Quiz 2 Flashcards
True or False: You are able to access hardware directly from all applications on a computer.
False
True or False: Granting full control to a Windows share to a user ensures that the user has access to the underlying files in the share.
False
True or False: In an offline dictionary attack, the attacker gains access to a password file and compares these password hashes against hashes of commonly used passwords.
True
True or False: An applicant applies to a registration authority (RA) to become a subscriber of a credential service provider (CSP).
True
True or False: An assurance level of 2 means that the organization has a high confidence in the validity of the asserted identity and is appropriate to enable clients or employees to access restricted services of high but not the highest value.
False
True or False: The salt value can prevent duplicate passwords from being visible in the password file.
True
True or False: Biometrics prevent replay attacks.
False
True or False: Compromise of OS means an attacker potentially has access to everything.
True
True or False: A reactive password checking strategy is one in which the system periodically runs its own password cracker to find guessable passwords.
True
What is required to trust an operating system or TCB?
a) Complete mediation
b) Tamper Proof
c) Correct
d) All of the above
e) None of the above
d) All of the above
The Java Virtual Machine is an example of:
a) Native virtualization
b) Application virtualization
c) Host virtualization
d) All of the above
e) None of the Above
b) Application virtualization
Security concerns that result from the use of virtualized systems include ______.
a) guest OS isolation
b) guest OS monitoring by the hypervisor
c) virtualized environment security
d) all of the above
d) all of the above
A hypervisor accomplishes the following:
a) It coordinates guest OS access to memory and storage
b) It coordinates guest OS access to the CPU
c) It provides a similar hardware interface as that seen by an OS directly executing on the actual hardware.
d) All of the above
e) None of the Above
d) All of the above
A _____________ occurs when an attacker targets a distinct account and submits password guesses until the correct password is discovered. The standard countermeasure is an account lockout mechanism, which locks out access to the account after a number of failed login attempts. Typical practice is no more than five access attempts.
a) Specific account attack
b) Popular Password Attack
c) Workstation hijacking
d) Offline dictionary attack
e) All of the above
f) None of the Above
a) Specific account attack
What are some common issues with compiling a dictionary of bad passwords and then preventing a user from using a password in that list:
a) Space limitations – this dictionary could be quite large.
b) Time – it could take a long time to search all of the entries in this dictionary.
c) Security – This dictionary could easily be exploited to create a rainbow table.
d) All of the above
e) A and B
f) None of the Above
e) A and B