Practice E Flashcards
RSA is most vulnerable to ___ attacks
chosen ciphertext
a ___ , or application-level gateway firewall, is primarily used to hide the source of a network connection by terminating and replacing it with a new connection
proxy firewall
___ is when two database processes are denied access to the same record at the same time
deadlocking
WEP is considered unsecure because it uses a ___
24 bit Initialization Vector
ISDN, PPP, T1 and telephone landlines are all ___, while Frame Relay and X.25 are ___
circuit switched; packet switched
in pipelining the CPU fetches a second instruction while the first instruction is ___
decoding
___ obfuscation attempts to make code obscure to computers
prevention
security labeling refers to the use of ___ for managing data, but security ___ must be human-readable
attributes; marking
___ testing is submitting data that is out of range for a given field
boundary
in a ___ attack data is entered into a browser field in hexadecimal format
double encoding
___ memory is the fastest
cache
each port on a switch creates a new ___, unless it it has VLAN’s configured, because each VLAN is its own ___
collision domain; broadcast domain
VLAN’s, like routers, divide a network into different ___
broadcast domains
unicast ___ addresses are not routable, but are used in neighbor discovery
link local
in International Common Criteria evaluation, the Security Target (ST) refers to ___
documentation which describes the device to be tested and any security requirements
___ and ___ are a memory protection techniques that map processes to specific hardware memory locations
hardware segmentation; virtual memory
___ does not provide Confidentiality, Integrity or Authentication, and so has been largely replaced by PPP, but is still used for IP packet encapsulation by microcontrollers
SLIP
___ is using a trademarked name as a general description (like “coke” for any soft drink)
dilution
___ uses flip-flops to store data, which is faster than ___ which uses capacitors and must be constantly refreshed to maintain integrity
SRAM; DRAM
access control mechanisms use the ___ OS kernel to determine whether a subject with a given clearance can access an object of a different classification set
reference monitor
Vulnerabilities labeled “CVE…” have been identified by ___
MITRE