Deck 8: Information Security

Full screen (f)
exit full mode
Question
In an asymmetric encryption algorithm, also called a public key encryption algorithm, the key for encryption and the key for decryption are quite different, although related.
Use Space or
up arrow
down arrow
to flip the card.
Question
Sometimes the word cracker is used to denote those who break into someone else's computer.
Question
The term ____________________ comes about because perpetrators cast out bait, in the form of e-mail messages, to thousands of potential victims in the hope that one or two will "bite" and fall for this scam.
Question
____________________ is the science of "secret writing."
Question
Your best defense against someone guessing your password is to be smart about how you choose and use your password.
Question
In the early days of computing, when big mainframes were the only option, logical security was enforced by securing the rooms housing these machines. _________________________
Question
A text file can be hidden in an image file by changing (if needed) the least significant bit of each byte of the image file to match the ____________________ form of the characters in the text.
Question
Any positive ____________________ is either a prime number or a number that can be written in a unique way as a product of prime factors.
Question
DES is a block cipher and the blocks are 48 bits long. _________________________
Question
Firewall software guards the access points to your computer, blocking communications to or from sites you don't permit. _________________________
Question
In a(n) ____________________ key system, the encryption key for messages to go to a particular receiver is broadcast to everyone, but the decryption key cannot be derived from it and is known only by the receiver.
Question
The main difficulty with a symmetric algorithm is how to securely transmit the secret key.
Question
Knowledge of the hashing algorithm gives you and the system administrator certain knowledge of the original password.
Question
A(n) asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver. _________________________
Question
When a user attempts to log on to the machine, the security system reads the user ID and checks that the password matches the password for that user in the password file.
Question
The operating system encrypts the password for a given user by encoding the information, using a process that is difficult to apply but easy to undo.
Question
A(n) Trojan horse embeds itself within another program or file and when that program or file is activated, it copies itself and attacks other files on the system. _________________________
Question
SSL protocols are the only protocols that are supported by all Web browsers.
Question
A block cipher encodes one character at a time.
Question
The success of RSA encryption depends on the fact that it is extremely difficult to find the prime factors for n if n is a small number.
Question
____ is the process of using people to get the information you want.

A) Social networking
B) Social engineering
C) Social objecting
D) Social management
Question
A ____ attack automatically directs browsers on many machines to a single URL at roughly the same time, causing so much network traffic to that site that it is effectively shut down to legitimate users.

A) denial-of-use
B) trial-of-service
C) trial-of-use
D) denial-of-service
Question
In a ____ cipher a single letter of plaintext generates a single letter of ciphertext.

A) substitution
B) next
C) shift
D) modulo
Question
____ means keeping information secure-that is, protected from those who should not have access to it.

A) Network security
B) Network assurance
C) Information assurance
D) Information security
Question
A ____ captures the user's passwords and credit card numbers (and sends them to someone else), or may even put the computer under someone else's remote control at some point in the future.

A) keystroke logger
B) virus
C) worm
D) sniffer
Question
A ____ is an integer greater than 1 that can only be written as the product of itself and 1.

A) prime number
B) primary number
C) natural number
D) whole number
Question
For a given user ID, ____ software will first try all words in its built-in dictionary, encrypting each with the well-known hash function and comparing the result with the password file.

A) password-cracking
B) password-phreaking
C) password-whacking
D) password-tackling
Question
A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.

A) block
B) Trojan
C) Caesar
D) Brutus
Question
Some laptops now use ____ information such as fingerprint scanning.

A) psychometric
B) electromagnetic
C) biometric
D) optical
Question
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong ____ and authorization process.

A) authentication
B) encryption
C) access
D) interference
Question
____ is a practice used to illegally obtain sensitive information such as credit card numbers, account numbers, and passwords.

A) Phishing
B) Pharming
C) Blasting
D) Fishing
Question
____ verifies who has the right to gain access to the computer, whether it is your local machine or the Web server.

A) Authorization
B) Authentication
C) Access
D) Encryption
Question
____ governs what an authenticated user is allowed to do.

A) Authentication
B) Encryption
C) Access management
D) Authorization
Question
The ____ maintains a file of user IDs and corresponding passwords.

A) switch
B) router
C) operating system
D) firewall
Question
The exchange of setup information between the client and server, preparatory to exchanging real data, is known as a ____.

A) handshake
B) training exchange
C) linkage
D) synchronization
Question
To try all possible passwords of length k or less would require ____ attempts.

A) nk
B) kk
C) n1 + n2 + . . . + nk
D) k1 + k2 + . . . + kn
Question
A(n) ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.

A) hash function
B) encryption function
C) mash function
D) stash function
Question
____ is a series of protocols developed by Netscape Communications in the mid-1990s.

A) TLS
B) SSL
C) TSL
D) SST
Question
The most common public key encryption algorithm is ____.

A) SHA1
B) AES
C) DES
D) RSA
Question
To solve the problem of two users having the same password, some operating systems keep a third entry for each user in the password file, namely ____ at which the user created the password.

A) the system
B) the approximate time
C) the system name
D) the exact time
Question
How do operating systems solve the problem of a thief stealing a password file and seeing that his password and another password hash to the same value?
Question
Provide at least four suggestions for choosing passwords, and three suggestions for using passwords.
Question
How does Triple DES improve the security of DES?
Question
Explain what a denial-of-service attack is, including the terms DDOS and zombie army in your response.
Question
Explain in detail the definition of the terms hacker and cracker and the evolution of these terms
Question
Provide at least five examples of ways in which you can protect yourself from online threats.
Question
What is the definition of phishing?
Question
Depending on who a given user is, he or she can have various access privileges. What are four examples?
Question
Explain at length what a Caesar cipher does.
Question
What is the major difference between TSL and SSL?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Information Security
1
In an asymmetric encryption algorithm, also called a public key encryption algorithm, the key for encryption and the key for decryption are quite different, although related.
True
2
Sometimes the word cracker is used to denote those who break into someone else's computer.
True
3
The term ____________________ comes about because perpetrators cast out bait, in the form of e-mail messages, to thousands of potential victims in the hope that one or two will "bite" and fall for this scam.
phishing
4
____________________ is the science of "secret writing."
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Your best defense against someone guessing your password is to be smart about how you choose and use your password.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
In the early days of computing, when big mainframes were the only option, logical security was enforced by securing the rooms housing these machines. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
A text file can be hidden in an image file by changing (if needed) the least significant bit of each byte of the image file to match the ____________________ form of the characters in the text.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Any positive ____________________ is either a prime number or a number that can be written in a unique way as a product of prime factors.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
DES is a block cipher and the blocks are 48 bits long. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Firewall software guards the access points to your computer, blocking communications to or from sites you don't permit. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
In a(n) ____________________ key system, the encryption key for messages to go to a particular receiver is broadcast to everyone, but the decryption key cannot be derived from it and is known only by the receiver.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The main difficulty with a symmetric algorithm is how to securely transmit the secret key.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Knowledge of the hashing algorithm gives you and the system administrator certain knowledge of the original password.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
A(n) asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
When a user attempts to log on to the machine, the security system reads the user ID and checks that the password matches the password for that user in the password file.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The operating system encrypts the password for a given user by encoding the information, using a process that is difficult to apply but easy to undo.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) Trojan horse embeds itself within another program or file and when that program or file is activated, it copies itself and attacks other files on the system. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
SSL protocols are the only protocols that are supported by all Web browsers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
A block cipher encodes one character at a time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The success of RSA encryption depends on the fact that it is extremely difficult to find the prime factors for n if n is a small number.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
____ is the process of using people to get the information you want.

A) Social networking
B) Social engineering
C) Social objecting
D) Social management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
A ____ attack automatically directs browsers on many machines to a single URL at roughly the same time, causing so much network traffic to that site that it is effectively shut down to legitimate users.

A) denial-of-use
B) trial-of-service
C) trial-of-use
D) denial-of-service
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
In a ____ cipher a single letter of plaintext generates a single letter of ciphertext.

A) substitution
B) next
C) shift
D) modulo
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
____ means keeping information secure-that is, protected from those who should not have access to it.

A) Network security
B) Network assurance
C) Information assurance
D) Information security
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A ____ captures the user's passwords and credit card numbers (and sends them to someone else), or may even put the computer under someone else's remote control at some point in the future.

A) keystroke logger
B) virus
C) worm
D) sniffer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
A ____ is an integer greater than 1 that can only be written as the product of itself and 1.

A) prime number
B) primary number
C) natural number
D) whole number
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
For a given user ID, ____ software will first try all words in its built-in dictionary, encrypting each with the well-known hash function and comparing the result with the password file.

A) password-cracking
B) password-phreaking
C) password-whacking
D) password-tackling
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.

A) block
B) Trojan
C) Caesar
D) Brutus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Some laptops now use ____ information such as fingerprint scanning.

A) psychometric
B) electromagnetic
C) biometric
D) optical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong ____ and authorization process.

A) authentication
B) encryption
C) access
D) interference
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
____ is a practice used to illegally obtain sensitive information such as credit card numbers, account numbers, and passwords.

A) Phishing
B) Pharming
C) Blasting
D) Fishing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
____ verifies who has the right to gain access to the computer, whether it is your local machine or the Web server.

A) Authorization
B) Authentication
C) Access
D) Encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
____ governs what an authenticated user is allowed to do.

A) Authentication
B) Encryption
C) Access management
D) Authorization
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
The ____ maintains a file of user IDs and corresponding passwords.

A) switch
B) router
C) operating system
D) firewall
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The exchange of setup information between the client and server, preparatory to exchanging real data, is known as a ____.

A) handshake
B) training exchange
C) linkage
D) synchronization
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
To try all possible passwords of length k or less would require ____ attempts.

A) nk
B) kk
C) n1 + n2 + . . . + nk
D) k1 + k2 + . . . + kn
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A(n) ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.

A) hash function
B) encryption function
C) mash function
D) stash function
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
____ is a series of protocols developed by Netscape Communications in the mid-1990s.

A) TLS
B) SSL
C) TSL
D) SST
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
The most common public key encryption algorithm is ____.

A) SHA1
B) AES
C) DES
D) RSA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
To solve the problem of two users having the same password, some operating systems keep a third entry for each user in the password file, namely ____ at which the user created the password.

A) the system
B) the approximate time
C) the system name
D) the exact time
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
How do operating systems solve the problem of a thief stealing a password file and seeing that his password and another password hash to the same value?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Provide at least four suggestions for choosing passwords, and three suggestions for using passwords.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
How does Triple DES improve the security of DES?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Explain what a denial-of-service attack is, including the terms DDOS and zombie army in your response.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Explain in detail the definition of the terms hacker and cracker and the evolution of these terms
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Provide at least five examples of ways in which you can protect yourself from online threats.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is the definition of phishing?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Depending on who a given user is, he or she can have various access privileges. What are four examples?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Explain at length what a Caesar cipher does.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is the major difference between TSL and SSL?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.