A security decision, such as locking your vehicle when not in use, is an example of:

(Correct Answer Below)

A Rational Security Decision, Such As Locking Your Vehicle When Not In Use, Is An Example Of:

:

Front

reasoned paranoia

Enter another question to find a notecard:

Search

About the flashcard:

This flashcard is meant to be used for studying, quizzing and learning new information. Many scouting web questions are common questions that are typically seen in the classroom, for homework or on quizzes and tests. Flashcards vary depending on the topic, questions and age group. The cards are meant to be seen as a digital flashcard as they appear double sided, or rather hide the answer giving you the opportunity to think about the question at hand and answer it in your head or on a sheet before revealing the correct answer to yourself or studying partner. Some questions will include multiple choice options to show you the options involved and other questions will just have the questions and corrects answers. Simply reveal the answer when you are ready to check your work. Absolutely no cheating is acceptable.

A security decision, such as locking your vehicle when not in use, is an example of:
report this ad

You May also Like:

[wcp-carousel id="1853"]

Supervisory control and data acquisition (SCADA) devices are most often associated with:UtilitiesTrue or False? Botnets can (often) perform distributed denial of service (DDoS) attacks in which

thousands of individual computers send overwhelming amounts of traffic at a victim’s computer.

Car ignition locks are an example of what type of decision?

True or False? A supervisory control and data acquisition (SCADA) device is a computer thatcontrols motors, valves, and other devices in industrial applications.

A security decision, such as locking your vehicle when not in use, is an example of:

True or False? The term “security theater” refers to security measures intended to make

Newly uploaded documents

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  1. Science
  2. Computer Science
  3. Computer Security and Reliability

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (57)

A rational security decision, such as locking your vehicle when not in use, is an example of:

A. reasoned paranoia

B. the hunter's dilemma

C. integrity

D. none of the above

A. reasoned paranoia

Supervisory control and data acquisition (SCADA) devices are most often associated with:

A. retail stores

B. universities

C. utilities

D. business offices

C. utilities

CIA properties do not include:

A. integrity

B. availability

C. authentication

D. confidentiality

C. authentication

OCTAVE is a:

A. type of layered defense

B. risk-assessment process

C. security architecture

D. code of conduct

B. risk-assessment process

When you analyze a system using the six-phase security process, you are performing a:

A. security architecture study

B. plan-do-check-act cycle

C. boundary analysis

D. risk assessment

A. security architecture study

An attempt by a threat agent to exploit assets without permission is referred to as:

A. an attack

B. a safeguard

C. a trade-off

D. a vulnerability

A. an attack

A person skilled in attacking computer systems, who uses those skills as a security expert to help protect systems, is a:

A. black-hat hacker

B. script kiddy

C. cracker

D. white-hat hacker

D. White-hat hacker

A security analyst is performing a security assessment. The analyst should not:

A. securely erase all collected information that's not needed for business purposes

B. protect all working notes

C. get written authorization from the organization to verify that the assessment should take place

D. take actions to mitigate a serious risk

D. take actions to mitigate a serious risk

When disclosing a security vulnerability in a system or software, the manufacturer should avoid:

A. patching the system or software.

B. including enough detail to allow an attacker to exploit the vulnerability

C. notifying customer

D. all of the above

B. including enough detail to allow an attacker to exploit the vulnerability

What is a worm?

A. Send Spam

B. Blocks flow of computer traffic

C. Malware

D. Denial of Service

C. Malware

1. A.U.P. stands for?

A. Active User PC

B. All Unscheduled Plans

C. Active Use Personnel

D. Acceptable Use Policy

D. Acceptable Use Policy

True or False? People can be threat agents in some cases but trustworthy in others.

True

What are threat agents?

Someone who is motivated to attack our assets.

We don't identify threat agents by name; we identify them in terms of their behavior.

This yields a more specific set of attacks tied to our particular threat agents.

A. Threat Matrix

B. Security Matrix

C. Agent Matrix

D. Attack Matrix

D. Attack Matrix

The following are fundamental strategies for authenticating people on computer systems except:

A. something you have

B. something you know

C. something you make

D. something you are

C. something you make

An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of:

A. single-factor authentication

B. two-factor authentication

C. three-factor authentication

D. none of the above

B. two-factor authentication

Hashing:

A. converts text into an executable program

B. repairs damaged files

C. transforms readable text into gibberish

D. checks file contents for errors

C. transforms readable text into gibberish

An attack that blocks access to a system by other users is called:

A. social engineering

B. sniffing

C. trial and error

D. denial of service

D. denial of service

An attack in which someone tries to trick a system administrator into divulging a password is called:

A. trial and error

B. sniffing

C. social engineering

D. denial of service

C. social engineering

In a password system, the total number of possible passwords is called the:

A. search space

B. passphrase

C. hash space

D. work factor

A. search space

Authentication does what:

A. Associates an individual with an identity

B. Checks access rights

C. Grants access rights

D. All of the above

A. Associates an individual with an identity

The most recent listed hash algorithm is what?

A. SHA-512

B. MD5

C. SHA-1

D. SHA-256

A. SHA-512

There are three types of tokens; they do not include which?

A. One-time password tokens

B. Challenge-response tokens

C. Passive tokens

D. Offensive tokens

D. Offensive tokens

The following risks are associated with a weak threat except.

A. Simple trial and error password guessing

B. All are risks associated with a weak threat

C. Shoulder surfing

D. Searching for a written password

B. All are risks associated with a weak threat

Hiding an object, such as a diary, to prevent others from finding it is an example of:

A. cryptography

B. Security through Obscurity

C. transposition

D. trust

B. Security through Obscurity

An algorithm is a type of ______________________.

procedure

An encryption algorithm that uses the same key for both encryption and decryption is:

A. symmetric

B. asymmetric

C. none of the answers

D. ciphertext

A. symmetric

To use symmetric cryptography, the sender and receiver must share:

A. all of the answers

B. a secret key

C. a plaintext file

D. a secret algorithm

B. a secret key

The type of cipher that rearranges the text of a message is called:

A. substitution

B. AES

C. asymmetric

D. transposition

D. transposition

The Enigma was:

A. a U.S. encryption standard

B. an algorithm

C. a rotor machine

D. a type of ciphertext

C. a rotor machine

Gilbert Vernam's bit combination operation for encrypting digital teletype transfer is now referred as_______________________________.

XOR (Exclusive Or)

Which cipher replaces A with D and B with E?

A Caesar Cipher

File encryption on the computer's hard drive involves what risk?

A. All of the Answers

B. Access by a Trojan Horse

C. Acess to low-level data written to the hard drive

D. Access by a separately booted OS

A. All of the Answers

Moore's Law observed that computing power for doubled every;

A. 24 Months

B. None of the answers

C. 18 Months

D. 12 Months

C. 18 Months

Encryption protects information by presenting a

A. Riddle

B. Bug

C. Puzzle

D. Key

D. Key

AES was introduced in what year?

A. 2007

B. 1989

C. 1975

D. 2002

D. 2002

When we share a key with two or more people we refer to that group as being the ____________.

Cryptonet

The following are common ways to handle new encryption keys except:

transfer them via instant messenger

A fully punctuated passphrase should have a minimum of ______________ characters.

20 characters

Encrypting an encryption key using a passphrase is called:

A. key exchange

B. asymmetric cryptography

C. key wrapping

D. modular inversing

C. key wrapping

Using the Diffie-Hellman algorithm:

A. both participants in the exchange must have a public/private key pair

B. the participants in the exchange do not use public keys

C. none of the answers

D. each participant in the exchange divides their own private key by the other's public key to computer the shared secret

A. both participants in the exchange must have a public/private key pair

In a Diffie-Hellman calculation using P = g^s mod N, s, is:

A. the unique public value computer from the private key

B. the private key value

C. a public, shared value

D. the modulus

B. the private key value

Digital signatures are used to provide ______________________.

nonrepudiation

A public-key certificate generally does not contain _____________________.

A. a public key

B. the name of the public key's owner

C. a digital signature that covers the name and the public key

D. a private key

D. a private key

The U.S. Government standards published by NIST recommended data with particular secret key be used for no more than _______ years before changing it.

Two years

The method used to encrypt a key with multiple ciphers is called?

Key encryption Key (KEK)

What was the first web browser to use public key certificates?

A. Netscape Communicator

B. Internet explorer

C. Netscape Navigator

D. WorldWideWeb

C. Netscape Navigator

PGP implemented a _______________ making it so that no single person was universally trusted to sign certificates.

A. Certificate Authority

B. Certificate Hierarchy

C. Web of trust

D. Digital signatures

C. Web of trust

True or False: Zero Day vulnerability is one that has been reported to the software's vendor and the general public.

False

True or False: Victims can protect themselves against zero-day attacks.

False

SHA-1 produces a(n) ____-bit message digest, which can then be used as an input to a digital signature algorithm.

A. 48

B. 56

C. 160

D. 256

C. 160

An Advanced Encryption Standard (AES) key may not be:

A. 16 bits in length

B. 192 bits in length

C. 256 bits in length

D. 128 bits in length

A. 16 bits in length

Polish cryptanalyst developed strategies to attack the rotor machine ciphers in the 1930s. William Friedman and his colleagues improved on these techniques at what location?

Bletchley Park, in England

DES was unveiled in what year?

A. 2007

B. 1989

C. 1975

D. 2002

C. 1975

The process of decrypting a code is ___________________________.

Reverse Encryption

The process of converting ciphertext to plaintext is known as:

a. Cryptography

b. Encryption

c. Decryption

d. Cipher processing

c. Decryption

While not encrypting or decrypting, the processing state operates only on _____________________.

plaintext

Students also viewed

Chapter 1 Quiz Study Guide

25 terms

Alex_Badia1

MIS 4316 - Exam 1 (Ch 1-3)

117 terms

mis_geek65742

Test 1 Information Security

36 terms

treestarrPlus

Information Systems Security

61 terms

kaylynlh

Sets found in the same folder

ITN262 Final Study Guide

92 terms

gravyluvr

ITN 262- Chapter 8

25 terms

bcm87

ITN 262 FINAAAAAAL

126 terms

kitu10

ITN 262 Midterm

50 terms

fuchsiaring

Other sets by this creator

IT462 - Chapter 20-21 Review

40 terms

gravyluvr

IT462 - Chapter 21 Review

20 terms

gravyluvr

IT462 - Chapter 20 Review

20 terms

gravyluvr

IT462 - Chapter 10 Review

20 terms

gravyluvr

Verified questions

computer science

Write an assignment statement that computes the square root of the sum of num1 and num2 and assigns the result to num3.

Verified answer

computer science

Show all legal B-trees of minimum degree 2 that represent {1, 2, 3, 4, 5}.

Verified answer

computer science

Solve the recurrence T(n) = 3T(√n) + log n by making a change of variables. Your solution should be asymptotically tight. Do not worry about whether values are integral.

Verified answer

computer science

What does the following code display? $$ \begin{matrix} \text{s=""Alice and Bob""}\\ \text{s=s.upper()}\\ \text{s=s[6:]}\\ \text{print(s)}\\ \end{matrix} $$

Verified answer

Recommended textbook solutions

A security decision, such as locking your vehicle when not in use, is an example of:

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

726 solutions

A security decision, such as locking your vehicle when not in use, is an example of:

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

A security decision, such as locking your vehicle when not in use, is an example of:

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

A security decision, such as locking your vehicle when not in use, is an example of:

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Other Quizlet sets

Health Psych- CAM

16 terms

liz_voss

Breaching

16 terms

mtoconnor97

VTNE critical care

154 terms

marissatomlin1Plus

WTWA Chapter Three

26 terms

kristinmiller_14

Which of the following yields a more specific set of attacks tied to our particular threat agents quizlet?

What is a worm? This yields a more specific set of attacks tied to our particular threat agents. In requirements based security, we identify and prioritize our security needs in a risk assessment process.

When an attacker is attacking a password system?

When an attacker is attacking a password system, the average attack space estimates the number of guesses required before success is likely. Authentication associates an individual with an identity. MD5 is one of the most recent forms of hash functions.

Which cipher replaces A with D and B with E?

The Caesar Cipher is a monoalphabetic rotation cipher used by Gaius Julius Caesar. Caesar rotated each letter of the plaintext forward three times to encrypt, so that A became D, B became E, etc., as shown in Table 4.6.

What is symmetric encryption Quizlet?

Symmetric Encryption. - a common encryption method that involves using the same key to encrypt and decrypt the message. - it has other names like: - Shared or Preshared Key. - Secret Key.