COP4360 Final Review Multiple Choice Flashcards

(129 cards)

1
Q

A __________ is any action that compromises the security of information owned by an organization.

security mechanism

security attack

security policy

security service

A

Security Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The assurance that data received are exactly as sent by an authorized entity is __________.

data integrity

access control

data confidentiality

authentication

A

Data Intgerity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A threat action in which sensitive data are directly released to an unauthorized entity is __________.

disruption

corruption

intrusion

exposure

A

Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A loss of _________ is the unauthorized disclosure of information.

integrity

confidentiality

availability

authenticity

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

Traffic routing

Traffic integrity

Traffic control

Traffic padding

A

Traffic Padding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.

low

normal

moderate

high

A

high

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences.

deception

disruption

usurpation

unauthorized disclosure

A

deception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.

interception

repudiation

inference

masquerade

A

Masquerade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack

two-thirds

three-fourths

one-fourth

half

A

Half

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.

secret key

digital signature

keystream

one way hash function

A

Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The purpose of a __________ is to produce a “fingerprint” of a file, message, or other block of data.

keystream

secret key

digital signature

hash function

A

Hash Function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__________ is the scrambled message produced as output.

Cipher text

Secret key

Plain text

Cryptanalyst

A

Cipher Text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.

DSS

SHA

RSA

AES

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The original message or data that is fed into the algorithm is __________.

encryption algorithm

secret key

decryption algorithm

plain text

A

Plain Text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The __________ is the encryption algorithm run in reverse.

decryption algorithm

cipher text

plain text

encryption algorithm

A

Decryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________.

AES

DSS

RSA

SHA

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.

Decryption

Collision resistance

Message authentication

Cryptanalysis

A

Message Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________.

user more keys

use less keys

use shorter keys

user longer keys

A

user longer keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Recognition by fingerprint, retina, and face are examples of __________.

face recognition

static biometrics

dynamic biometrics

token authentication

A

Static Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

__________ defines user authentication as “the process of verifying an identity claimed by or for a system entity”.

RFC 2493

RFC 4949

RFC 2298

RFC 2328

A

RFC 4949

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The most common means of human-to-human identification are __________.

retinal patterns

facial characteristics

signatures

fingerprints

A

Facial Recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Each individual who is to be included in the database of authorized users must first be __________ in the system.

authenticated

verified

enrolled

identified

A

Enrolled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.

identification step

authentication step

verification step

corroboration step

A

Verification Step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A __________ is a password guessing program.

password cracker

password hash

password biometric

password salt

A

Password Cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
__________ systems identify features of the hand, including shape, and lengths and widths of fingers. Fingerprint Hand geometry Signature Palm print
Hand Geometry
26
A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords. proactive password checking user education reactive password checking computer-generated password
reactive password checking
27
The __________ strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords. reactive password checking user education computer-generated password proactive password checking
User Education
28
To counter threats to remote user authentication, systems generally rely on some form of ___________ protocol. challenge-response eavesdropping Trojan horse denial-of-service
Challenge-Response
29
A concept that evolved out of requirements for military information security is ______. open and closed policies reliable input mandatory access control discretionary input
Mandatory Access Control
30
A __________ is an entity capable of accessing objects. owner subject group object
subject
31
A(n) __________ is a resource to which access is controlled. object owner subject world
Object
32
_________ is the granting of a right or permission to a system entity to access a system resource. Authorization Monitoring Control Authentication
Authorization
33
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance. Access control Audit control Resource control System control
Access Control
34
__________ controls access based on comparing security labels with security clearances. RBAC MAC MBAC DAC
DAC
35
__________ is verification that the credentials of a user or other system entity are valid. Authorization Authentication Adequacy Audit
Authentication
36
The final permission bit is the _________ bit. superuser sticky set user kernel
Sticky
37
__________ is based on the roles the users assume in a system rather than the user’s identity. RBAC DAC MAC URAC
RBAC (Role Based Access Control)
38
__________ is the traditional method of implementing access control. MAC MBAC DAC RBAC
Mandatory Access Control (MAC)
39
__________ is the process of performing authorized queries and deducing unauthorized information from the legitimate responses received. Partitioning Perturbation Compromise Inference
Inference
40
A _________ is defined to be a portion of a row used to uniquely identify a row in a table. data perturbation primary key query foreign key
Primary Key
41
A ___________ is a person or organization that maintains a business relationship with cloud providers. cloud consumer cloud broker cloud carrier cloud auditor
Cloud Consumer
42
__________ encompasses intrusion detection, prevention and response. Intrusion management Data loss prevention Database access control Security assessments
Intrusion Management
43
An end user who operates on database objects via a particular application but does not own any of the database objects is the __________. administrator end user other than application owner application owner foreign key
end user other than application owner
44
A(n) __________ is a structured collection of data stored for use by one or more applications. attribute tuple database inference
Database
45
The basic building block of a __________ is a table of data, consisting of rows and columns, similar to a spreadsheet. relational database DBMS perturbation query set
Relational Database
46
A _________ is a virtual table. tuple view query DBMS
view
47
A(n) __________ is a user who has administrative responsibility for part or all of the database. end user other than application owner database relations manager administrator application owner
Administrator
48
The __________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability. hybrid public private community
hybrid
49
A __________ uses macro or scripting code, typically embedded in a document and triggered when the document is viewed or edited, to run and replicate itself into other such documents. macro virus boot sector infector mulipartite virus file infector
macro virus
50
A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met. trapdoor trojan horse worm logic bomb
Logic Bomb
51
__________ are used to send large volumes of unwanted e-mail. Spammer programs Rootkits Downloaders Auto-rooter
Spammer Programs
52
Computer viruses first appeared in the early __________. 1970s 1960s 1900s 1980s
1980's
53
The term “computer virus” is attributed to __________. Charles Babbage Fred Cohen Herman Hollerith Albert Einstein
Fred Cohen
54
The __________ is what the virus “does”. infection mechanism logic bomb payload trigger
Payload
55
The __________ is when the virus function is performed. dormant phase execution phase propoagation phase triggering phase
Execution Phase
56
A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim’s data is __________. Adobe malware Animoto Prezi
Malware
57
During the __________ the virus is idle. triggering phase propagation phase dormant phase execution phase
Dormant Phase
58
__________ is the first function in the propagation phase for a network worm. Keylogging Fingerprinting Spear phishing Propagating
Propagating
59
The ______ attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connections. poison packet attack basic flooding attack DNS amplification attack SYN spoofing attack
Basic Flooding Attack
60
A ______ triggers a bug in the system’s network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded. flash flood echo poison packet reflection
Poison Packet
61
A characteristic of reflection attacks is the lack of _______ traffic. backscatter botnet three-way network
Backscatter
62
_______ bandwidth attacks attempt to take advantage of the disproportionally large resource consumption at a server. Application-based Amplification System-based
Application Based
63
TCP uses the _______ to establish a connection. zombie directed broadcast three-way handshake SYN cookie
Three-Way Handshake
64
Bots starting from a given HTTP link and then following all links on the provided Web site in a recursive way is called _______. spidering trailing spoofing crowding
Spidering
65
Using forged source addresses is known as _________. directed broadcast a three-way address random dropping source address spoofing
Source Address Spoofing
66
______ relates to the capacity of the network links connecting a server to the wider Internet. Network bandwidth Application resource Directed broadcast System payload
Network Bandwidth
67
_______ is a text-based protocol with a syntax similar to that of HTTP. SIP RIP DIP HIP
SIP
68
______ attempts to monopolize all of the available request handling threads on the Web server by sending HTTP requests that never complete/ HTTP SYN flooding Slowloris Reflection attacks
Slowloris
69
A(n) ________ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor. analysis sensor inline sensor passive sensor LAN sensor
Inline Sensor
70
The _________ module analyzes LAN traffic and reports the results to the central manager. central manager agent architecture agent host agent LAN monitor agent
LAN Monitor Agent
71
A ________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity. intrusion detection network-based IDS security intrusion host-based IDS
Network-Based IDS
72
__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder. Threshold detection Signature detection Anomaly detection Profile based detection
Signature Detection
73
The rule _______ tells Snort what to do when it finds a packet that matches the rule criteria direction action destination port protocol
Action
74
A (n) __________ is a hacker with minimal technical skill who primarily uses existing attack toolkits. Master Activist Apprentice Journeyman
Apprentice
75
The ________ is responsible for determining if an intrusion has occurred. host analyzer user interface sensor
Analyzer
76
A _________ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so. intrusion detection criminal enterprise security intrusion IDS
Security Intrusion
77
The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central manager. host agent architecture agent LAN monitor agent central manager agent
Host Agent
78
_________ is a document that describes the application level protocol for exchanging data between intrusion detection entities. RFC 4765 RFC 4766 RFC 4767 RFC 4764
RFC 4767
79
_________ involves the collection of data relating to the behavior of legitimate users over a period of time. Anomaly detection Threshold detection Profile based detection Signature detection
Anamoly Detection
80
A(n) ________ event is an alert that is generated when the gossip traffic enables a platform to conclude that an attack is under way. PEP IDME DDI IDEP
DDI
81
The _______ is the ID component that analyzes the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator. analyzer sensor data source operator
Analyzer
82
__________________are either individuals or members of a larger group of outsider attackers who are motivated by social or political causes. Activists Cyber criminals State-sponsored organizations Others
Activists
83
A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity. security intrusion host-based IDS network-based IDS intrusion detection
Host-Based IDS
84
An example of a circuit-level gateway implementation is the __________ package. SMTP SOCKS application-level stateful inspection
Application-Level
85
________ control determines the direction in which particular service requests may be initiated and allowed to flow through the firewall. Behavior User Direction Service
Direction
86
The _________ defines the transport protocol. IP protocol field source IP address interface destination IP address
IP Protocol Field
87
A _________ consists of a set of computers that interconnect by means of a relatively unsecure network and makes use of encryption and special protocols to provide security. stateful inspection firewall UTM VPN proxy
Virtual Private Network (VPN)
88
Typically the systems in the _________ require or foster external connectivity such as a corporate Web site, an e-mail server, or a DNS server. DMZ boundary firewall IP protocol field VPN
DMZ
89
A _________ configuration involves stand-alone firewall devices plus host-based firewalls working together under a central administrative control. stateful inspection firewall distributed firewall personal firewall packet filtering firewall
Distributed Firewall Devices
90
________ control controls how particular services are used. Service Behavior User Direction
Behavior
91
_______ control controls access to a service according to which user is attempting to access it. User Service Behavior Direction
User
92
_________ control determines the types of Internet services that can be accessed, inbound or outbound. Service Direction User Behavior
Service
93
A __________ gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host. application-level packet filtering stateful inspection circuit-level
circuit level
94
The _________ approach involves conducting a risk analysis for the organization’s IT systems that exploits the knowledge and expertise of the individuals performing the analysis. detailed informal combined baseline
Informal
95
_________ is choosing to accept a risk level greater than normal for business reasons. Risk avoidance Risk acceptance Risk transfer Reducing likelihood
Risk Acceptance
96
The intent of the ________ is to provide a clear overview of how an organization’s IT infrastructure supports its overall business objectives corporate security policy risk register threat assessment vulnerability source
Corporate Security Policy
97
The ________ has revised and consolidated a number of national and international standards into a consensus of best practice. ISO VSB CSI DBI
ISO
98
________ include management, operational, and technical processes and procedures that act to reduce the exposure of the organization to some risks by reducing the ability of a threat source to exploit some vulnerabilities. Security controls Risk controls Risk appetite None of these
Security Controls
99
The results of the risk analysis should be documented in a _________. consequence none of these journal risk register
Risk Register
100
The purpose of ________ is to determine the basic parameters within which the risk assessment will be conducted and then to identify the assets to be examined. risk avoidance combining control establishing the context
Establishing the Context
101
________ specification indicates the impact on the organization should the particular threat in question actually eventuate. Threat Likelihood Risk Consequence
Consequence
102
_________ ensures that critical assets are sufficiently protected in a cost-effective manner IT discipline IT security management IT risk implementations IT control
IT Security Management
103
A ________ is anything that might hinder or prevent an asset from providing appropriate levels of the key security services. control risk threat vulnerability
Threat
104
The advantages of the _________ approach are that it doesn’t require the expenditure of additional resources in conducting a more formal risk assessment and that the same measures can be replicated over a range of systems baseline informal detailed combined
baseline
105
_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner. IT security management Detection and recovery control Security compliance Configuration management control
IT Security Management
106
Management should conduct a ________ to identify those controls that are most appropriate and provide the greatest benefit to the organization given the available resources. none of these cost analysis benefit analysis cost-benefit analysis
cost-benefit analysis
107
The follow-up stage of the management process does not include _________. cost analysis maintenance of security controls security compliance checking incident handling
Cost Analysis
108
The objective of the ________ control category is to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption. information security incident management asset management physical and environmental security business and continuity management
Business and Continuity Management
109
Periodically reviewing controls to verify that they still function as intended, upgrading controls when new requirements are discovered, ensuring that changes to systems do not adversely affect the controls, and ensuring new threats or vulnerabilities have not become known are all ________ tasks. maintenance security compliance program management incident handling
maintenance
110
A contingency plan for systems critical to a large organization would be _________ than that for a small business. smaller, more detailed larger, more detailed larger, less detailed smaller, less detailed
larger, more detailed
111
According to our text, an IT security plan should include details of _________. recommended controls risks responsible personnel all of these
All of these
112
The implementation process is typically monitored by the organizational ______. technology officer human resources security officer general counsel
Security Officer
113
The objective of the ________ control category is to avoid breaches of any law, statutory, regulatory, or contractual obligations, and of any security requirements. asset management business continuity management access compliance
Compliance
114
________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies. Management Detection and recovery Technical Preventative
Detection and Recovery
115
_______ controls are pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls. Supportive Operational Preventative Detection and recovery
Supportive
116
_______ controls focus on security policies, planning, guidelines, and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization’s mission. Supportive Preventative Technical Management
Management
117
Identification and authentication is part of the _______ class of security controls. operational technical management verification
Technical
118
Maintenance of security controls, security compliance checking, change and configuration management, and incident handling are all included in the follow-up stage of the _________ process. security awareness and training management maintenance all of these
Management
119
________ need training on the development of risk management goals, means of measurement, and the need to lead by example in the area of security awareness. Executives Analysts Trainers Managers
Executives
120
A _______ policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or recover using computer forensics any data covered by this policy. standard of conduct business use only company rights unlawful activity prohibited
Company Rights
121
Security awareness, training, and education programs can serve as a deterrent to fraud and actions by disgruntled employees by increasing employees’ knowledge of their ________ and of potential penalties. liability accountability incidents regulations
accountability
122
________ is the process of receiving, initial sorting, and prioritizing of information to facilitate its appropriate handling. Incident Triage Constituency Handling
Triage
123
The _________ level focuses on developing the ability and vision to perform complex, multidisciplinary activities and the skills needed to further the IT security profession and to keep pace with threat and technology changes. roles and responsibilities relative to IT systems security basics and literacy education and experience security awareness
Education and Experience
124
The _______ category is a transitional stage between awareness and training. education and experiences roles and responsibilities relative to IT systems security awareness security basics and literacy
Security basics and literacy
125
CERT stands for ___________. Compliance Emergency Response Technology Compliance Error Repair Technology Computer Error Response Team Computer Emergency Response Team
Computer Emergency Response Team
126
________ is explicitly required for all employees. Security awareness Roles and responsibilities relative to IT systems Security basics and literacty Education and experience
Security Awareness
127
___________ scan critical system files, directories, and services to ensure they have not been changed without proper authorization. System integrity verification tools Network and host intrusion detection systems Intrusion prevention systems Log analysis tools
System Integrity Verification Tools
128
________ can include computer viruses, Trojan horse programs, worms, exploit scripts, and toolkits. Artifacts Vulnerabilities CSIRT Constituencies
Artifacts
129
A _______ policy states that violation of this policy may result in immediate termination of employment or other discipline deemed appropriate by the company. business use only policy scope company rights disciplinary action
disciplinary action