corroboration step
Verification Step
A __________ is a password guessing program.
password cracker
password hash
password biometric
password salt
Password Cracker