Deck 8: Information Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 8: Information Security
1
A(n)asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver. _________________________
False
2
When a user attempts to log on to the machine, a hash function reads the user ID and checks that the password matches the password for that user in the password file.
False
3
The term ____________________ comes about because perpetrators cast out bait, in the form of email messages, to thousands of potential victims in the hope that one or two will "bite" and fall for the scam.
phishing
4
The success of RSA encryption depends on the fact that it is extremely difficult to find the prime factors for n if n is a large number.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
A block cipher encodes one character at a time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
To reduce the chance that two passwords will have the same hash value, a timestamp can be appended to a password, and the result is then run through the encryption algorithm and stored as the encrypted password in the password file.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
In an asymmetric encryption algorithm, also called a public key encryption algorithm, the key for encryption and the key for decryption are quite different, although related.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
DES is a block cipher and the blocks are 48 bits long. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The main difficulty with a symmetric algorithm is how to securely transmit the secret key.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Sometimes the word hacker is used to denote a person who breaks into someone else's computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
_______ is the hide in plain sight encryption when a text file is hidden in an image file by changing (if needed)the least significant bit of each byte of the image file to match the binary form of the characters in the text.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
____________________ is the science of "secret writing."
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
In the early days of computing, when large mainframes were the only option, physical security was enforced by securing the rooms housing these machines. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Any positive ____________________ is either a prime number or a number that can be written in a unique way as a product of prime factors.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The operating system encrypts the password for a given user by encoding the information, using a process that is easy to apply but difficult to undo.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A Trojan horse embeds itself within another program or file, and when that program or file is activated, it copies itself and attacks other files on the system. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Firewall software guards the access points to your computer, blocking viruses from sites . _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
SSL protocols are the only security protocols that are supported by all web browsers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
In a(n)public-key system, the __________ for messages to go to a particular receiver is broadcast to everyone, but the decryption key cannot be derived from it and is known only by the receiver.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Your best defense against someone guessing your password is to be smart about how you choose and use your password.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
____ governs what an authenticated user is allowed to do.
A)Authentication
B)Encryption
C)Access management
D)Authorization
A)Authentication
B)Encryption
C)Access management
D)Authorization
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
To try all possible passwords of length k or less would require ____ attempts.
A)nk
B)kk
C)n 1 + n 2 + … + n k
D)k1 + k2 + … + kn
A)nk
B)kk
C)n 1 + n 2 + … + n k
D)k1 + k2 + … + kn
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Some companies now send users a temporary code or password to a trusted device after they have logged in with a valid username and password through a process known as _______
A)temporary authentication
B)dual authorization
C)dual authentication
D)biometric authentication
A)temporary authentication
B)dual authorization
C)dual authentication
D)biometric authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.
A)block
B)Trojan
C)Caesar
D)Brutus
A)block
B)Trojan
C)Caesar
D)Brutus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The exchange of setup information between the client and server, preparatory to exchanging real data, is known as a ____.
A)handshake
B)training exchange
C)linkage
D)synchronization
A)handshake
B)training exchange
C)linkage
D)synchronization
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
____ is a nontechnical method of getting password information from individuals.
A)Social networking
B)Social engineering
C)Social objecting
D)Social management
A)Social networking
B)Social engineering
C)Social objecting
D)Social management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
For a given user ID, ____ software will first try all words in its built-in dictionary, encrypting each with the well-known hash function and comparing the result with the password file.
A)password-cracking
B)password-phreaking
C)password-whacking
D)password-tackling
A)password-cracking
B)password-phreaking
C)password-whacking
D)password-tackling
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
In a ____ cipher, a single letter of plaintext generates a single letter of ciphertext.
A)substitution
B)next
C)shift
D)modulo
A)substitution
B)next
C)shift
D)modulo
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
____ is a practice used to illegally obtain sensitive information such as credit card numbers, account numbers, and passwords.
A)Phishing
B)Pharming
C)Blasting
D)Fishing
A)Phishing
B)Pharming
C)Blasting
D)Fishing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The ____ maintains a file of user IDs and corresponding passwords.
A)switch
B)router
C)operating system
D)firewall
A)switch
B)router
C)operating system
D)firewall
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.
A)hash function
B)encryption function
C)mash function
D)stash function
A)hash function
B)encryption function
C)mash function
D)stash function
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
A ____ attack automatically directs browsers on many machines to a single web address at roughly the same time, causing so much network traffic to that site that it is effectively shut down to legitimate users.
A)denial-of-use
B)trial-of-service
C)trial-of-use
D)denial-of-service
A)denial-of-use
B)trial-of-service
C)trial-of-use
D)denial-of-service
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
A ____ captures the user's passwords and credit card numbers (and sends them to someone else), or may even put the computer under someone else's remote control at some point in the future.
A)keystroke logger
B)virus
C)worm
D)sniffer
A)keystroke logger
B)virus
C)worm
D)sniffer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
The most common public-key encryption algorithm is ____.
A)SHA1
B)AES
C)DES
D)RSA
A)SHA1
B)AES
C)DES
D)RSA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A ____ is an integer greater than 1 that can only be written as the product of itself and 1.
A)prime number
B)primary number
C)natural number
D)whole number
A)prime number
B)primary number
C)natural number
D)whole number
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
To solve the problem of two users having the same password, some operating systems keep a third entry for each user in the password file, namely, ____ at which the user created the password.
A)the system
B)the approximate time
C)the system name
D)the exact time
A)the system
B)the approximate time
C)the system name
D)the exact time
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
____ verifies who has the right to gain access to the computer, whether it is your local machine or the web server.
A)Authorization
B)Authentication
C)Access
D)Encryption
A)Authorization
B)Authentication
C)Access
D)Encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authentication and __________ process.
A)authorization
B)encryption
C)access
D)interference
A)authorization
B)encryption
C)access
D)interference
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
____ means keeping information secure-that is, protected from those who should not have access to it.
A)Network security
B)Network assurance
C)Information assurance
D)Information security
A)Network security
B)Network assurance
C)Information assurance
D)Information security
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
____ is a series of protocols developed by Netscape Communications in the mid-1990s.
A)TLS
B)SSL
C)TSL
D)SST
A)TLS
B)SSL
C)TSL
D)SST
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
How does Triple DES improve the security of DES?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Provide at least four suggestions for choosing passwords and three suggestions for using passwords.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
How do operating systems solve the problem of a thief stealing a password file and seeing that his password and another password hash to the same value?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is the definition of phishing?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Provide at least five examples of ways in which you can protect yourself from online threats.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Explain what an embedded computer is and provide examples.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Explain what a denial-of-service attack is, including the terms DDOS and zombie army in your response.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What is the major difference between TSL and SSL?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Explain at length what a Caesar cipher does.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Depending on who a given user is, he or she can have various access privileges. What are four examples?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck