Deck 8: Information Security

Full screen (f)
exit full mode
Question
The term ____________________ comes about because perpetrators cast out bait, in the form of e-mail messages, to thousands of potential victims in the hope that one or two will "bite" and fall for this scam.
Use Space or
up arrow
down arrow
to flip the card.
Question
The operating system encrypts the password for a given user by encoding the information, using a process that is difficult to apply but easy to undo.
Question

To reduce the chance that two passwords will have the same hash value, a timestamp can be appended to a password,and the result is then run through the encryption algorithm and stored as theencrypted password in the password file.
Question
A text file can be hidden in an image file by changing (if needed) the least significant bit of each byte of the image file to match the ____________________ form of the characters in the text.
Question
____________________ is the science of "secret writing."
Question
A block cipher encodes one character at a time.
Question
Your best defense against someone guessing your password is to be smart about how you choose and use your password.
Question
The success of RSA encryption depends on the fact that it is extremely difficult to find the prime factors for n if n is a small number.
Question
Firewall software guards the access points to your computer, blocking communications to or from sites you don't permit._________________________
Question
Sometimes the word cracker is used to denote those who break into someone else's computer.
Question
A(n) asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver._________________________
Question
SSL protocols are the only protocols that are supported by all web browsers.
Question
DES is a block cipher and the blocks are 48 bits long._________________________
Question
When a user attempts to log on to the machine, a hash function reads the user ID and checks that the password matches the password for that user in the password file.
Question
In the early days of computing, when big mainframes were the only option, logical security was enforced by securing the rooms housing these machines._________________________
Question
A(n) Trojan horse embeds itself within another program or file and when that program or file is activated, it copies itself and attacks other files on the system._________________________
Question
In an asymmetric encryption algorithm, also called a public key encryption algorithm, the key for encryption and the key for decryption are quite different, although related.
Question
In a(n) ____________________ key system, the encryption key for messages to go to a particular receiver is broadcast to everyone, but the decryption key cannot be derived from it and is known only by the receiver.
Question
The main difficulty with a symmetric algorithm is how to securely transmit the secret key.
Question
Any positive ____________________ is either a prime number or a number that can be written in a unique way as a product of prime factors.
Question
____ is the process of using people to get the information you want.

A) Social networking
B) Social engineering
C) Social objecting
D) Social management
Question
A ____ captures the user's passwords and credit card numbers (and sends them to someone else), or may even put the computer under someone else's remote control at some point in the future.

A) keystroke logger
B) virus
C) worm
D) sniffer
Question
A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.

A) block
B) Trojan
C) Caesar
D) Brutus
Question
In a ____ cipher a single letter of plaintext generates a single letter of ciphertext.

A) substitution
B) next
C) shift
D) modulo
Question
A(n) ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.

A) hash function
B) encryption function
C) mash function
D) stash function
Question
The most common public key encryption algorithm is ____.

A) SHA1
B) AES
C) DES
D) RSA
Question
For a given user ID, ____ software will first try all words in its built-in dictionary, encrypting each with the well-known hash function and comparing the result with the password file.

A) password-cracking
B) password-phreaking
C) password-whacking
D) password-tackling
Question
____ is a practice used to illegally obtain sensitive information such as credit card numbers, account numbers, and passwords.

A) Phishing
B) Pharming
C) Blasting
D) Fishing
Question
____ is a series of protocols developed by Netscape Communications in the mid-1990s.

A) TLS
B) SSL
C) TSL
D) SST
Question
____ governs what an authenticated user is allowed to do.

A) Authentication
B) Encryption
C) Access management
D) Authorization
Question
____ means keeping information secure-that is, protected from those who should not have access to it.

A) Network security
B) Network assurance
C) Information assurance
D) Information security
Question
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong ____ and authorization process.

A) authentication
B) encryption
C) access
D) interference
Question
The ____ maintains a file of user IDs and corresponding passwords.

A) switch
B) router
C) operating system
D) firewall
Question
To solve the problem of two users having the same password, some operating systems keep a third entry for each user in the password file, namely ____ at which the user created the password.

A) the system
B) the approximate time
C) the system name
D) the exact time
Question
____ verifies who has the right to gain access to the computer, whether it is your local machine or the web server.

A) Authorization
B) Authentication
C) Access
D) Encryption
Question
To try all possible passwords of length k or less would require ____ attempts.

A) nk
B) kk
C) n1 + n2 + ...+ nk
D) k1 + k2 + ...+ kn
Question
Some laptops now use ____ information such as fingerprint scanning.

A) psychometric
B) electromagnetic
C) biometric
D) optical
Question
The exchange of setup information between the client and server, preparatory to exchanging real data, is known as a ____.

A) handshake
B) training exchange
C) linkage
D) synchronization
Question
A ____ attack automatically directs browsers on many machines to a single web address at roughly the same time, causing so much network traffic to that site that it is effectively shut down to legitimate users.

A) denial-of-use
B) trial-of-service
C) trial-of-use
D) denial-of-service
Question
A ____ is an integer greater than 1 that can only be written as the product of itself and 1.

A) prime number
B) primary number
C) natural number
D) whole number
Question
Explain at length what a Caesar cipher does.
Question
Provide at least five examples of ways in which you can protect yourself from online threats.
Question
Depending on who a given user is, he or she can have various access privileges.What are four examples?
Question
How do operating systems solve the problem of a thief stealing a password file and seeing that his password and another password hash to the same value?
Question
What is the major difference between TSL and SSL?
Question
What is the definition of phishing?
Question
How does Triple DES improve the security of DES?
Question
Explain what a denial-of-service attack is, including the terms DDOS and zombie army in your response.
Question
Explain what an embedded computer is and provide examples.
Question
Provide at least four suggestions for choosing passwords, and three suggestions for using passwords.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Information Security
1
The term ____________________ comes about because perpetrators cast out bait, in the form of e-mail messages, to thousands of potential victims in the hope that one or two will "bite" and fall for this scam.
phishing
2
The operating system encrypts the password for a given user by encoding the information, using a process that is difficult to apply but easy to undo.
False
3

To reduce the chance that two passwords will have the same hash value, a timestamp can be appended to a password,and the result is then run through the encryption algorithm and stored as theencrypted password in the password file.
True
4
A text file can be hidden in an image file by changing (if needed) the least significant bit of each byte of the image file to match the ____________________ form of the characters in the text.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
____________________ is the science of "secret writing."
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
A block cipher encodes one character at a time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Your best defense against someone guessing your password is to be smart about how you choose and use your password.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The success of RSA encryption depends on the fact that it is extremely difficult to find the prime factors for n if n is a small number.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Firewall software guards the access points to your computer, blocking communications to or from sites you don't permit._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Sometimes the word cracker is used to denote those who break into someone else's computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
A(n) asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
SSL protocols are the only protocols that are supported by all web browsers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
DES is a block cipher and the blocks are 48 bits long._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
When a user attempts to log on to the machine, a hash function reads the user ID and checks that the password matches the password for that user in the password file.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
In the early days of computing, when big mainframes were the only option, logical security was enforced by securing the rooms housing these machines._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A(n) Trojan horse embeds itself within another program or file and when that program or file is activated, it copies itself and attacks other files on the system._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
In an asymmetric encryption algorithm, also called a public key encryption algorithm, the key for encryption and the key for decryption are quite different, although related.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
In a(n) ____________________ key system, the encryption key for messages to go to a particular receiver is broadcast to everyone, but the decryption key cannot be derived from it and is known only by the receiver.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The main difficulty with a symmetric algorithm is how to securely transmit the secret key.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Any positive ____________________ is either a prime number or a number that can be written in a unique way as a product of prime factors.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
____ is the process of using people to get the information you want.

A) Social networking
B) Social engineering
C) Social objecting
D) Social management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
A ____ captures the user's passwords and credit card numbers (and sends them to someone else), or may even put the computer under someone else's remote control at some point in the future.

A) keystroke logger
B) virus
C) worm
D) sniffer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.

A) block
B) Trojan
C) Caesar
D) Brutus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
In a ____ cipher a single letter of plaintext generates a single letter of ciphertext.

A) substitution
B) next
C) shift
D) modulo
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.

A) hash function
B) encryption function
C) mash function
D) stash function
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
The most common public key encryption algorithm is ____.

A) SHA1
B) AES
C) DES
D) RSA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
For a given user ID, ____ software will first try all words in its built-in dictionary, encrypting each with the well-known hash function and comparing the result with the password file.

A) password-cracking
B) password-phreaking
C) password-whacking
D) password-tackling
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
____ is a practice used to illegally obtain sensitive information such as credit card numbers, account numbers, and passwords.

A) Phishing
B) Pharming
C) Blasting
D) Fishing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
____ is a series of protocols developed by Netscape Communications in the mid-1990s.

A) TLS
B) SSL
C) TSL
D) SST
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
____ governs what an authenticated user is allowed to do.

A) Authentication
B) Encryption
C) Access management
D) Authorization
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
____ means keeping information secure-that is, protected from those who should not have access to it.

A) Network security
B) Network assurance
C) Information assurance
D) Information security
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong ____ and authorization process.

A) authentication
B) encryption
C) access
D) interference
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
The ____ maintains a file of user IDs and corresponding passwords.

A) switch
B) router
C) operating system
D) firewall
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
To solve the problem of two users having the same password, some operating systems keep a third entry for each user in the password file, namely ____ at which the user created the password.

A) the system
B) the approximate time
C) the system name
D) the exact time
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
____ verifies who has the right to gain access to the computer, whether it is your local machine or the web server.

A) Authorization
B) Authentication
C) Access
D) Encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
To try all possible passwords of length k or less would require ____ attempts.

A) nk
B) kk
C) n1 + n2 + ...+ nk
D) k1 + k2 + ...+ kn
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Some laptops now use ____ information such as fingerprint scanning.

A) psychometric
B) electromagnetic
C) biometric
D) optical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The exchange of setup information between the client and server, preparatory to exchanging real data, is known as a ____.

A) handshake
B) training exchange
C) linkage
D) synchronization
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A ____ attack automatically directs browsers on many machines to a single web address at roughly the same time, causing so much network traffic to that site that it is effectively shut down to legitimate users.

A) denial-of-use
B) trial-of-service
C) trial-of-use
D) denial-of-service
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
A ____ is an integer greater than 1 that can only be written as the product of itself and 1.

A) prime number
B) primary number
C) natural number
D) whole number
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Explain at length what a Caesar cipher does.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Provide at least five examples of ways in which you can protect yourself from online threats.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Depending on who a given user is, he or she can have various access privileges.What are four examples?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
How do operating systems solve the problem of a thief stealing a password file and seeing that his password and another password hash to the same value?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is the major difference between TSL and SSL?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is the definition of phishing?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
How does Triple DES improve the security of DES?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Explain what a denial-of-service attack is, including the terms DDOS and zombie army in your response.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Explain what an embedded computer is and provide examples.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Provide at least four suggestions for choosing passwords, and three suggestions for using passwords.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.