Practice E Flashcards
RSA is most vulnerable to ___ attacks
chosen ciphertext
a ___ , or application-level gateway firewall, is primarily used to hide the source of a network connection by terminating and replacing it with a new connection
proxy firewall
___ is when two database processes are denied access to the same record at the same time
deadlocking
WEP is considered unsecure because it uses a ___
24 bit Initialization Vector
ISDN, PPP, T1 and telephone landlines are all ___, while Frame Relay and X.25 are ___
circuit switched; packet switched
in pipelining the CPU fetches a second instruction while the first instruction is ___
decoding
___ obfuscation attempts to make code obscure to computers
prevention
security labeling refers to the use of ___ for managing data, but security ___ must be human-readable
attributes; marking
___ testing is submitting data that is out of range for a given field
boundary
in a ___ attack data is entered into a browser field in hexadecimal format
double encoding
___ memory is the fastest
cache
each port on a switch creates a new ___, unless it it has VLAN’s configured, because each VLAN is its own ___
collision domain; broadcast domain
VLAN’s, like routers, divide a network into different ___
broadcast domains
unicast ___ addresses are not routable, but are used in neighbor discovery
link local
in International Common Criteria evaluation, the Security Target (ST) refers to ___
documentation which describes the device to be tested and any security requirements