Deck 8: Information Security

ملء الشاشة (f)
exit full mode
سؤال
A(n)asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver. _________________________
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
When a user attempts to log on to the machine, a hash function reads the user ID and checks that the password matches the password for that user in the password file.
سؤال
The term ____________________ comes about because perpetrators cast out bait, in the form of email messages, to thousands of potential victims in the hope that one or two will "bite" and fall for the scam.
سؤال
The success of RSA encryption depends on the fact that it is extremely difficult to find the prime factors for n if n is a large number.
سؤال
A block cipher encodes one character at a time.
سؤال
To reduce the chance that two passwords will have the same hash value, a timestamp can be appended to a password, and the result is then run through the encryption algorithm and stored as the encrypted password in the password file.
سؤال
In an asymmetric encryption algorithm, also called a public key encryption algorithm, the key for encryption and the key for decryption are quite different, although related.
سؤال
DES is a block cipher and the blocks are 48 bits long. _________________________
سؤال
The main difficulty with a symmetric algorithm is how to securely transmit the secret key.
سؤال
Sometimes the word hacker is used to denote a person who breaks into someone else's computer.
سؤال
_______ is the hide in plain sight encryption when a text file is hidden in an image file by changing (if needed)the least significant bit of each byte of the image file to match the binary form of the characters in the text.
سؤال
____________________ is the science of "secret writing."
سؤال
In the early days of computing, when large mainframes were the only option, physical security was enforced by securing the rooms housing these machines. _________________________
سؤال
Any positive ____________________ is either a prime number or a number that can be written in a unique way as a product of prime factors.
سؤال
The operating system encrypts the password for a given user by encoding the information, using a process that is easy to apply but difficult to undo.
سؤال
A Trojan horse embeds itself within another program or file, and when that program or file is activated, it copies itself and attacks other files on the system. _________________________
سؤال
Firewall software guards the access points to your computer, blocking viruses from sites . _________________________
سؤال
SSL protocols are the only security protocols that are supported by all web browsers.
سؤال
In a(n)public-key system, the __________ for messages to go to a particular receiver is broadcast to everyone, but the decryption key cannot be derived from it and is known only by the receiver.
سؤال
Your best defense against someone guessing your password is to be smart about how you choose and use your password.
سؤال
____ governs what an authenticated user is allowed to do.

A)Authentication
B)Encryption
C)Access management
D)Authorization
سؤال
To try all possible passwords of length k or less would require ____ attempts.

A)nk
B)kk
C)n 1 + n 2 + … + n k
D)k1 + k2 + … + kn
سؤال
Some companies now send users a temporary code or password to a trusted device after they have logged in with a valid username and password through a process known as _______

A)temporary authentication
B)dual authorization
C)dual authentication
D)biometric authentication
سؤال
A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.

A)block
B)Trojan
C)Caesar
D)Brutus
سؤال
The exchange of setup information between the client and server, preparatory to exchanging real data, is known as a ____.

A)handshake
B)training exchange
C)linkage
D)synchronization
سؤال
____ is a nontechnical method of getting password information from individuals.

A)Social networking
B)Social engineering
C)Social objecting
D)Social management
سؤال
For a given user ID, ____ software will first try all words in its built-in dictionary, encrypting each with the well-known hash function and comparing the result with the password file.

A)password-cracking
B)password-phreaking
C)password-whacking
D)password-tackling
سؤال
In a ____ cipher, a single letter of plaintext generates a single letter of ciphertext.

A)substitution
B)next
C)shift
D)modulo
سؤال
____ is a practice used to illegally obtain sensitive information such as credit card numbers, account numbers, and passwords.

A)Phishing
B)Pharming
C)Blasting
D)Fishing
سؤال
The ____ maintains a file of user IDs and corresponding passwords.

A)switch
B)router
C)operating system
D)firewall
سؤال
The ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.

A)hash function
B)encryption function
C)mash function
D)stash function
سؤال
A ____ attack automatically directs browsers on many machines to a single web address at roughly the same time, causing so much network traffic to that site that it is effectively shut down to legitimate users.

A)denial-of-use
B)trial-of-service
C)trial-of-use
D)denial-of-service
سؤال
A ____ captures the user's passwords and credit card numbers (and sends them to someone else), or may even put the computer under someone else's remote control at some point in the future.

A)keystroke logger
B)virus
C)worm
D)sniffer
سؤال
The most common public-key encryption algorithm is ____.

A)SHA1
B)AES
C)DES
D)RSA
سؤال
A ____ is an integer greater than 1 that can only be written as the product of itself and 1.

A)prime number
B)primary number
C)natural number
D)whole number
سؤال
To solve the problem of two users having the same password, some operating systems keep a third entry for each user in the password file, namely, ____ at which the user created the password.

A)the system
B)the approximate time
C)the system name
D)the exact time
سؤال
____ verifies who has the right to gain access to the computer, whether it is your local machine or the web server.

A)Authorization
B)Authentication
C)Access
D)Encryption
سؤال
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authentication and __________ process.

A)authorization
B)encryption
C)access
D)interference
سؤال
____ means keeping information secure-that is, protected from those who should not have access to it.

A)Network security
B)Network assurance
C)Information assurance
D)Information security
سؤال
____ is a series of protocols developed by Netscape Communications in the mid-1990s.

A)TLS
B)SSL
C)TSL
D)SST
سؤال
How does Triple DES improve the security of DES?
سؤال
Provide at least four suggestions for choosing passwords and three suggestions for using passwords.
سؤال
How do operating systems solve the problem of a thief stealing a password file and seeing that his password and another password hash to the same value?
سؤال
What is the definition of phishing?
سؤال
Provide at least five examples of ways in which you can protect yourself from online threats.
سؤال
Explain what an embedded computer is and provide examples.
سؤال
Explain what a denial-of-service attack is, including the terms DDOS and zombie army in your response.
سؤال
What is the major difference between TSL and SSL?
سؤال
Explain at length what a Caesar cipher does.
سؤال
Depending on who a given user is, he or she can have various access privileges. What are four examples?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Information Security
1
A(n)asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver. _________________________
False
2
When a user attempts to log on to the machine, a hash function reads the user ID and checks that the password matches the password for that user in the password file.
False
3
The term ____________________ comes about because perpetrators cast out bait, in the form of email messages, to thousands of potential victims in the hope that one or two will "bite" and fall for the scam.
phishing
4
The success of RSA encryption depends on the fact that it is extremely difficult to find the prime factors for n if n is a large number.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
A block cipher encodes one character at a time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
To reduce the chance that two passwords will have the same hash value, a timestamp can be appended to a password, and the result is then run through the encryption algorithm and stored as the encrypted password in the password file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
In an asymmetric encryption algorithm, also called a public key encryption algorithm, the key for encryption and the key for decryption are quite different, although related.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
DES is a block cipher and the blocks are 48 bits long. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
The main difficulty with a symmetric algorithm is how to securely transmit the secret key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Sometimes the word hacker is used to denote a person who breaks into someone else's computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
_______ is the hide in plain sight encryption when a text file is hidden in an image file by changing (if needed)the least significant bit of each byte of the image file to match the binary form of the characters in the text.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
____________________ is the science of "secret writing."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
In the early days of computing, when large mainframes were the only option, physical security was enforced by securing the rooms housing these machines. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Any positive ____________________ is either a prime number or a number that can be written in a unique way as a product of prime factors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
The operating system encrypts the password for a given user by encoding the information, using a process that is easy to apply but difficult to undo.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
A Trojan horse embeds itself within another program or file, and when that program or file is activated, it copies itself and attacks other files on the system. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Firewall software guards the access points to your computer, blocking viruses from sites . _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
SSL protocols are the only security protocols that are supported by all web browsers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
In a(n)public-key system, the __________ for messages to go to a particular receiver is broadcast to everyone, but the decryption key cannot be derived from it and is known only by the receiver.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Your best defense against someone guessing your password is to be smart about how you choose and use your password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
____ governs what an authenticated user is allowed to do.

A)Authentication
B)Encryption
C)Access management
D)Authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
To try all possible passwords of length k or less would require ____ attempts.

A)nk
B)kk
C)n 1 + n 2 + … + n k
D)k1 + k2 + … + kn
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Some companies now send users a temporary code or password to a trusted device after they have logged in with a valid username and password through a process known as _______

A)temporary authentication
B)dual authorization
C)dual authentication
D)biometric authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.

A)block
B)Trojan
C)Caesar
D)Brutus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
The exchange of setup information between the client and server, preparatory to exchanging real data, is known as a ____.

A)handshake
B)training exchange
C)linkage
D)synchronization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
____ is a nontechnical method of getting password information from individuals.

A)Social networking
B)Social engineering
C)Social objecting
D)Social management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
For a given user ID, ____ software will first try all words in its built-in dictionary, encrypting each with the well-known hash function and comparing the result with the password file.

A)password-cracking
B)password-phreaking
C)password-whacking
D)password-tackling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
In a ____ cipher, a single letter of plaintext generates a single letter of ciphertext.

A)substitution
B)next
C)shift
D)modulo
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
____ is a practice used to illegally obtain sensitive information such as credit card numbers, account numbers, and passwords.

A)Phishing
B)Pharming
C)Blasting
D)Fishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
The ____ maintains a file of user IDs and corresponding passwords.

A)switch
B)router
C)operating system
D)firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
The ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.

A)hash function
B)encryption function
C)mash function
D)stash function
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
A ____ attack automatically directs browsers on many machines to a single web address at roughly the same time, causing so much network traffic to that site that it is effectively shut down to legitimate users.

A)denial-of-use
B)trial-of-service
C)trial-of-use
D)denial-of-service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
A ____ captures the user's passwords and credit card numbers (and sends them to someone else), or may even put the computer under someone else's remote control at some point in the future.

A)keystroke logger
B)virus
C)worm
D)sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
The most common public-key encryption algorithm is ____.

A)SHA1
B)AES
C)DES
D)RSA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
A ____ is an integer greater than 1 that can only be written as the product of itself and 1.

A)prime number
B)primary number
C)natural number
D)whole number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
To solve the problem of two users having the same password, some operating systems keep a third entry for each user in the password file, namely, ____ at which the user created the password.

A)the system
B)the approximate time
C)the system name
D)the exact time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
____ verifies who has the right to gain access to the computer, whether it is your local machine or the web server.

A)Authorization
B)Authentication
C)Access
D)Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authentication and __________ process.

A)authorization
B)encryption
C)access
D)interference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
____ means keeping information secure-that is, protected from those who should not have access to it.

A)Network security
B)Network assurance
C)Information assurance
D)Information security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
____ is a series of protocols developed by Netscape Communications in the mid-1990s.

A)TLS
B)SSL
C)TSL
D)SST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
How does Triple DES improve the security of DES?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Provide at least four suggestions for choosing passwords and three suggestions for using passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
How do operating systems solve the problem of a thief stealing a password file and seeing that his password and another password hash to the same value?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What is the definition of phishing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Provide at least five examples of ways in which you can protect yourself from online threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Explain what an embedded computer is and provide examples.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Explain what a denial-of-service attack is, including the terms DDOS and zombie army in your response.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What is the major difference between TSL and SSL?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Explain at length what a Caesar cipher does.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Depending on who a given user is, he or she can have various access privileges. What are four examples?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.