(Correct Answer Below) Show
A Rational Security Decision, Such As Locking Your Vehicle When Not In Use, Is An Example Of:: Front reasoned paranoia Enter another question to find a notecard: Search About the flashcard:This flashcard is meant to be used for studying, quizzing and learning new information. Many scouting web questions are common questions that are typically seen in the classroom, for homework or on quizzes and tests. Flashcards vary depending on the topic, questions and age group. The cards are meant to be seen as a digital flashcard as they appear double sided, or rather hide the answer giving you the opportunity to think about the question at hand and answer it in your head or on a sheet before revealing the correct answer to yourself or studying partner. Some questions will include multiple choice options to show you the options involved and other questions will just have the questions and corrects answers. Simply reveal the answer when you are ready to check your work. Absolutely no cheating is acceptable.report this ad You May also Like:[wcp-carousel id="1853"] Supervisory control and data acquisition (SCADA) devices are most often associated with:UtilitiesTrue or False? Botnets can (often) perform distributed denial of service (DDoS) attacks in which thousands of individual computers send overwhelming amounts of traffic at a victim’s computer. Car ignition locks are an example of what type of decision? True or False? A supervisory control and data acquisition (SCADA) device is a computer thatcontrols motors, valves, and other devices in industrial applications. A security decision, such as locking your vehicle when not in use, is an example of: True or False? The term “security theater” refers to security measures intended to make Newly uploaded documents
Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (57)A rational security decision, such as locking your vehicle when not in use, is an example of: A. reasoned paranoia B. the hunter's dilemma C. integrity D. none of the above A. reasoned paranoia Supervisory control and data acquisition (SCADA) devices are most often associated with: A. retail stores B. universities C. utilities D. business offices C. utilities CIA properties do not include: A. integrity B. availability C. authentication D. confidentiality C. authentication OCTAVE is a: A. type of layered defense B. risk-assessment process C. security architecture D. code of conduct B. risk-assessment process When you analyze a system using the six-phase security process, you are performing a: A. security architecture study B. plan-do-check-act cycle C. boundary analysis D. risk assessment A. security architecture study An attempt by a threat agent to exploit assets without permission is referred to as: A. an attack B. a safeguard C. a trade-off D. a vulnerability A. an attack A person skilled in attacking computer systems, who uses those skills as a security expert to help protect systems, is a: A. black-hat hacker B. script kiddy C. cracker D. white-hat hacker D. White-hat hacker A security analyst is performing a security assessment. The analyst should not: A. securely erase all collected information that's not needed for business purposes B. protect all working notes C. get written authorization from the organization to verify that the assessment should take place D. take actions to mitigate a serious risk D. take actions to mitigate a serious risk When disclosing a security vulnerability in a system or software, the manufacturer should avoid: A. patching the system or software. B. including enough detail to allow an attacker to exploit the vulnerability C. notifying customer D. all of the above B. including enough detail to allow an attacker to exploit the vulnerability What is a worm? A. Send Spam B. Blocks flow of computer traffic C. Malware D. Denial of Service C. Malware 1. A.U.P. stands for? A. Active User PC B. All Unscheduled Plans C. Active Use Personnel D. Acceptable Use Policy D. Acceptable Use Policy True or False? People can be threat agents in some cases but trustworthy in others. True What are threat agents? Someone who is motivated to attack our assets. We don't identify threat agents by name; we identify them in terms of their behavior. This yields a more specific set of attacks tied to our particular threat agents. A. Threat Matrix B. Security Matrix C. Agent Matrix D. Attack Matrix D. Attack Matrix The following are fundamental strategies for authenticating people on computer systems except: A. something you have B. something you know C. something you make D. something you are C. something you make An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of: A. single-factor authentication B. two-factor authentication C. three-factor authentication D. none of the above B. two-factor authentication Hashing: A. converts text into an executable program B. repairs damaged files C. transforms readable text into gibberish D. checks file contents for errors C. transforms readable text into gibberish An attack that blocks access to a system by other users is called: A. social engineering B. sniffing C. trial and error D. denial of service D. denial of service An attack in which someone tries to trick a system administrator into divulging a password is called: A. trial and error B. sniffing C. social engineering D. denial of service C. social engineering In a password system, the total number of possible passwords is called the: A. search space B. passphrase C. hash space D. work factor A. search space Authentication does what: A. Associates an individual with an identity B. Checks access rights C. Grants access rights D. All of the above A. Associates an individual with an identity The most recent listed hash algorithm is what? A. SHA-512 B. MD5 C. SHA-1 D. SHA-256 A. SHA-512 There are three types of tokens; they do not include which? A. One-time password tokens B. Challenge-response tokens C. Passive tokens D. Offensive tokens D. Offensive tokens The following risks are associated with a weak threat except. A. Simple trial and error password guessing B. All are risks associated with a weak threat C. Shoulder surfing D. Searching for a written password B. All are risks associated with a weak threat Hiding an object, such as a diary, to prevent others from finding it is an example of: A. cryptography B. Security through Obscurity C. transposition D. trust B. Security through Obscurity An algorithm is a type of ______________________. procedure An encryption algorithm that uses the same key for both encryption and decryption is: A. symmetric B. asymmetric C. none of the answers D. ciphertext A. symmetric To use symmetric cryptography, the sender and receiver must share: A. all of the answers B. a secret key C. a plaintext file D. a secret algorithm B. a secret key The type of cipher that rearranges the text of a message is called: A. substitution B. AES C. asymmetric D. transposition D. transposition The Enigma was: A. a U.S. encryption standard B. an algorithm C. a rotor machine D. a type of ciphertext C. a rotor machine Gilbert Vernam's bit combination operation for encrypting digital teletype transfer is now referred as_______________________________. XOR (Exclusive Or) Which cipher replaces A with D and B with E? A Caesar Cipher File encryption on the computer's hard drive involves what risk? A. All of the Answers B. Access by a Trojan Horse C. Acess to low-level data written to the hard drive D. Access by a separately booted OS A. All of the Answers Moore's Law observed that computing power for doubled every; A. 24 Months B. None of the answers C. 18 Months D. 12 Months C. 18 Months Encryption protects information by presenting a A. Riddle B. Bug C. Puzzle D. Key D. Key AES was introduced in what year? A. 2007 B. 1989 C. 1975 D. 2002 D. 2002 When we share a key with two or more people we refer to that group as being the ____________. Cryptonet The following are common ways to handle new encryption keys except: transfer them via instant messenger A fully punctuated passphrase should have a minimum of ______________ characters. 20 characters Encrypting an encryption key using a passphrase is called: A. key exchange B. asymmetric cryptography C. key wrapping D. modular inversing C. key wrapping Using the Diffie-Hellman algorithm: A. both participants in the exchange must have a public/private key pair B. the participants in the exchange do not use public keys C. none of the answers D. each participant in the exchange divides their own private key by the other's public key to computer the shared secret A. both participants in the exchange must have a public/private key pair In a Diffie-Hellman calculation using P = g^s mod N, s, is: A. the unique public value computer from the private key B. the private key value C. a public, shared value D. the modulus B. the private key value Digital signatures are used to provide ______________________. nonrepudiation A public-key certificate generally does not contain _____________________. A. a public key B. the name of the public key's owner C. a digital signature that covers the name and the public key D. a private key D. a private key The U.S. Government standards published by NIST recommended data with particular secret key be used for no more than _______ years before changing it. Two years The method used to encrypt a key with multiple ciphers is called? Key encryption Key (KEK) What was the first web browser to use public key certificates? A. Netscape Communicator B. Internet explorer C. Netscape Navigator D. WorldWideWeb C. Netscape Navigator PGP implemented a _______________ making it so that no single person was universally trusted to sign certificates. A. Certificate Authority B. Certificate Hierarchy C. Web of trust D. Digital signatures C. Web of trust True or False: Zero Day vulnerability is one that has been reported to the software's vendor and the general public. False True or False: Victims can protect themselves against zero-day attacks. False SHA-1 produces a(n) ____-bit message digest, which can then be used as an input to a digital signature algorithm. A. 48 B. 56 C. 160 D. 256 C. 160 An Advanced Encryption Standard (AES) key may not be: A. 16 bits in length B. 192 bits in length C. 256 bits in length D. 128 bits in length A. 16 bits in length Polish cryptanalyst developed strategies to attack the rotor machine ciphers in the 1930s. William Friedman and his colleagues improved on these techniques at what location? Bletchley Park, in England DES was unveiled in what year? A. 2007 B. 1989 C. 1975 D. 2002 C. 1975 The process of decrypting a code is ___________________________. Reverse Encryption The process of converting ciphertext to plaintext is known as: a. Cryptography b. Encryption c. Decryption d. Cipher processing c. Decryption While not encrypting or decrypting, the processing state operates only on _____________________. plaintext Students also viewedChapter 1 Quiz Study Guide25 terms Alex_Badia1 MIS 4316 - Exam 1 (Ch 1-3)117 terms mis_geek65742 Test 1 Information Security36 terms treestarrPlus Information Systems Security61 terms kaylynlh Sets found in the same folderITN262 Final Study Guide92 terms gravyluvr ITN 262- Chapter 825 terms bcm87 ITN 262 FINAAAAAAL126 terms kitu10 ITN 262 Midterm50 terms fuchsiaring Other sets by this creatorIT462 - Chapter 20-21 Review40 terms gravyluvr IT462 - Chapter 21 Review20 terms gravyluvr IT462 - Chapter 20 Review20 terms gravyluvr IT462 - Chapter 10 Review20 terms gravyluvr Verified questions
computer science Write an assignment statement that computes the square root of the sum of num1 and num2 and assigns the result to num3. Verified answer
computer science Show all legal B-trees of minimum degree 2 that represent {1, 2, 3, 4, 5}. Verified answer computer science Solve the recurrence T(n) = 3T(√n) + log n by making a change of variables. Your solution should be asymptotically tight. Do not worry about whether values are integral. Verified answer
computer science What does the following code display? $$ \begin{matrix} \text{s=""Alice and Bob""}\\ \text{s=s.upper()}\\ \text{s=s[6:]}\\ \text{print(s)}\\ \end{matrix} $$ Verified answer Recommended textbook solutionsIntroduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 726 solutions Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions
Fundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions
Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions Other Quizlet setsHealth Psych- CAM16 terms liz_voss Breaching16 terms mtoconnor97 VTNE critical care154 terms marissatomlin1Plus WTWA Chapter Three26 terms kristinmiller_14 Which of the following yields a more specific set of attacks tied to our particular threat agents quizlet?What is a worm? This yields a more specific set of attacks tied to our particular threat agents. In requirements based security, we identify and prioritize our security needs in a risk assessment process.
When an attacker is attacking a password system?When an attacker is attacking a password system, the average attack space estimates the number of guesses required before success is likely. Authentication associates an individual with an identity. MD5 is one of the most recent forms of hash functions.
Which cipher replaces A with D and B with E?The Caesar Cipher is a monoalphabetic rotation cipher used by Gaius Julius Caesar. Caesar rotated each letter of the plaintext forward three times to encrypt, so that A became D, B became E, etc., as shown in Table 4.6.
What is symmetric encryption Quizlet?Symmetric Encryption. - a common encryption method that involves using the same key to encrypt and decrypt the message. - it has other names like: - Shared or Preshared Key. - Secret Key.
|