(Correct Answer Below)
A Rational Security Decision, Such As Locking Your Vehicle When Not In Use, Is An Example Of:
:
Front
reasoned paranoia
Enter another question to find a notecard:
Search
About the flashcard:
This flashcard is meant to be used for studying, quizzing and learning new information. Many scouting web questions are common questions that are typically seen in the classroom, for homework or on quizzes and tests. Flashcards vary depending on the topic, questions and age group. The cards are meant to be seen as a digital flashcard as they appear double sided, or rather hide the answer giving you the opportunity to
think about the question at hand and answer it in your head or on a sheet before revealing the correct answer to yourself or studying partner. Some questions will include multiple choice options to show you the options involved and other questions will just have the questions and corrects answers. Simply reveal the answer when you are ready to check your work. Absolutely no cheating is
acceptable.
You May also Like:
[wcp-carousel id="1853"]
Supervisory control and data acquisition (SCADA) devices are most often associated with:UtilitiesTrue or False? Botnets can (often) perform distributed denial of service (DDoS) attacks in which
thousands of individual computers send overwhelming amounts of traffic at a victim’s computer.
Car ignition locks are an example of what type of decision?
True or False? A supervisory control and data acquisition (SCADA) device is a computer thatcontrols motors, valves, and other devices in industrial applications.
A security decision, such as locking your vehicle when not in use, is an example of:
True or False? The term “security theater” refers to security measures intended to make
Newly uploaded documents
Home
Subjects
Expert solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
- Science
- Computer Science
- Computer Security and Reliability
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (57)
A rational security decision, such as locking your vehicle when not in use, is an example of:
A. reasoned paranoia
B. the hunter's dilemma
C. integrity
D. none of the above
A. reasoned paranoia
Supervisory control and data acquisition (SCADA) devices are most often associated with:
A. retail stores
B. universities
C. utilities
D. business offices
C. utilities
CIA properties do not include:
A. integrity
B. availability
C. authentication
D. confidentiality
C. authentication
OCTAVE is a:
A. type of layered defense
B. risk-assessment process
C. security architecture
D. code of conduct
B. risk-assessment process
When you analyze a system using the six-phase security process, you are performing a:
A. security architecture study
B. plan-do-check-act cycle
C. boundary analysis
D. risk assessment
A. security architecture study
An attempt by a threat agent to exploit assets without permission is referred to as:
A. an attack
B. a safeguard
C. a trade-off
D. a vulnerability
A. an attack
A person skilled in attacking computer systems, who uses those skills as a security expert to help protect systems, is a:
A. black-hat hacker
B. script kiddy
C. cracker
D. white-hat hacker
D. White-hat hacker
A security analyst is performing a security assessment. The analyst should not:
A. securely erase all collected information that's not needed for business purposes
B. protect all working notes
C. get written authorization from the organization to verify that the assessment should take place
D. take actions to mitigate a serious risk
D. take actions to mitigate a serious risk
When disclosing a security vulnerability in a system or software, the manufacturer should avoid:
A. patching the system or software.
B. including enough detail to allow an attacker to exploit the vulnerability
C. notifying customer
D. all of the above
B. including enough detail to allow an attacker to exploit the vulnerability
What is a worm?
A. Send Spam
B. Blocks flow of computer traffic
C. Malware
D. Denial of Service
C. Malware
1. A.U.P. stands for?
A. Active User PC
B. All Unscheduled Plans
C. Active Use Personnel
D. Acceptable Use Policy
D. Acceptable Use Policy
True or False? People can be threat agents in some cases but trustworthy in others.
True
What are threat agents?
Someone who is motivated to attack our assets.
We don't identify threat agents by name; we identify them in terms of their behavior.
This yields a more specific set of attacks tied to our particular threat agents.
A. Threat Matrix
B. Security Matrix
C. Agent Matrix
D. Attack Matrix
D. Attack Matrix
The following are fundamental strategies for authenticating people on computer systems except:
A. something you have
B. something you know
C. something you make
D. something you are
C. something you make
An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of:
A. single-factor authentication
B. two-factor authentication
C. three-factor authentication
D. none of the above
B. two-factor authentication
Hashing:
A. converts text into an executable program
B. repairs damaged files
C. transforms readable text into gibberish
D. checks file contents for errors
C. transforms readable text into gibberish
An attack that blocks access to a system by other users is called:
A. social engineering
B. sniffing
C. trial and error
D. denial of service
D. denial of service
An attack in which someone tries to trick a system administrator into divulging a password is called:
A. trial and error
B. sniffing
C. social engineering
D. denial of service
C. social engineering
In a password system, the total number of possible passwords is called the:
A. search space
B. passphrase
C. hash space
D. work factor
A. search space
Authentication does what:
A. Associates an individual with an identity
B. Checks access rights
C. Grants access rights
D. All of the above
A. Associates an individual with an identity
The most recent listed hash algorithm is what?
A. SHA-512
B. MD5
C. SHA-1
D. SHA-256
A. SHA-512
There are three types of tokens; they do not include which?
A. One-time password tokens
B. Challenge-response tokens
C. Passive tokens
D. Offensive tokens
D. Offensive tokens
The following risks are associated with a weak threat except.
A. Simple trial and error password guessing
B. All are risks associated with a weak threat
C. Shoulder surfing
D. Searching for a written password
B. All are risks associated with a weak threat
Hiding an object, such as a diary, to prevent others from finding it is an example of:
A. cryptography
B. Security through Obscurity
C. transposition
D. trust
B. Security through Obscurity
An algorithm is a type of ______________________.
procedure
An encryption algorithm that uses the same key for both encryption and decryption is:
A. symmetric
B. asymmetric
C. none of the answers
D. ciphertext
A. symmetric
To use symmetric cryptography, the sender and receiver must share:
A. all of the answers
B. a secret key
C. a plaintext file
D. a secret algorithm
B. a secret key
The type of cipher that rearranges the text of a message is called:
A. substitution
B. AES
C. asymmetric
D. transposition
D. transposition
The Enigma was:
A. a U.S. encryption standard
B. an algorithm
C. a rotor machine
D. a type of ciphertext
C. a rotor machine
Gilbert Vernam's bit combination operation for encrypting digital teletype transfer is now referred as_______________________________.
XOR (Exclusive Or)
Which cipher replaces A with D and B with E?
A Caesar Cipher
File encryption on the computer's hard drive involves what risk?
A. All of the Answers
B. Access by a Trojan Horse
C. Acess to low-level data written to the hard drive
D. Access by a separately booted OS
A. All of the Answers
Moore's Law observed that computing power for doubled every;
A. 24 Months
B. None of the answers
C. 18 Months
D. 12 Months
C. 18 Months
Encryption protects information by presenting a
A. Riddle
B. Bug
C. Puzzle
D. Key
D. Key
AES was introduced in what year?
A. 2007
B. 1989
C. 1975
D. 2002
D. 2002
When we share a key with two or more people we refer to that group as being the ____________.
Cryptonet
The following are common ways to handle new encryption keys except:
transfer them via instant messenger
A fully punctuated passphrase should have a minimum of ______________ characters.
20 characters
Encrypting an encryption key using a passphrase is called:
A. key exchange
B. asymmetric cryptography
C. key wrapping
D. modular inversing
C. key wrapping
Using the Diffie-Hellman algorithm:
A. both participants in the exchange must have a public/private key pair
B. the participants in the exchange do not use public keys
C. none of the answers
D. each participant in the exchange divides their own private key by the other's public key to computer the shared secret
A. both participants in the exchange must have a public/private key pair
In a Diffie-Hellman calculation using P = g^s mod N, s, is:
A. the unique public value computer from the private key
B. the private key value
C. a public, shared value
D. the modulus
B. the private key value
Digital signatures are used to provide ______________________.
nonrepudiation
A public-key certificate generally does not contain _____________________.
A. a public key
B. the name of the public key's owner
C. a digital signature that covers the name and the public key
D. a private key
D. a private key
The U.S. Government standards published by NIST recommended data with particular secret key be used for no more than _______ years before changing it.
Two years
The method used to encrypt a key with multiple ciphers is called?
Key encryption Key (KEK)
What was the first web browser to use public key certificates?
A. Netscape Communicator
B. Internet explorer
C. Netscape Navigator
D. WorldWideWeb
C. Netscape Navigator
PGP implemented a _______________ making it so that no single person was universally trusted to sign certificates.
A. Certificate Authority
B. Certificate Hierarchy
C. Web of trust
D. Digital signatures
C. Web of trust
True or False: Zero Day vulnerability is one that has been reported to the software's vendor and the general public.
False
True or False: Victims can protect themselves against zero-day attacks.
False
SHA-1 produces a(n) ____-bit message digest, which can then be used as an input to a digital signature algorithm.
A. 48
B. 56
C. 160
D. 256
C. 160
An Advanced Encryption Standard (AES) key may not be:
A. 16 bits in length
B. 192 bits in length
C. 256 bits in length
D. 128 bits in length
A. 16 bits in length
Polish cryptanalyst developed strategies to attack the rotor machine ciphers in the 1930s. William Friedman and his colleagues improved on these techniques at what location?
Bletchley Park, in England
DES was unveiled in what year?
A. 2007
B. 1989
C. 1975
D. 2002
C. 1975
The process of decrypting a code is ___________________________.
Reverse Encryption
The process of converting ciphertext to plaintext is known as:
a. Cryptography
b. Encryption
c. Decryption
d. Cipher processing
c. Decryption
While not encrypting or decrypting, the processing state operates only on _____________________.
plaintext
Students also viewedChapter 1 Quiz Study Guide
25 terms
Alex_Badia1
MIS 4316 - Exam 1 (Ch 1-3)
117 terms
mis_geek65742
Test 1 Information Security
36 terms
treestarrPlus
Information Systems Security
61 terms
kaylynlh
Sets found in the same folderITN262 Final Study Guide
92 terms
gravyluvr
ITN 262- Chapter 8
25 terms
bcm87
ITN 262 FINAAAAAAL
126 terms
kitu10
ITN 262 Midterm
50 terms
fuchsiaring
Other sets by this creatorIT462 - Chapter 20-21 Review
40 terms
gravyluvr
IT462 - Chapter 21 Review
20 terms
gravyluvr
IT462 - Chapter 20 Review
20 terms
gravyluvr
IT462 - Chapter 10 Review
20 terms
gravyluvr
Verified questions
computer science
Write an assignment statement that computes the square root of the sum of num1 and num2 and assigns the result to num3.
Verified answer
computer science
Show all legal B-trees of minimum degree 2 that represent {1, 2, 3, 4, 5}.
Verified answer
computer science
Solve the recurrence T(n) = 3T(√n) + log n by making a change of variables. Your solution should be asymptotically tight. Do not worry about whether values are integral.
Verified answer
computer science
What does the following code display? $$ \begin{matrix} \text{s=""Alice and Bob""}\\ \text{s=s.upper()}\\ \text{s=s[6:]}\\ \text{print(s)}\\ \end{matrix} $$
Verified answer
Recommended textbook solutionsIntroduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
726 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Fundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Other Quizlet setsHealth Psych- CAM
16 terms
liz_voss
Breaching
16 terms
mtoconnor97
VTNE critical care
154 terms
marissatomlin1Plus
WTWA Chapter Three
26 terms
kristinmiller_14