IPSec and TLS, Wireless and Mobile Security, Web Security Flashcards

1
Q

In IPSec, packets can be protected using ESP or AH but not both at the same time.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In IPSec, if A uses DES for traffic from A to B, then B must also use DES for traffic from B to A.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In IPSec, the sequence number is used for preventing replay attacks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Most browsers come equipped with SSL and most Web servers have implemented the protocol.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Even web searches have (often) been in HTTPS.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a wireless network, traffic is broadcasted into the air, and so it is much easier to sniff wireless traffic compared with wired traffic.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Compared with WEP, WPA2 has more flexible authentication and stronger encryption schemes.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

iOS has no vulnerability.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In iOS, each file is encrypted using a unique, per-file key.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In iOS, an app can run its own dynamic, run-time generated code.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The App Store review process can guarantee that no malicious iOS app is allowed into the store for download

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In iOS, each app runs in its own sandbox

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Android, all apps have to be reviewed and signed by Google.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In Android, an app will never be able to get more permission than what the user has approved.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Since Android is open-source, each handset vendor can customize it, and this is good for security (hint: consider security updates).

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The most complex and important part of TLS is the ________.

A

handshake protocol

17
Q

_______ is a list that contains the combinations of cryptographic algorithms supported by the client.

A

CipherSuite

18
Q

ESP supports two modes of use: transport and ________.

A

tunnel

19
Q

benefits of IPsec are________.

A

A. that it is below the transport layer and transparent to applications

B. there is no need to revoke keying material when users leave the organization

C. it can provide security for individual users if needed

20
Q

The ______ field in the outer IP header indicates whether the association is an AH or ESP security association.

A

protocol identifier

21
Q

A cookie can be used to authenticate a user to a web site so that the user does not have to type in his password for each connection to the site.

A

True

22
Q

Malicious JavaScripts is a major threat to browser security.

A

True

23
Q

XSS is possible when a web site does not check user input properly and use the input in an outgoing html page.

A

True

24
Q

XSS can perform many types of malicious actions because a malicious script is executed at user?s browser.

A

True

25
Q

XSRF is possible when a user has a connection to a malicious site while a connection to a legitimate site is still alive.

A

True

26
Q

In XSRF, the malicious site can send malicious script to execute in the user?s browser by embedding the script in a hidden iframe.

A

True

27
Q

It is easy for the legitimate site to know if a request is really from the (human) user.

A

False

28
Q

Using an input filter to block certain characters is an effective way to prevent SQL injection attacks.

A

False

29
Q

SQL injection is yet another example that illustrates the importance of input validation.

A

True

30
Q

Organizational security objectives identify what IT security outcomes should be achieved.

A

True

31
Q

Since the responsibility for IT security is shared across the
organization, there is a risk of inconsistent implementation of security and a loss of central monitoring and control.

A

True

32
Q

Legal and regulatory constraints may require specific approaches to risk assessment.

A

True

33
Q

One asset may have multiple threats and a single threat may target multiple assets.

A

True

34
Q

It is likely that an organization will not have the resources to implement all the recommended controls.

A

True

35
Q

The IT security management process ends with the implementation of controls and the training of personnel.

A

False

36
Q

The relative lack of success in bringing cybercriminals to justice has led to an increase in their numbers, boldness, and the global scale of their operations.

A

True

37
Q

The purpose of the privacy functions is to provide a user protection against discovery and misuse of identity by other users.

A

True

38
Q

An IT security plan should include details of ________.

A

A. risks

B. recommended controls

C. responsible personnel

39
Q

______ is a function that removes specific identifying information from query results, such as last name and telephone number, but creates some sort of unique identifier so that analysts can detect connections between queries.

A

Anonymization