Architecture and Design Flashcards
What are the three issues that symmetric data encryption fails to address?
- Digital integrity
- Repudiation
- Scalable Key Distribution
Which encryption method is more scalable?
Asymmetric encryption
What is the key length used by a one-time pad?
- The key length is the same length as the message that is to be encrypted
- The message length determines the key length
Which term refers to the assurance that data has not been altered in transmission?
Data integrity
What is the size, in bits, of a Message Digest version 5 (MD5) hash?
128 bits
What is meant by the term VM escape?
An exploit in which the attacker runs code on a VM that allows an OS running within it to break out and interact directly with the hypervisor
What key is used to decrypt a digital signature: public or private
Public
What does the acronym MFD denote?
Multi-functional device
Which private-key encryption algorithm does Pretty Good Privacy (PGP) use to encrypt data?
International Data Encryption Algorithm (IDEA)
Why should you periodically test an alternate site?
To ensure continued compatibility and recovery
What bit length is the hash value provided by the Secure Hash Algorithm (SHA)
160 bits
What is the name of the array where hashed items are kept?
Hash table
What is the process by which a system determines that a specific user is authorized to perform certain functions?
Authorization
What is the purpose of a file’s MD5 hash value?
To verify file integrity
Which servers are susceptible to the same type of attacks as their host, including DoS attacks, detection attacks, and escape attacks?
Virtual servers
What is the purpose of a Message Authentication Code (MAC)
Message Authentication Code (MAC) helps protect against fraud in electronic fund transfers
What does the acronym IoT denote
Internet of Things
What is meant by the term transitive trust?
A two-way relationship created between parent and child domains
What is the purpose of DLP?
Data Loss Prevention (DLP) is a network system that monitors data on computers to ensure the data is not deleted or removed
What does the acronym UAV denote?
Unmanned Aerial Vehicle
Which fire suppression method, formally used to suppress fires involving electrical equipment or liquids, has been discontinued?
Halon gas
What is a pass-the-hash attack?
When an attacker obtains a hashed user credential and uses it to authenticate to a system without cracking it
Is the Data Encryption Standard (DES) algorithm asymmetric or symmetric?
Symmetric
Which alternate computing facility takes the least amount of time to become operational?
Hot site
Which fingerprint scan will analyze fingerprint ridge direction?
Minutiae matching
What is the primary purpose of Tripwire?
To monitor the baseline configuration of a system and the changes made to it
Which type of attack on a cryptographic algorithm uses brute force methods to encrypt text strings until the output matches the ciphertext?
A mathematical attack?
What is the safest method for creating and managing key pairs: centralized or de-centralized key management?
Centralized key management
What is another name for RAID5
Disk striping with parity
What are the two most important security needs that are met using Secure Multipurpose Internet Mail Extensions (S/MIME)?
- Authentication
* Confidentiality
What are the two other names for single-key cryptography?
- Symmetric key encryption
* Secret-key encryption
What is the most important biometric system characteristic?
Accuracy
What does the acronym FRR denote?
False rejection rate
Should virtual servers have the same information security requirements as physical servers?
Yes
What was the first public-key algorithm ever user?
Diffie-Hellman
When does fuzzing occur?
When unexpected values are provided as input to an application in an effort to make the application crash
Which cryptography technique is based on a combination of two keys:
- A secret private key
- A public key
Public-key cryptography
What public-key algorithm was the first to allow two users to exchange a secret key over an insecure medium without any prior keys?
Diffie-Hellman
What is the primary concern of RAID?
Availability
What does the acronym RAID denote?
Redundant Array of Inexpensive Disks
Is the Message Digest 5 (MD5) algorithm used with symmetric or asymmetric key algorithms?
Asymmetric
What is the purpose of fuzz testing?
To identify bugs and security flaws within an application
What is the purpose of a bollard?
A bollard is a physical security control that prevents cars from accessing certain areas. They are most often deployed in front of retail storefronts
What is another name for RAID 1?
Disk mirroring
What is a hot site?
An alternate computing facility with telecommunications equipment and computers
Is the RSA algorithm symmetric or asymmetric?
Asymmetric
What is Microsoft Baseline Security Analyzer?
A Microsoft app that creates security reports
What is a cold site?
An alternate computing facility with no telecommunications equipment or computers
Which backup method backs up every file on the server each time it runs?
Full backup
What are the two types of ciphers?
- Block ciphers
* Streaming ciphers
What does the acronym CER denote?
Crossover error rate
What is the purpose of application hardening?
Ensures that an application is secure and unnecessary services are disabled
Which type of disaster recovery site provides very little fault tolerance for the primary data center and relies on backups to bring the data center back online?
Cold site
Why is the location of an alternate site important?
You do not want it to be affected by the same disaster as your primary facility?
What is the basis by which a device is measured for integrity
The secure baseline
Which type of cryptography relies more on physics, rather than mathematics, as a key aspect of its security model?
Quantum cryptography