Essay Flashcards

1
Q

Main objective of computer security

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Level of security breach impacts

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type of attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security design principle

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptography dimensions

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES round stages

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RSA security aspect

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Timing attack countermeasure

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type of constraints

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access control policy + Based on

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Operation of a biometric system

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Assurance level

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

User authentication step

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication security issue + Description + Countermeasures

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RBAC model

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access control requirement

11
Q

Element of access control

12
Q

Type of attributes

13
Q

SQLi attack avenue

14
Q

In-band attack

15
Q

SQLi countermeasure

16
Q

Inference countermeasure

17
Q

Malware category

17
Q

Honeypot classification

18
Q

Virus classification by concealment

18
Q

Database encryption disadvantage

19
Q

Virus classification by target

20
Q

Worm defense approach

21
Q

HTTP DoS exploits

21
Q

Monitoring approach

22
Q

Layers of defense against DDoS attacks

23
Q

Level of intruders

24
Q

Class of intruders

25
Q

IDS anomaly detection classifications