Deck 13: Information Security

Full screen (f)
exit full mode
Question
A risk assessment is a thorough analysis of an organization's vulnerability to security breaches and an identification of its potential losses.
Use Space or
up arrow
down arrow
to flip the card.
Question
Social engineering involves manipulating social relationships to gain access to restricted resources.
Question
Digital certificate refers to the way in which two nodes agree on common parameters for the keys they will use.
Question
In bio-recognition, a device scans an individual's unique physical characteristics to verify identity.
Question
Computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, are known as war dialers.
Question
In public key encryption, data is encrypted using a single key that only the sender and the receiver know.
Question
In private key encryption, data is encrypted using two keys.
Question
A public-key server is a publicly accessible host that freely provides a list of users' public keys.
Question
The combination of the public key and private key is known as a asymmetric encryption.
Question
PGP is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system.
Question
The combination of the public key and private key is known as a(n) key pair. _________________________
Question
A(n) digital certificate is a password-protected and encrypted file that holds an individual's identification information, including a public key. _________________________
Question
PGP is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system. _________________________
Question
Eavesdropping is the use of a transmission or recording device to capture conversations without the consent of the speakers. _________________________
Question
Bugging is the interception of a telephone conversation by accessing the telephone signal. _________________________
Question
A(n) authorization code is a sequence of numbers that allows an employee to gain access to a certain line through the PBX. _________________________
Question
A(n) telecommunications firewall is a type of firewall that monitors incoming and outgoing voice traffic and selectively blocks telephone calls between different areas of a voice network. _________________________
Question
A(n) packet-filtering firewall is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic. _________________________
Question
The process of encapsulating one protocol to make it appear as another type of protocol is known as wiretapping. _________________________
Question
War driving is searching for unprotected wireless networks by driving around with a laptop configured to receive and capture wireless data transmissions. _________________________
Question
Which of he following represents a thorough analysis of an organizations's vulnerability to security breaches and an identification of its potential losses?

A) Server_hello
B) Risk assessment
C) SSL session
D) TLS
Question
Which of the following is a computer that, once connected to a network, can capture data packets traveling over the channel to which it is attached?

A) Sniffer
B) SSL session
C) Kerberos
D) Digital certificate
Question
The manipulation of social relationships to obtain information that could grant an intruder access to restricted resources, is referred to as:

A) SSL
B) Social engineering
C) Symmetric encryption
D) IP spoofing
Question
Which of the following is a method of encrypting TCP/IP transmissions en route between the client and server using public key encryption technology?

A) SSL session
B) TLS
C) SSL
D) WEP
Question
Which of the following describes an association between the client and the server that is defined by an agreement on a specific set of encryption techniques?

A) SSL session
B) Tunneling
C) HTTPS
D) Kerberos
Question
Which of the following is also referred to as private key encryption?

A) TLS
B) Symmetric encryption
C) Kerberos
D) Digital certificate
Question
A type of firewall that monitors incoming and outgoing voice traffic and selectively blocks telephone calls between different areas of a voice network, is referred to as:

A) Packet-filtering
B) Kerberos
C) PGP
D) Telecommunications
Question
The unauthorized use of a telephone line to complete long distance calls at another's expense is referred to as:

A) Tunneling
B) Toll fraud
C) War dialer
D) Sniffer
Question
The process of encapsulating one protocol to make it appear as another is referred to as:

A) IP spoofing
B) Bugging
C) Wiretapping
D) Tunneling
Question
A computer program that dials multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, is referred to as:

A) War dialer
B) War driver
C) Sniffer
D) None of the above
Question
The interception of a telephone conversation by accessing the telephone signal is referred to as:

A) Wiretapping
B) War dialing
C) Toll fraud
D) Sniffing
Question
Which of the following describes the use of a microphone with a small RF transmitter placed near an audio source an a nearby receiver to eavesdrop?

A) Kerberos
B) Key pair
C) Bugging
D) Wire tapping
Question
The unique data block that results when an original piece of data is encrypted, is referred to as:

A) Digital certificate
B) Cipher text
C) SSL session
D) None of the above
Question
Which of the following is a password-protected and encrypted file that holds an individual's identification information, including a private and a public key?

A) Key pair
B) Cipher text
C) Digital certificate
D) IPSec
Question
The use of a transmission or recording device to capture conversations without the consent of the speakers, is known as:

A) Bugging
B) Wiretapping
C) Social engineering
D) Eavesdropping
Question
Which of the following allows the client and server to authenticate and establish how they will securely exchange data during an SSL session?

A) IPSec
B) Handshake protocol
C) PGP
D) EAP
Question
Which of the following is the URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption?

A) HTPS
B) HTTP
C) HTTPS
D) HHTPS
Question
Which of the following is first phase of IPSec authentication which accomplishes key management?

A) IPSec
B) Internet Key Exchange
C) PPTP
D) PGP
Question
Which of the following is a Layer 3 protocol that defines encryption, authentication, and key management for TCP/IP transmissions?

A) IKE
B) IPSec
C) L2F
D) PPTP
Question
Which of the following is a security attack in which an outsider obtains internal IP addresses?

A) IP spoofing
B) Tunneling
C) Wiretapping
D) War driving
Question
Which of the following is a series of characters that is combined with a block of data during that data's encryption?

A) Key management
B) Key pair
C) Key
D) None of the above
Question
The method whereby two nodes using key encryption agree on common parameters for the keys they will use to encrypt data, is referred to as:

A) Key management
B) Key pair
C) Kerberos
D) Key encryption
Question
Which of the following represents the combination of a public and a private key?

A) L2F
B) Key pair
C) IKE
D) L2TP
Question
Which of the following provides tunneling for other protocols and can work with the authentication methods used by PPP?

A) L2F
B) L2TF
C) L2TPP
D) L2FT
Question
Which of the following is a router that operates at the Data Link and Transport layers of the OSI model, examining the header of every packet of data that it receives to determine whether that type of packet is authorized to continue to its destination?

A) Firewall
B) Packet-filtering firewall
C) Kerberos
D) None of the above
Question
Which of the following supports the encryption, authentication, and LAN access services provided by RAS?

A) PGP
B) L2TP
C) PPTP
D) WEP
Question
Which of the following is a key-based encryption system for e-mail that uses a two-step verification process?

A) PGP
B) L2TP
C) EAP
D) Kerberos
Question
Which of the following is a setting that allows NIC to indiscriminately accept all packets traversing the network channel to which it is attached?

A) Server_hello
B) Promiscuous mode
C) Proxy mode
D) None of the above
Question
Which of the following allows data to be encrypted with two keys?

A) Kerberos
B) Private key encryption
C) Public key encryption
D) Digital certificate
Question
A publicly available host that provides free access to a list of user's public keys, is referred to as:

A) Proxy server
B) DNS server
C) Public-key server
D) None of the above
Question
Which of the following is a sequence of numbers that allows an employee to gain access to a certain line or feature?

A) Key pair
B) DES
C) Authorization code
D) Key
Question
Which of the following is a person who masters the inner workings of operating systems and utilities in an effort to better understand them?

A) Hacker
B) Sniffer
C) Cracker
D) War dialer
Question
Which of the following is a method for granting access to restricted rooms in which a device scans an individual's unique physical characteristics?

A) Bio-recognition access
B) Social engineering
C) DISA
D) Tunneling
Question
Which of the following is a person who uses his or her knowledge of operating systems and utilities to intentionally damage or destroy data or systems?

A) Hacker
B) Sniffer
C) War dialer
D) Cracker
Question
Which of the following is a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting?

A) Cipher text
B) Client_hello
C) Digital certificate
D) HTTPS
Question
Does a risk assessment normally lead to recommendations for improving information security?
Question
Does public key encryption involve the use of a single key that only the sender and the receiver know?
Question
In private key encryption, is data encrypted with two keys?
Question
Does the term key pair refer to the combination of the public key and private key?
Question
Does the term digital certificate refer to the way in which two nodes agree on common parameters for the keys they will use?
Question
Does the term key management refer to a password-protected and encrypted file that holds an individual's identification information, including a public key?
Question
Is Kerberos a cross-platform authentication protocol that uses key encryption to verify the identity of clients?
Question
Can you use PGP to verify the authenticity of an e-mail sender?
Question
Does the handshake protocol authenticate the client and server, and establish terms for how they will securely exchange data?
Question
A(n) ____________________ should lead to recommendations for improving information security and must precede any of the protective measures described in this chapter.
Question
Computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, are known as ____________________.
Question
In ____________________, data is encrypted using a single key that only the sender and the receiver know.
Question
In ____________________ encryption, data is encrypted using two keys.
Question
The combination of the public key and private key is known as a(n) ____________________.
Question
A(n) ____________________ is a password-protected and encrypted file that holds an individual's identification information, including a public key.
Question
____________________ is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system.
Question
____________________ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
Question
The ____________________ protocol authenticates (or introduces) the client and server to each other and establishes terms for how they will securely exchange data.
Question
____________________ is the use of a transmission or recording device to capture conversations without the consent of the speakers.
Question
Match each statement below with the correct item

-A security attack in which an outsider obtains internal IP addresses, then uses them to pretend that he or she has authority to access a private network from the Internet.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Question
Match each statement below with the correct item

-The combination of a public and private key used to decipher data that has been encrypted using public key encryption.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Question
Match each statement below with the correct item

-The URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Question
Match each statement below with the correct item

-A series of characters that is combined with a block of data during that data's encryption.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Question
Match each statement below with the correct item

-The use of a microphone with a small RF transmitter placed near an audio source and a nearby receiver to eavesdrop.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Question
Match each statement below with the correct item

-The unique data block that results when an original piece of data is encrypted.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/92
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Information Security
1
A risk assessment is a thorough analysis of an organization's vulnerability to security breaches and an identification of its potential losses.
True
2
Social engineering involves manipulating social relationships to gain access to restricted resources.
True
3
Digital certificate refers to the way in which two nodes agree on common parameters for the keys they will use.
False
4
In bio-recognition, a device scans an individual's unique physical characteristics to verify identity.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
5
Computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, are known as war dialers.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
6
In public key encryption, data is encrypted using a single key that only the sender and the receiver know.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
7
In private key encryption, data is encrypted using two keys.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
8
A public-key server is a publicly accessible host that freely provides a list of users' public keys.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
9
The combination of the public key and private key is known as a asymmetric encryption.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
10
PGP is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
11
The combination of the public key and private key is known as a(n) key pair. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
12
A(n) digital certificate is a password-protected and encrypted file that holds an individual's identification information, including a public key. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
13
PGP is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
14
Eavesdropping is the use of a transmission or recording device to capture conversations without the consent of the speakers. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
15
Bugging is the interception of a telephone conversation by accessing the telephone signal. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
16
A(n) authorization code is a sequence of numbers that allows an employee to gain access to a certain line through the PBX. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) telecommunications firewall is a type of firewall that monitors incoming and outgoing voice traffic and selectively blocks telephone calls between different areas of a voice network. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
18
A(n) packet-filtering firewall is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
19
The process of encapsulating one protocol to make it appear as another type of protocol is known as wiretapping. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
20
War driving is searching for unprotected wireless networks by driving around with a laptop configured to receive and capture wireless data transmissions. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
21
Which of he following represents a thorough analysis of an organizations's vulnerability to security breaches and an identification of its potential losses?

A) Server_hello
B) Risk assessment
C) SSL session
D) TLS
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is a computer that, once connected to a network, can capture data packets traveling over the channel to which it is attached?

A) Sniffer
B) SSL session
C) Kerberos
D) Digital certificate
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
23
The manipulation of social relationships to obtain information that could grant an intruder access to restricted resources, is referred to as:

A) SSL
B) Social engineering
C) Symmetric encryption
D) IP spoofing
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is a method of encrypting TCP/IP transmissions en route between the client and server using public key encryption technology?

A) SSL session
B) TLS
C) SSL
D) WEP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following describes an association between the client and the server that is defined by an agreement on a specific set of encryption techniques?

A) SSL session
B) Tunneling
C) HTTPS
D) Kerberos
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is also referred to as private key encryption?

A) TLS
B) Symmetric encryption
C) Kerberos
D) Digital certificate
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
27
A type of firewall that monitors incoming and outgoing voice traffic and selectively blocks telephone calls between different areas of a voice network, is referred to as:

A) Packet-filtering
B) Kerberos
C) PGP
D) Telecommunications
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
28
The unauthorized use of a telephone line to complete long distance calls at another's expense is referred to as:

A) Tunneling
B) Toll fraud
C) War dialer
D) Sniffer
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
29
The process of encapsulating one protocol to make it appear as another is referred to as:

A) IP spoofing
B) Bugging
C) Wiretapping
D) Tunneling
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
30
A computer program that dials multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, is referred to as:

A) War dialer
B) War driver
C) Sniffer
D) None of the above
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
31
The interception of a telephone conversation by accessing the telephone signal is referred to as:

A) Wiretapping
B) War dialing
C) Toll fraud
D) Sniffing
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following describes the use of a microphone with a small RF transmitter placed near an audio source an a nearby receiver to eavesdrop?

A) Kerberos
B) Key pair
C) Bugging
D) Wire tapping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
33
The unique data block that results when an original piece of data is encrypted, is referred to as:

A) Digital certificate
B) Cipher text
C) SSL session
D) None of the above
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is a password-protected and encrypted file that holds an individual's identification information, including a private and a public key?

A) Key pair
B) Cipher text
C) Digital certificate
D) IPSec
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
35
The use of a transmission or recording device to capture conversations without the consent of the speakers, is known as:

A) Bugging
B) Wiretapping
C) Social engineering
D) Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following allows the client and server to authenticate and establish how they will securely exchange data during an SSL session?

A) IPSec
B) Handshake protocol
C) PGP
D) EAP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is the URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption?

A) HTPS
B) HTTP
C) HTTPS
D) HHTPS
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is first phase of IPSec authentication which accomplishes key management?

A) IPSec
B) Internet Key Exchange
C) PPTP
D) PGP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is a Layer 3 protocol that defines encryption, authentication, and key management for TCP/IP transmissions?

A) IKE
B) IPSec
C) L2F
D) PPTP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is a security attack in which an outsider obtains internal IP addresses?

A) IP spoofing
B) Tunneling
C) Wiretapping
D) War driving
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is a series of characters that is combined with a block of data during that data's encryption?

A) Key management
B) Key pair
C) Key
D) None of the above
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
42
The method whereby two nodes using key encryption agree on common parameters for the keys they will use to encrypt data, is referred to as:

A) Key management
B) Key pair
C) Kerberos
D) Key encryption
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following represents the combination of a public and a private key?

A) L2F
B) Key pair
C) IKE
D) L2TP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following provides tunneling for other protocols and can work with the authentication methods used by PPP?

A) L2F
B) L2TF
C) L2TPP
D) L2FT
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following is a router that operates at the Data Link and Transport layers of the OSI model, examining the header of every packet of data that it receives to determine whether that type of packet is authorized to continue to its destination?

A) Firewall
B) Packet-filtering firewall
C) Kerberos
D) None of the above
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following supports the encryption, authentication, and LAN access services provided by RAS?

A) PGP
B) L2TP
C) PPTP
D) WEP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is a key-based encryption system for e-mail that uses a two-step verification process?

A) PGP
B) L2TP
C) EAP
D) Kerberos
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is a setting that allows NIC to indiscriminately accept all packets traversing the network channel to which it is attached?

A) Server_hello
B) Promiscuous mode
C) Proxy mode
D) None of the above
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following allows data to be encrypted with two keys?

A) Kerberos
B) Private key encryption
C) Public key encryption
D) Digital certificate
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
50
A publicly available host that provides free access to a list of user's public keys, is referred to as:

A) Proxy server
B) DNS server
C) Public-key server
D) None of the above
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is a sequence of numbers that allows an employee to gain access to a certain line or feature?

A) Key pair
B) DES
C) Authorization code
D) Key
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is a person who masters the inner workings of operating systems and utilities in an effort to better understand them?

A) Hacker
B) Sniffer
C) Cracker
D) War dialer
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is a method for granting access to restricted rooms in which a device scans an individual's unique physical characteristics?

A) Bio-recognition access
B) Social engineering
C) DISA
D) Tunneling
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is a person who uses his or her knowledge of operating systems and utilities to intentionally damage or destroy data or systems?

A) Hacker
B) Sniffer
C) War dialer
D) Cracker
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following is a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting?

A) Cipher text
B) Client_hello
C) Digital certificate
D) HTTPS
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
56
Does a risk assessment normally lead to recommendations for improving information security?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
57
Does public key encryption involve the use of a single key that only the sender and the receiver know?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
58
In private key encryption, is data encrypted with two keys?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
59
Does the term key pair refer to the combination of the public key and private key?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
60
Does the term digital certificate refer to the way in which two nodes agree on common parameters for the keys they will use?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
61
Does the term key management refer to a password-protected and encrypted file that holds an individual's identification information, including a public key?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
62
Is Kerberos a cross-platform authentication protocol that uses key encryption to verify the identity of clients?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
63
Can you use PGP to verify the authenticity of an e-mail sender?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
64
Does the handshake protocol authenticate the client and server, and establish terms for how they will securely exchange data?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
65
A(n) ____________________ should lead to recommendations for improving information security and must precede any of the protective measures described in this chapter.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
66
Computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, are known as ____________________.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
67
In ____________________, data is encrypted using a single key that only the sender and the receiver know.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
68
In ____________________ encryption, data is encrypted using two keys.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
69
The combination of the public key and private key is known as a(n) ____________________.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
70
A(n) ____________________ is a password-protected and encrypted file that holds an individual's identification information, including a public key.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
71
____________________ is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
72
____________________ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
73
The ____________________ protocol authenticates (or introduces) the client and server to each other and establishes terms for how they will securely exchange data.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
74
____________________ is the use of a transmission or recording device to capture conversations without the consent of the speakers.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
75
Match each statement below with the correct item

-A security attack in which an outsider obtains internal IP addresses, then uses them to pretend that he or she has authority to access a private network from the Internet.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
76
Match each statement below with the correct item

-The combination of a public and private key used to decipher data that has been encrypted using public key encryption.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
77
Match each statement below with the correct item

-The URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
78
Match each statement below with the correct item

-A series of characters that is combined with a block of data during that data's encryption.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
79
Match each statement below with the correct item

-The use of a microphone with a small RF transmitter placed near an audio source and a nearby receiver to eavesdrop.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
80
Match each statement below with the correct item

-The unique data block that results when an original piece of data is encrypted.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 92 flashcards in this deck.