Sec + Flashcards

Study for Sec+ (40 cards)

1
Q

A digital signature provides ______, ________, and _________ in electronic mail.

A

integrity, authentication, and non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Non-repudiation

A

ensures that the sender cannot deny the previous actions or message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What ensures that the sender cannot deny the previous actions or message.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

Providing assurance that a message was not modified during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

The process of verifying that the sender is who he says he is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Providing assurance that a message was not modified during transmission.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of verifying that the sender is who he says he is.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digital signatures do not provide encryption and cannot ensure _____________.

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A digital signature is a hash value that is encrypted with the sender’s private key. For example, a file on Windows 98 that has been digitally signed indicates that the file has passed quality testing by Microsoft. The message is digitally signed. Therefore, it provides authentication, non-repudiation, and __________.

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If a recipient wants to verify a digital signature, the ______ ______ of the signer must be used in conjunction with the ______ _______.

A

public key

hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Signature Standard (DSS) defines digital signatures. It provides integrity and authentication. It is not a _________ ______ ____________.

A

symmetric key algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A digital signature cannot be spoofed. Therefore, attacks, such as man-in-the-middle attacks, cannot harm the integrity of the ___________.

A

message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Microsoft uses _______ ________ to ensure the integrity of driver files.

A

digital signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A digital signature cannot be ____________. Therefore, attacks, such as man-in-the-middle attacks, cannot harm the integrity of the ___________.

A

spoofed

message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Microsoft uses digital signing to ensure the integrity of _______ __________.

A

driver files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advanced Encryption Standard

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AES= A_______ E_______ S_______

A

Advanced Encryption Standard

18
Q

Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish are examples of symmetrical algorithms and pseudo-random number generation (PRNG). Symmetric algorithms are sometimes called b_____ c______.

A

block ciphers

19
Q

Random number generation and pseudo-random number generation are types of algorithms used to generate c____________ keys.

A

cryptographic keys

20
Q

PRNG uses a symmetric algorithm to generate a number that is “random enough” for cryptographic purposes. PRNG is used in A_S, D_S, and B______.

A

AES, DES, and Blowfish

21
Q

Random number generation is used in asymmetric ciphers, such as R_A, D_____-H____, and E_____ C_____ C________ (E_C).

A

RSA, Diffie-Hellman, and Elliptic Curve Cryptosystem (ECC).

22
Q

_________ is the cryptographic technique whereby a change of a single input bit results in a change of multiple output bits.

23
Q

A collision is the result of a hashing algorithm producing the same ________ from two different inputs.

24
Q

Obfuscation is the basic foundation of both ______ and _________. The term means to hide something so that it is not easily readable.

A

encryption and steganography

25
Key strength should reflect the sensitivity of the data it protects. Generally, as the need to secure the data increases, so should the strength of the ___. Longer keys require more processing power (and time) to ______.
key | break
26
DLP
Data Loss Prevention
27
Memory leaks-
Memory leaks can be caused by a programmer failing to free up memory once the process using that memory has been completed. C and C++ are particularly prone to memory leaks.
28
Integer overflows
happen when a number too large to fit into the data type "integer" is not rejected and is allowed to corrupt the program.
29
Pointer de-references
occur when a pointer (which points to the proper memory location) has the reference changed. This results in the pointer pointing to an inaccurate value
30
__ ________ ________ is an example of improper input handling being allowed by the application code, and the impact can include crashing the application. Other examples of improper input handling include failure to validate the type of data in an input field, the length of the data, proper date ranges.
A buffer overflow
31
_______ _______ can be caused by a programmer failing to free up memory once the process using that memory has been completed. C and C++ are particularly prone to memory leaks.
Memory leaks
32
_______ _________ happen when a number too large to fit into the data type "integer" is not rejected and is allowed to corrupt the program.
Integer overflows
33
____ __________ occur when a pointer (which points to the proper memory location) has the reference changed. This results in the pointer pointing to an inaccurate value
Pointer de-references
34
A buffer overflow
an example of improper input handling being allowed by the application code, and the impact can include crashing the application. Other examples of improper input handling include failure to validate the type of data in an input field, the length of the data, proper date ranges.
35
Stateless firewalls
make decisions based on the data that comes in and not on any complex rules.
36
Stateful firewalls
maintain a state table that tracks every communication packet.
37
These firewalls make decisions based on the data that comes in and not on any complex rules.
Stateless firewalls
38
These firewalls maintain a state table that tracks every communication packet.
Stateful firewalls
39
LDAP
389
40
389
LDAP