Review 6B Flashcards

1
Q

A benefit of Open System Architecture is that it:

A

facilitates interoperatability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A common form of asymmetric encryption is RSA.

True/ False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A dial back modem may be used to prevent access by guessing passwords.
True/ False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An ITF is considered a useful audit tool because it uses the same programs to compare processing using independently calculated data.

True/False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application firewall systems:

A

Disadvantages are poor performance and scalability as internet usage grows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Common type of message digest algorithms are SHA1, MD2, MD4 and MD5:

A

There algorithms are one way functions unlike private and public key encryption algoritms. This process of creating message digest cannot be reversed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Components of IDS:

A

Sensors that are responsible for collecting data, Analyzer that receive input from sensors and determine intrusive activity, An administrative control, A user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digital signature is a cryptographic method that ensures:

A

Data integrity, Authentication and Non repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital signatures and public\ Key encryption are vulnerable to man in the middle attacks wherein the senders digital signature private key and public key may be faked. True/ False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Establishing controls to handle concurrent access problems is a preventive control. True/ False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Examples of such attacks in application layer:

A

SQL injection, buffer overflow attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Heuristic scanning tools:

A

are a type of virus scanning used to indicate possible infected codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IDS cannot help following weakness:

A

weakness in policy definition, application level vulnerabilities, back door in the applications, weakness in identification and athentication schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If asymmetric keys were used to encrypt bulk data:

A

the process would be very slow, this is the reason they are used to encrypt short messages such as digest or signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Implementing data backup and recovery procedure is a corrective control, because backup and recovery procedure can be used to rollback database errors. True/ False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In asymetric encryption process, two keys ork together as pair. One key is ued to encrypt data and other is used to decrypt data. Either key can be used to encrypt or decrypt but once the key has been used to encrypt data, only its partner can be used to decrypt the data. True/ False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It is possible to break LAN security through the dail in route. Without dail up access controls, a caller can dial in and try passwords until they gain access. True/ False

A

True

18
Q

Neural based IDS:

A

are similar to statistical model but with added self learning functionality

19
Q

Open system are those for which suppliers provied components whose interfaces are defined by public standards, thus facilitating interoperability between systems made by different vendors. True/ False

A

True

20
Q

Possible attacks in packet filtering firewalls:

A

IP spoofing, Source routing specification and miniature fragment attack.

21
Q

Problem faced firewall:

A

Most firewalls operate at network layer, therefore they do not stop any application base or input based attack

22
Q

Prototyping is the development of a system through controlled trial and error: True/ False

A

True

23
Q

Router packet filtering firewalls:

A

Packet header have information in them, including the IP address of the sender and receiver and the authorized port numbers allowed to use the information transmitted. Base onthat information the router know what kind of internet service, such as web based or FTP, is being used to send the date as well as the identitied of the sender and reciver of the data.

24
Q

Stateful inspection firewall:

A

It keeps track of the destination IP address of each packet that leaves the organizations internal network. whenever the response to the packet is received its record is referenced to ascertain and ensure that the incoming message is in response to the request that went out from the organization.

25
Q

symmetric key systems use single, secret, bidirectional keys. True/ False

A

True

26
Q

To protect against Man in the middle attacks and independent authority has been designed. True/ False

A

True

27
Q

Twin line dial back modems:

A

Dial back modems are available that are connected to two individual telephones. one is used for incoming calls and the second is used to call back the user on the known telephone number.

28
Q

Two types of Honey pots:

A

High interactionn , Low interaction

29
Q

Types of IDS:

A

Signature based, statistical based, and Neural

based

30
Q

What is the most prevalent security risk when an organization implements remote VPN access to its network?

A

Malicious code could be spread across the network

31
Q

When using public key encryption to secure data being transmitted across a network:

A

the key use to encrypt is public, but the key used to deycrypt the data is private

32
Q

Advantage of Iris identification:

A

the contact with the device is not needed

33
Q

A good practice will terminate all VPN to the same end point in a so called VPN concentrator, and will not accept VPNs directed at other parts of the network. True/False

A

True

34
Q

Alteration attack:

A

Occurs when unothorzied modification affect the integrity of the data or code. Cryptographic hash is a primary defense against alteration attacks

35
Q

Another risk of peer to peer computing is that users may expose there IP addresses, which can lead to IP spoofing: True/ False

A

True

36
Q

A parity check:

A

is a hardware control that detects data errors when data are read from one computer to another, from memory or during transmission

37
Q

Applying a cryptographic hashing algorithm the entire message addresses the message integrity issue. Enciphering the message digest using the senders private key address non repidiation. Encrypting the message with a symmetric key, thereafter allowing the key to be enciphered using the receivers public key most efficiently address the confidentiality of the message as well as the receiver’s non repudiation. True/False

A

True

38
Q

A redundancy check:

A

detect transmission errors by appending calculated bit on to the end of each segment of data

39
Q

A reasonableness check:

A

compares data to predefined reasonability limit or occurrence rates established for the data

40
Q

Authentication is typically categorized as “something you know” PASSWORD. Something you have “TOKEN CARD” and something you are “BIOMETRIC FEATURES”. True/False

A

True

41
Q

Banana attack:

A

Redirects outgoaing messages from the client back onto the client, preventing outside access, as well as flooding the client with the sent packets

42
Q

Botnets:

A

Comprise a collection of compromised computers (called zombie computers) running software, usually installed via worms, Trojan horses or back doors.