Review 6B Flashcards
A benefit of Open System Architecture is that it:
facilitates interoperatability
A common form of asymmetric encryption is RSA.
True/ False
True
A dial back modem may be used to prevent access by guessing passwords.
True/ False
True
An ITF is considered a useful audit tool because it uses the same programs to compare processing using independently calculated data.
True/False
True
Application firewall systems:
Disadvantages are poor performance and scalability as internet usage grows
Common type of message digest algorithms are SHA1, MD2, MD4 and MD5:
There algorithms are one way functions unlike private and public key encryption algoritms. This process of creating message digest cannot be reversed
Components of IDS:
Sensors that are responsible for collecting data, Analyzer that receive input from sensors and determine intrusive activity, An administrative control, A user interface
Digital signature is a cryptographic method that ensures:
Data integrity, Authentication and Non repudiation
Digital signatures and public\ Key encryption are vulnerable to man in the middle attacks wherein the senders digital signature private key and public key may be faked. True/ False
True
Establishing controls to handle concurrent access problems is a preventive control. True/ False
True
Examples of such attacks in application layer:
SQL injection, buffer overflow attacks.
Heuristic scanning tools:
are a type of virus scanning used to indicate possible infected codes
IDS cannot help following weakness:
weakness in policy definition, application level vulnerabilities, back door in the applications, weakness in identification and athentication schemes
If asymmetric keys were used to encrypt bulk data:
the process would be very slow, this is the reason they are used to encrypt short messages such as digest or signatures
Implementing data backup and recovery procedure is a corrective control, because backup and recovery procedure can be used to rollback database errors. True/ False
True
In asymetric encryption process, two keys ork together as pair. One key is ued to encrypt data and other is used to decrypt data. Either key can be used to encrypt or decrypt but once the key has been used to encrypt data, only its partner can be used to decrypt the data. True/ False
True