Deck 13: Information Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/92
Play
Full screen (f)
Deck 13: Information Security
1
A risk assessment is a thorough analysis of an organization's vulnerability to security breaches and an identification of its potential losses.
True
2
Social engineering involves manipulating social relationships to gain access to restricted resources.
True
3
Digital certificate refers to the way in which two nodes agree on common parameters for the keys they will use.
False
4
In bio-recognition, a device scans an individual's unique physical characteristics to verify identity.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
5
Computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, are known as war dialers.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
6
In public key encryption, data is encrypted using a single key that only the sender and the receiver know.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
7
In private key encryption, data is encrypted using two keys.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
8
A public-key server is a publicly accessible host that freely provides a list of users' public keys.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
9
The combination of the public key and private key is known as a asymmetric encryption.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
10
PGP is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
11
The combination of the public key and private key is known as a(n) key pair. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
12
A(n) digital certificate is a password-protected and encrypted file that holds an individual's identification information, including a public key. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
13
PGP is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
14
Eavesdropping is the use of a transmission or recording device to capture conversations without the consent of the speakers. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
15
Bugging is the interception of a telephone conversation by accessing the telephone signal. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
16
A(n) authorization code is a sequence of numbers that allows an employee to gain access to a certain line through the PBX. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) telecommunications firewall is a type of firewall that monitors incoming and outgoing voice traffic and selectively blocks telephone calls between different areas of a voice network. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
18
A(n) packet-filtering firewall is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
19
The process of encapsulating one protocol to make it appear as another type of protocol is known as wiretapping. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
20
War driving is searching for unprotected wireless networks by driving around with a laptop configured to receive and capture wireless data transmissions. _________________________
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
21
Which of he following represents a thorough analysis of an organizations's vulnerability to security breaches and an identification of its potential losses?
A) Server_hello
B) Risk assessment
C) SSL session
D) TLS
A) Server_hello
B) Risk assessment
C) SSL session
D) TLS
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is a computer that, once connected to a network, can capture data packets traveling over the channel to which it is attached?
A) Sniffer
B) SSL session
C) Kerberos
D) Digital certificate
A) Sniffer
B) SSL session
C) Kerberos
D) Digital certificate
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
23
The manipulation of social relationships to obtain information that could grant an intruder access to restricted resources, is referred to as:
A) SSL
B) Social engineering
C) Symmetric encryption
D) IP spoofing
A) SSL
B) Social engineering
C) Symmetric encryption
D) IP spoofing
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is a method of encrypting TCP/IP transmissions en route between the client and server using public key encryption technology?
A) SSL session
B) TLS
C) SSL
D) WEP
A) SSL session
B) TLS
C) SSL
D) WEP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following describes an association between the client and the server that is defined by an agreement on a specific set of encryption techniques?
A) SSL session
B) Tunneling
C) HTTPS
D) Kerberos
A) SSL session
B) Tunneling
C) HTTPS
D) Kerberos
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is also referred to as private key encryption?
A) TLS
B) Symmetric encryption
C) Kerberos
D) Digital certificate
A) TLS
B) Symmetric encryption
C) Kerberos
D) Digital certificate
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
27
A type of firewall that monitors incoming and outgoing voice traffic and selectively blocks telephone calls between different areas of a voice network, is referred to as:
A) Packet-filtering
B) Kerberos
C) PGP
D) Telecommunications
A) Packet-filtering
B) Kerberos
C) PGP
D) Telecommunications
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
28
The unauthorized use of a telephone line to complete long distance calls at another's expense is referred to as:
A) Tunneling
B) Toll fraud
C) War dialer
D) Sniffer
A) Tunneling
B) Toll fraud
C) War dialer
D) Sniffer
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
29
The process of encapsulating one protocol to make it appear as another is referred to as:
A) IP spoofing
B) Bugging
C) Wiretapping
D) Tunneling
A) IP spoofing
B) Bugging
C) Wiretapping
D) Tunneling
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
30
A computer program that dials multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, is referred to as:
A) War dialer
B) War driver
C) Sniffer
D) None of the above
A) War dialer
B) War driver
C) Sniffer
D) None of the above
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
31
The interception of a telephone conversation by accessing the telephone signal is referred to as:
A) Wiretapping
B) War dialing
C) Toll fraud
D) Sniffing
A) Wiretapping
B) War dialing
C) Toll fraud
D) Sniffing
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following describes the use of a microphone with a small RF transmitter placed near an audio source an a nearby receiver to eavesdrop?
A) Kerberos
B) Key pair
C) Bugging
D) Wire tapping
A) Kerberos
B) Key pair
C) Bugging
D) Wire tapping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
33
The unique data block that results when an original piece of data is encrypted, is referred to as:
A) Digital certificate
B) Cipher text
C) SSL session
D) None of the above
A) Digital certificate
B) Cipher text
C) SSL session
D) None of the above
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is a password-protected and encrypted file that holds an individual's identification information, including a private and a public key?
A) Key pair
B) Cipher text
C) Digital certificate
D) IPSec
A) Key pair
B) Cipher text
C) Digital certificate
D) IPSec
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
35
The use of a transmission or recording device to capture conversations without the consent of the speakers, is known as:
A) Bugging
B) Wiretapping
C) Social engineering
D) Eavesdropping
A) Bugging
B) Wiretapping
C) Social engineering
D) Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following allows the client and server to authenticate and establish how they will securely exchange data during an SSL session?
A) IPSec
B) Handshake protocol
C) PGP
D) EAP
A) IPSec
B) Handshake protocol
C) PGP
D) EAP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is the URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption?
A) HTPS
B) HTTP
C) HTTPS
D) HHTPS
A) HTPS
B) HTTP
C) HTTPS
D) HHTPS
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is first phase of IPSec authentication which accomplishes key management?
A) IPSec
B) Internet Key Exchange
C) PPTP
D) PGP
A) IPSec
B) Internet Key Exchange
C) PPTP
D) PGP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is a Layer 3 protocol that defines encryption, authentication, and key management for TCP/IP transmissions?
A) IKE
B) IPSec
C) L2F
D) PPTP
A) IKE
B) IPSec
C) L2F
D) PPTP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is a security attack in which an outsider obtains internal IP addresses?
A) IP spoofing
B) Tunneling
C) Wiretapping
D) War driving
A) IP spoofing
B) Tunneling
C) Wiretapping
D) War driving
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is a series of characters that is combined with a block of data during that data's encryption?
A) Key management
B) Key pair
C) Key
D) None of the above
A) Key management
B) Key pair
C) Key
D) None of the above
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
42
The method whereby two nodes using key encryption agree on common parameters for the keys they will use to encrypt data, is referred to as:
A) Key management
B) Key pair
C) Kerberos
D) Key encryption
A) Key management
B) Key pair
C) Kerberos
D) Key encryption
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following represents the combination of a public and a private key?
A) L2F
B) Key pair
C) IKE
D) L2TP
A) L2F
B) Key pair
C) IKE
D) L2TP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following provides tunneling for other protocols and can work with the authentication methods used by PPP?
A) L2F
B) L2TF
C) L2TPP
D) L2FT
A) L2F
B) L2TF
C) L2TPP
D) L2FT
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following is a router that operates at the Data Link and Transport layers of the OSI model, examining the header of every packet of data that it receives to determine whether that type of packet is authorized to continue to its destination?
A) Firewall
B) Packet-filtering firewall
C) Kerberos
D) None of the above
A) Firewall
B) Packet-filtering firewall
C) Kerberos
D) None of the above
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following supports the encryption, authentication, and LAN access services provided by RAS?
A) PGP
B) L2TP
C) PPTP
D) WEP
A) PGP
B) L2TP
C) PPTP
D) WEP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is a key-based encryption system for e-mail that uses a two-step verification process?
A) PGP
B) L2TP
C) EAP
D) Kerberos
A) PGP
B) L2TP
C) EAP
D) Kerberos
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is a setting that allows NIC to indiscriminately accept all packets traversing the network channel to which it is attached?
A) Server_hello
B) Promiscuous mode
C) Proxy mode
D) None of the above
A) Server_hello
B) Promiscuous mode
C) Proxy mode
D) None of the above
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following allows data to be encrypted with two keys?
A) Kerberos
B) Private key encryption
C) Public key encryption
D) Digital certificate
A) Kerberos
B) Private key encryption
C) Public key encryption
D) Digital certificate
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
50
A publicly available host that provides free access to a list of user's public keys, is referred to as:
A) Proxy server
B) DNS server
C) Public-key server
D) None of the above
A) Proxy server
B) DNS server
C) Public-key server
D) None of the above
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is a sequence of numbers that allows an employee to gain access to a certain line or feature?
A) Key pair
B) DES
C) Authorization code
D) Key
A) Key pair
B) DES
C) Authorization code
D) Key
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is a person who masters the inner workings of operating systems and utilities in an effort to better understand them?
A) Hacker
B) Sniffer
C) Cracker
D) War dialer
A) Hacker
B) Sniffer
C) Cracker
D) War dialer
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is a method for granting access to restricted rooms in which a device scans an individual's unique physical characteristics?
A) Bio-recognition access
B) Social engineering
C) DISA
D) Tunneling
A) Bio-recognition access
B) Social engineering
C) DISA
D) Tunneling
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is a person who uses his or her knowledge of operating systems and utilities to intentionally damage or destroy data or systems?
A) Hacker
B) Sniffer
C) War dialer
D) Cracker
A) Hacker
B) Sniffer
C) War dialer
D) Cracker
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following is a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting?
A) Cipher text
B) Client_hello
C) Digital certificate
D) HTTPS
A) Cipher text
B) Client_hello
C) Digital certificate
D) HTTPS
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
56
Does a risk assessment normally lead to recommendations for improving information security?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
57
Does public key encryption involve the use of a single key that only the sender and the receiver know?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
58
In private key encryption, is data encrypted with two keys?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
59
Does the term key pair refer to the combination of the public key and private key?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
60
Does the term digital certificate refer to the way in which two nodes agree on common parameters for the keys they will use?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
61
Does the term key management refer to a password-protected and encrypted file that holds an individual's identification information, including a public key?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
62
Is Kerberos a cross-platform authentication protocol that uses key encryption to verify the identity of clients?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
63
Can you use PGP to verify the authenticity of an e-mail sender?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
64
Does the handshake protocol authenticate the client and server, and establish terms for how they will securely exchange data?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
65
A(n) ____________________ should lead to recommendations for improving information security and must precede any of the protective measures described in this chapter.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
66
Computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, are known as ____________________.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
67
In ____________________, data is encrypted using a single key that only the sender and the receiver know.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
68
In ____________________ encryption, data is encrypted using two keys.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
69
The combination of the public key and private key is known as a(n) ____________________.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
70
A(n) ____________________ is a password-protected and encrypted file that holds an individual's identification information, including a public key.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
71
____________________ is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
72
____________________ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
73
The ____________________ protocol authenticates (or introduces) the client and server to each other and establishes terms for how they will securely exchange data.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
74
____________________ is the use of a transmission or recording device to capture conversations without the consent of the speakers.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
75
Match each statement below with the correct item
-A security attack in which an outsider obtains internal IP addresses, then uses them to pretend that he or she has authority to access a private network from the Internet.
A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
-A security attack in which an outsider obtains internal IP addresses, then uses them to pretend that he or she has authority to access a private network from the Internet.
A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
76
Match each statement below with the correct item
-The combination of a public and private key used to decipher data that has been encrypted using public key encryption.
A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
-The combination of a public and private key used to decipher data that has been encrypted using public key encryption.
A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
77
Match each statement below with the correct item
-The URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption.
A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
-The URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption.
A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
78
Match each statement below with the correct item
-A series of characters that is combined with a block of data during that data's encryption.
A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
-A series of characters that is combined with a block of data during that data's encryption.
A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
79
Match each statement below with the correct item
-The use of a microphone with a small RF transmitter placed near an audio source and a nearby receiver to eavesdrop.
A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
-The use of a microphone with a small RF transmitter placed near an audio source and a nearby receiver to eavesdrop.
A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
80
Match each statement below with the correct item
-The unique data block that results when an original piece of data is encrypted.
A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
-The unique data block that results when an original piece of data is encrypted.
A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck