Quiz 1 Flashcards
Threats are attacks carried out.
Question 1 options:
True
False
False
The first step in devising security services and mechanisms is to
develop a security policy.
Question 2 options:
True
False
True
The __________ is the encryption algorithm run in reverse.
Question 3 options:
decryption algorithm
plaintext
ciphertext
decryption algorithm
The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________.
Question 4 options:
SHA
RSA
AES
DSS
AES
The purpose of a __________ is to produce a “fingerprint” of a file, message, or other block of data.
Question 5 options:
secret key
digital signature
hash function
key stream
hash function
Transmitted data stored locally are referred to as __________ .
Question 6 options:
ciphertext
DES
ECC
data at rest
data at rest
The ______ and ________ is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption.
public and private
User authentication is the basis for most types of access control and for user accountability.
Question 8 options:
True
False
True
Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.
Question 9 options:
identification step
verification step
authentication step
corroboration step
verification step
A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.
Question 10 options:
user education
proactive password checking
reactive password checking
computer-generated password
reactive password checking
The default set of rights should always follow the rule of least privilege or read-only access.
Question 11 options:
True
False
True
The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner.
Question 12 options:
True
False
True
__________ is verification that the credentials of a user or other system entity are valid.
Question 13 options:
Adequacy
Authentication
Authorization
Authentication
Question 14 options:
The basic elements of access control are: subject,________, and access right.
object
The __________ component deals with the management and control of the ways entities are granted access to resources.
Question 15 options:
resource management
access management
privilege management
access management