Quiz 1 Flashcards

1
Q

Threats are attacks carried out.

Question 1 options:
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The first step in devising security services and mechanisms is to

develop a security policy.

Question 2 options:
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The __________ is the encryption algorithm run in reverse.

Question 3 options:

decryption algorithm

plaintext

ciphertext

A

decryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________.

Question 4 options:

SHA

RSA

AES

DSS

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The purpose of a __________ is to produce a “fingerprint” of a file, message, or other block of data.

Question 5 options:

secret key

digital signature

hash function

key stream

A

hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transmitted data stored locally are referred to as __________ .

Question 6 options:

ciphertext

DES

ECC

data at rest

A

data at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ______ and ________ is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption.

A

public and private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

User authentication is the basis for most types of access control and for user accountability.

Question 8 options:
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.

Question 9 options:

identification step

verification step

authentication step

corroboration step

A

verification step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

Question 10 options:

user education

proactive password checking

reactive password checking

computer-generated password

A

reactive password checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The default set of rights should always follow the rule of least privilege or read-only access.

Question 11 options:
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner.

Question 12 options:
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ is verification that the credentials of a user or other system entity are valid.

Question 13 options:

Adequacy

Authentication

Authorization

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question 14 options:
The basic elements of access control are: subject,________, and access right.

A

object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The __________ component deals with the management and control of the ways entities are granted access to resources.

Question 15 options:

resource management

access management

privilege management

A

access management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly