Sec + Flashcards

Study for Sec+

1
Q

A digital signature provides ______, ________, and _________ in electronic mail.

A

integrity, authentication, and non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Non-repudiation

A

ensures that the sender cannot deny the previous actions or message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What ensures that the sender cannot deny the previous actions or message.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

Providing assurance that a message was not modified during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

The process of verifying that the sender is who he says he is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Providing assurance that a message was not modified during transmission.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of verifying that the sender is who he says he is.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digital signatures do not provide encryption and cannot ensure _____________.

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A digital signature is a hash value that is encrypted with the sender’s private key. For example, a file on Windows 98 that has been digitally signed indicates that the file has passed quality testing by Microsoft. The message is digitally signed. Therefore, it provides authentication, non-repudiation, and __________.

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If a recipient wants to verify a digital signature, the ______ ______ of the signer must be used in conjunction with the ______ _______.

A

public key

hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Signature Standard (DSS) defines digital signatures. It provides integrity and authentication. It is not a _________ ______ ____________.

A

symmetric key algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A digital signature cannot be spoofed. Therefore, attacks, such as man-in-the-middle attacks, cannot harm the integrity of the ___________.

A

message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Microsoft uses _______ ________ to ensure the integrity of driver files.

A

digital signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A digital signature cannot be ____________. Therefore, attacks, such as man-in-the-middle attacks, cannot harm the integrity of the ___________.

A

spoofed

message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Microsoft uses digital signing to ensure the integrity of _______ __________.

A

driver files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advanced Encryption Standard

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AES= A_______ E_______ S_______

A

Advanced Encryption Standard

18
Q

Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish are examples of symmetrical algorithms and pseudo-random number generation (PRNG). Symmetric algorithms are sometimes called b_____ c______.

A

block ciphers

19
Q

Random number generation and pseudo-random number generation are types of algorithms used to generate c____________ keys.

A

cryptographic keys

20
Q

PRNG uses a symmetric algorithm to generate a number that is “random enough” for cryptographic purposes. PRNG is used in A_S, D_S, and B______.

A

AES, DES, and Blowfish

21
Q

Random number generation is used in asymmetric ciphers, such as R_A, D_____-H____, and E_____ C_____ C________ (E_C).

A

RSA, Diffie-Hellman, and Elliptic Curve Cryptosystem (ECC).

22
Q

_________ is the cryptographic technique whereby a change of a single input bit results in a change of multiple output bits.

A

Diffusion

23
Q

A collision is the result of a hashing algorithm producing the same ________ from two different inputs.

A

output

24
Q

Obfuscation is the basic foundation of both ______ and _________. The term means to hide something so that it is not easily readable.

A

encryption and steganography

25
Q

Key strength should reflect the sensitivity of the data it protects. Generally, as the need to secure the data increases, so should the strength of the ___. Longer keys require more processing power (and time) to ______.

A

key

break

26
Q

DLP

A

Data Loss Prevention

27
Q

Memory leaks-

A

Memory leaks can be caused by a programmer failing to free up memory once the process using that memory has been completed. C and C++ are particularly prone to memory leaks.

28
Q

Integer overflows

A

happen when a number too large to fit into the data type “integer” is not rejected and is allowed to corrupt the program.

29
Q

Pointer de-references

A

occur when a pointer (which points to the proper memory location) has the reference changed. This results in the pointer pointing to an inaccurate value

30
Q

__ ________ ________ is an example of improper input handling being allowed by the application code, and the impact can include crashing the application. Other examples of improper input handling include failure to validate the type of data in an input field, the length of the data, proper date ranges.

A

A buffer overflow

31
Q

_______ _______ can be caused by a programmer failing to free up memory once the process using that memory has been completed. C and C++ are particularly prone to memory leaks.

A

Memory leaks

32
Q

_______ _________ happen when a number too large to fit into the data type “integer” is not rejected and is allowed to corrupt the program.

A

Integer overflows

33
Q

____ __________ occur when a pointer (which points to the proper memory location) has the reference changed. This results in the pointer pointing to an inaccurate value

A

Pointer de-references

34
Q

A buffer overflow

A

an example of improper input handling being allowed by the application code, and the impact can include crashing the application. Other examples of improper input handling include failure to validate the type of data in an input field, the length of the data, proper date ranges.

35
Q

Stateless firewalls

A

make decisions based on the data that comes in and not on any complex rules.

36
Q

Stateful firewalls

A

maintain a state table that tracks every communication packet.

37
Q

These firewalls make decisions based on the data that comes in and not on any complex rules.

A

Stateless firewalls

38
Q

These firewalls maintain a state table that tracks every communication packet.

A

Stateful firewalls

39
Q

LDAP

A

389

40
Q

389

A

LDAP