Practice E Flashcards

1
Q

RSA is most vulnerable to ___ attacks

A

chosen ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a ___ , or application-level gateway firewall, is primarily used to hide the source of a network connection by terminating and replacing it with a new connection

A

proxy firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ is when two database processes are denied access to the same record at the same time

A

deadlocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WEP is considered unsecure because it uses a ___

A

24 bit Initialization Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISDN, PPP, T1 and telephone landlines are all ___, while Frame Relay and X.25 are ___

A

circuit switched; packet switched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

in pipelining the CPU fetches a second instruction while the first instruction is ___

A

decoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ obfuscation attempts to make code obscure to computers

A

prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

security labeling refers to the use of ___ for managing data, but security ___ must be human-readable

A

attributes; marking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ testing is submitting data that is out of range for a given field

A

boundary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

in a ___ attack data is entered into a browser field in hexadecimal format

A

double encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ memory is the fastest

A

cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

each port on a switch creates a new ___, unless it it has VLAN’s configured, because each VLAN is its own ___

A

collision domain; broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VLAN’s, like routers, divide a network into different ___

A

broadcast domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

unicast ___ addresses are not routable, but are used in neighbor discovery

A

link local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

in International Common Criteria evaluation, the Security Target (ST) refers to ___

A

documentation which describes the device to be tested and any security requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ and ___ are a memory protection techniques that map processes to specific hardware memory locations

A

hardware segmentation; virtual memory

17
Q

___ does not provide Confidentiality, Integrity or Authentication, and so has been largely replaced by PPP, but is still used for IP packet encapsulation by microcontrollers

A

SLIP

18
Q

___ is using a trademarked name as a general description (like “coke” for any soft drink)

A

dilution

19
Q

___ uses flip-flops to store data, which is faster than ___ which uses capacitors and must be constantly refreshed to maintain integrity

A

SRAM; DRAM

20
Q

access control mechanisms use the ___ OS kernel to determine whether a subject with a given clearance can access an object of a different classification set

A

reference monitor

21
Q

Vulnerabilities labeled “CVE…” have been identified by ___

A

MITRE