Domain 3 Flashcards

(28 cards)

1
Q

Algorithm is now considered as insecure

A

Merkle-Hellman Knapsack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access data on 1 account/customer and cannot access other accounts

A

Brewer Nash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNS Poisoning can result to

A

Man in the Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

two modes that provide both confidentiality and data authenticity

A

GCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Maximum bit SHA can provide

A

256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

doubles the length of any message it encrypts

A

El Gamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cipher mode allows you to break encryption into multiple independent steps

A

CBC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Poses greater risk of accidental discharge in Data Center

A

Wet Pipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is best type water based fire suppression for a computer facility

A

Preaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

proprietary system that uses unpublished protocols

A

Closed system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DOS Attack uses ICMP echoes and work in Layer 3

A

Smurf Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DOS Attack uses UDP works in Layer 4

A

Fraggle Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

attack causing type of external fault such as application high voltage electricity

A

Fault Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attack rely on flaw in the cryptographic algorithm

A

Implementation Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Syn Attack is working in which OSI Layer

A

Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Contains list of public key that has been revoked

17
Q

CRL disadvantage introduce

18
Q

RSA use Cipher or Prime Numbers

A

Prime numbers

19
Q

is a security standard that is focused on security governance

ISO27001 or ISO27002

20
Q

Is security standard based on industry standard security based control

21
Q

Linear cryptanalysis is known

A

Plaintext attack

22
Q

Too much data sent to the same memory location

A

Buffer overflow

23
Q

allows the exchange of symmetric encryption keys betweeen two parties over an insecure channel

24
Q

provides confidentiality integrity and authentication

25
are outdated and no longer considered secure
DES and 3DES
26
Used to increase the strength of cryptography by creating a unique ciphertext every time the same message is encrypted with the same key
IV
27
Digital signature provides which of the following? Integrity Authentication Confidentiality
Integrity
28
strong star states that enforces that a subject can only perform both read/write within same security level
Bell Lapadula