Review Day Flashcards Preview

CS 356 > Review Day > Flashcards

Flashcards in Review Day Deck (15)
Loading flashcards...
1
Q

what are the 3 uses for crypto tools

A

authentication, integrity, confidentiality

2
Q

2 ways to hack a database

A

SQL injection and Access rights

3
Q

What are the 4 phases of a virus

A

Dormant

Propogation

Triggering

Execution

4
Q

Weak collision avoidance vs strong collision avoidance

A

weak collision: infeasable for attack to computer another message so that h(1) = h(2)

strong collision = infeasable to find any 2 messages h(x1) == h(x2)

5
Q

what viruses mutate as the propogate

A

polymorphic

6
Q

what is the way to avoid sqli

A

sanitize the input

7
Q

what does a password policy use to weed out a common list of passwords not to use

A

a bloom filter

8
Q

what type of protocol does remote authentication use

A

challenge response

9
Q

the 4 typical access control techniques

A

MAC

DAC

RBAC

ABAC

10
Q

what are subject and object tied toggether with

A

access rights

11
Q

what can be used to prevent a replay attack

A

nonce

12
Q

is it possible to sort an encrpyted db

A

no

13
Q

what are 2 examples of a DNS attack

A

Cache poisioning, DDOS

14
Q

what is used to cryptographically sign DNS records

A

DNSSEC

15
Q

what is the DNSSEC chain of trust

A

a verified handshake at every DNS lookup node so nothing will get redirected to a bogus site