Deck 8: Information Security

ملء الشاشة (f)
exit full mode
سؤال
The term ____________________ comes about because perpetrators cast out bait, in the form of e-mail messages, to thousands of potential victims in the hope that one or two will "bite" and fall for this scam.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The operating system encrypts the password for a given user by encoding the information, using a process that is difficult to apply but easy to undo.
سؤال

To reduce the chance that two passwords will have the same hash value, a timestamp can be appended to a password,and the result is then run through the encryption algorithm and stored as theencrypted password in the password file.
سؤال
A text file can be hidden in an image file by changing (if needed) the least significant bit of each byte of the image file to match the ____________________ form of the characters in the text.
سؤال
____________________ is the science of "secret writing."
سؤال
A block cipher encodes one character at a time.
سؤال
Your best defense against someone guessing your password is to be smart about how you choose and use your password.
سؤال
The success of RSA encryption depends on the fact that it is extremely difficult to find the prime factors for n if n is a small number.
سؤال
Firewall software guards the access points to your computer, blocking communications to or from sites you don't permit._________________________
سؤال
Sometimes the word cracker is used to denote those who break into someone else's computer.
سؤال
A(n) asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver._________________________
سؤال
SSL protocols are the only protocols that are supported by all web browsers.
سؤال
DES is a block cipher and the blocks are 48 bits long._________________________
سؤال
When a user attempts to log on to the machine, a hash function reads the user ID and checks that the password matches the password for that user in the password file.
سؤال
In the early days of computing, when big mainframes were the only option, logical security was enforced by securing the rooms housing these machines._________________________
سؤال
A(n) Trojan horse embeds itself within another program or file and when that program or file is activated, it copies itself and attacks other files on the system._________________________
سؤال
In an asymmetric encryption algorithm, also called a public key encryption algorithm, the key for encryption and the key for decryption are quite different, although related.
سؤال
In a(n) ____________________ key system, the encryption key for messages to go to a particular receiver is broadcast to everyone, but the decryption key cannot be derived from it and is known only by the receiver.
سؤال
The main difficulty with a symmetric algorithm is how to securely transmit the secret key.
سؤال
Any positive ____________________ is either a prime number or a number that can be written in a unique way as a product of prime factors.
سؤال
____ is the process of using people to get the information you want.

A) Social networking
B) Social engineering
C) Social objecting
D) Social management
سؤال
A ____ captures the user's passwords and credit card numbers (and sends them to someone else), or may even put the computer under someone else's remote control at some point in the future.

A) keystroke logger
B) virus
C) worm
D) sniffer
سؤال
A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.

A) block
B) Trojan
C) Caesar
D) Brutus
سؤال
In a ____ cipher a single letter of plaintext generates a single letter of ciphertext.

A) substitution
B) next
C) shift
D) modulo
سؤال
A(n) ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.

A) hash function
B) encryption function
C) mash function
D) stash function
سؤال
The most common public key encryption algorithm is ____.

A) SHA1
B) AES
C) DES
D) RSA
سؤال
For a given user ID, ____ software will first try all words in its built-in dictionary, encrypting each with the well-known hash function and comparing the result with the password file.

A) password-cracking
B) password-phreaking
C) password-whacking
D) password-tackling
سؤال
____ is a practice used to illegally obtain sensitive information such as credit card numbers, account numbers, and passwords.

A) Phishing
B) Pharming
C) Blasting
D) Fishing
سؤال
____ is a series of protocols developed by Netscape Communications in the mid-1990s.

A) TLS
B) SSL
C) TSL
D) SST
سؤال
____ governs what an authenticated user is allowed to do.

A) Authentication
B) Encryption
C) Access management
D) Authorization
سؤال
____ means keeping information secure-that is, protected from those who should not have access to it.

A) Network security
B) Network assurance
C) Information assurance
D) Information security
سؤال
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong ____ and authorization process.

A) authentication
B) encryption
C) access
D) interference
سؤال
The ____ maintains a file of user IDs and corresponding passwords.

A) switch
B) router
C) operating system
D) firewall
سؤال
To solve the problem of two users having the same password, some operating systems keep a third entry for each user in the password file, namely ____ at which the user created the password.

A) the system
B) the approximate time
C) the system name
D) the exact time
سؤال
____ verifies who has the right to gain access to the computer, whether it is your local machine or the web server.

A) Authorization
B) Authentication
C) Access
D) Encryption
سؤال
To try all possible passwords of length k or less would require ____ attempts.

A) nk
B) kk
C) n1 + n2 + ...+ nk
D) k1 + k2 + ...+ kn
سؤال
Some laptops now use ____ information such as fingerprint scanning.

A) psychometric
B) electromagnetic
C) biometric
D) optical
سؤال
The exchange of setup information between the client and server, preparatory to exchanging real data, is known as a ____.

A) handshake
B) training exchange
C) linkage
D) synchronization
سؤال
A ____ attack automatically directs browsers on many machines to a single web address at roughly the same time, causing so much network traffic to that site that it is effectively shut down to legitimate users.

A) denial-of-use
B) trial-of-service
C) trial-of-use
D) denial-of-service
سؤال
A ____ is an integer greater than 1 that can only be written as the product of itself and 1.

A) prime number
B) primary number
C) natural number
D) whole number
سؤال
Explain at length what a Caesar cipher does.
سؤال
Provide at least five examples of ways in which you can protect yourself from online threats.
سؤال
Depending on who a given user is, he or she can have various access privileges.What are four examples?
سؤال
How do operating systems solve the problem of a thief stealing a password file and seeing that his password and another password hash to the same value?
سؤال
What is the major difference between TSL and SSL?
سؤال
What is the definition of phishing?
سؤال
How does Triple DES improve the security of DES?
سؤال
Explain what a denial-of-service attack is, including the terms DDOS and zombie army in your response.
سؤال
Explain what an embedded computer is and provide examples.
سؤال
Provide at least four suggestions for choosing passwords, and three suggestions for using passwords.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Information Security
1
The term ____________________ comes about because perpetrators cast out bait, in the form of e-mail messages, to thousands of potential victims in the hope that one or two will "bite" and fall for this scam.
phishing
2
The operating system encrypts the password for a given user by encoding the information, using a process that is difficult to apply but easy to undo.
False
3

To reduce the chance that two passwords will have the same hash value, a timestamp can be appended to a password,and the result is then run through the encryption algorithm and stored as theencrypted password in the password file.
True
4
A text file can be hidden in an image file by changing (if needed) the least significant bit of each byte of the image file to match the ____________________ form of the characters in the text.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
____________________ is the science of "secret writing."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
A block cipher encodes one character at a time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Your best defense against someone guessing your password is to be smart about how you choose and use your password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
The success of RSA encryption depends on the fact that it is extremely difficult to find the prime factors for n if n is a small number.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Firewall software guards the access points to your computer, blocking communications to or from sites you don't permit._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Sometimes the word cracker is used to denote those who break into someone else's computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
A(n) asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
SSL protocols are the only protocols that are supported by all web browsers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
DES is a block cipher and the blocks are 48 bits long._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
When a user attempts to log on to the machine, a hash function reads the user ID and checks that the password matches the password for that user in the password file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
In the early days of computing, when big mainframes were the only option, logical security was enforced by securing the rooms housing these machines._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
A(n) Trojan horse embeds itself within another program or file and when that program or file is activated, it copies itself and attacks other files on the system._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
In an asymmetric encryption algorithm, also called a public key encryption algorithm, the key for encryption and the key for decryption are quite different, although related.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
In a(n) ____________________ key system, the encryption key for messages to go to a particular receiver is broadcast to everyone, but the decryption key cannot be derived from it and is known only by the receiver.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
The main difficulty with a symmetric algorithm is how to securely transmit the secret key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Any positive ____________________ is either a prime number or a number that can be written in a unique way as a product of prime factors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
____ is the process of using people to get the information you want.

A) Social networking
B) Social engineering
C) Social objecting
D) Social management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
A ____ captures the user's passwords and credit card numbers (and sends them to someone else), or may even put the computer under someone else's remote control at some point in the future.

A) keystroke logger
B) virus
C) worm
D) sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.

A) block
B) Trojan
C) Caesar
D) Brutus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
In a ____ cipher a single letter of plaintext generates a single letter of ciphertext.

A) substitution
B) next
C) shift
D) modulo
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.

A) hash function
B) encryption function
C) mash function
D) stash function
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
The most common public key encryption algorithm is ____.

A) SHA1
B) AES
C) DES
D) RSA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
For a given user ID, ____ software will first try all words in its built-in dictionary, encrypting each with the well-known hash function and comparing the result with the password file.

A) password-cracking
B) password-phreaking
C) password-whacking
D) password-tackling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
____ is a practice used to illegally obtain sensitive information such as credit card numbers, account numbers, and passwords.

A) Phishing
B) Pharming
C) Blasting
D) Fishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
____ is a series of protocols developed by Netscape Communications in the mid-1990s.

A) TLS
B) SSL
C) TSL
D) SST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
____ governs what an authenticated user is allowed to do.

A) Authentication
B) Encryption
C) Access management
D) Authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
____ means keeping information secure-that is, protected from those who should not have access to it.

A) Network security
B) Network assurance
C) Information assurance
D) Information security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong ____ and authorization process.

A) authentication
B) encryption
C) access
D) interference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
The ____ maintains a file of user IDs and corresponding passwords.

A) switch
B) router
C) operating system
D) firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
To solve the problem of two users having the same password, some operating systems keep a third entry for each user in the password file, namely ____ at which the user created the password.

A) the system
B) the approximate time
C) the system name
D) the exact time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
____ verifies who has the right to gain access to the computer, whether it is your local machine or the web server.

A) Authorization
B) Authentication
C) Access
D) Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
To try all possible passwords of length k or less would require ____ attempts.

A) nk
B) kk
C) n1 + n2 + ...+ nk
D) k1 + k2 + ...+ kn
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Some laptops now use ____ information such as fingerprint scanning.

A) psychometric
B) electromagnetic
C) biometric
D) optical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
The exchange of setup information between the client and server, preparatory to exchanging real data, is known as a ____.

A) handshake
B) training exchange
C) linkage
D) synchronization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
A ____ attack automatically directs browsers on many machines to a single web address at roughly the same time, causing so much network traffic to that site that it is effectively shut down to legitimate users.

A) denial-of-use
B) trial-of-service
C) trial-of-use
D) denial-of-service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
A ____ is an integer greater than 1 that can only be written as the product of itself and 1.

A) prime number
B) primary number
C) natural number
D) whole number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Explain at length what a Caesar cipher does.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Provide at least five examples of ways in which you can protect yourself from online threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Depending on who a given user is, he or she can have various access privileges.What are four examples?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
How do operating systems solve the problem of a thief stealing a password file and seeing that his password and another password hash to the same value?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What is the major difference between TSL and SSL?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What is the definition of phishing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
How does Triple DES improve the security of DES?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Explain what a denial-of-service attack is, including the terms DDOS and zombie army in your response.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Explain what an embedded computer is and provide examples.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Provide at least four suggestions for choosing passwords, and three suggestions for using passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.