Shared Flashcard Set

Details

Informaton Security
Information Security ch 11-12
38
Computer Science
Undergraduate 1
08/10/2013

Additional Computer Science Flashcards

 


 

Cards

Term
The most common frequency band used in the household is 4.2 GHz.
Definition
FALSE
Term
With IPsec, security associations are used to establish the logical set of security parameters designed to facilitate the sharing of information between entities. The security association protects
Definition
Integrity and confidentiality
Term
The main weakness of SSH is that all traffic is sent in the clear.
Definition
FALSE
Term
When an attacker uses Bluetooth to copy e-mails, contact lists, or other files on the device, it is called
Definition
Bluesnarfing
Term
The cryptographic standard for proposed for 3G networks is
Definition
KASUMI
Term
Which of the following protocols involves a three-way handshake and uses a shared secret key for communication?
Definition
CHAP
Term
Bluejacking is when an attacker uses Bluetooth to copy the victim's information such as e-mails, contact lists, calendars, photos, and videos
Definition
TRUE
Term
______________ is when an attacker uses Bluetooth to establish a serious connection to a device allowing access to the full AT command set
Definition
Bluebugging
Term
Which type of access control would be used to grant permissions based on the duties that must be performed?
Definition
Role-based access control
Term
The security concern over the so-called WAP gap is when
Definition
WAP gateways perform translation from one encryption standard to another all messages are seen in plaintext by the WAP gateway.
Term
The primary vulnerability associated with many methods of remote access is
Definition
The passing of critical data in clear text
Term
WEP was not designed with confidentiality in mind.
Definition
false
Term
WAP was designed to work on which of the following?
Definition
Devices with low computing power
Term
What does AAA stand for?
Definition
Authentication, Authorization, Accounting
Term
A door that requires a thumbprint, key card, and password is an example of
Definition
Multifactor authentication
Term
Which of the following protocols involves a two-way handshake in which the username and password are sent across the link in clear text?
Definition
PAP
Term
_____________ means to make certain that no unauthorized individuals read the packets you transmit over the Internet
Definition
Confidentiality
Term
Telnet traffic is encrypted by default.
Definition
FALSE
Term
What does TACACS stand for?
Definition
Terminal Access Controller Access Control System
Term
Security issues associated with WTLS include which of the following?
Definition
d. Clients with low memory or CPU capabilities cannot support encryption.
Term
Access to actual Ethernet segments is not protected by physical security measures.
Definition
FALSE
Term
Telnet is a secure way to remotely access a computer.
Definition
FAlse
Term
Because the security of wireless LANs is ineffective, many users have switched to a layered security approach.
Definition
true
Term
RADIUS uses
Definition
c. UDP port 1812 for authentication and UDP port 1813 for accounting
Term
What is wireless networking?
Definition
c. The transmission of packetized data by means of physical topology not using direct physical links
Term
With IPsec, AH and ESP
Definition
c. Can be used separately or together
Term
With mandatory access controls, the owner of an object determines who has access to it.
Definition
false
Term
Which type of access control would you use to grant permissions based on the sensitivity of the information contained in the objects?
Definition
a. Mandatory access control
Term
______________ means reliable information.
Definition
a. Integrity
Term
WAP uses _______________ for its encryption scheme.
Definition
WTLS
Term
TACACS+ is a client/server protocol that uses IP as its transport protocol.
Definition
FALSE
Term
Which of the following protocols was designed for short-range wireless communication typically with mobile phones?
Definition
BLUETOOTH
Term
WEP was not designed with confidentiality in mind.
Definition
FALSE
Term
Why is wireless problematic from a security standpoint?
Definition
c. There is no control over the physical layer of traffic.
Term
WEP provides strong protection for confidentiality.
Definition
TRUE
Term
In Kerberos environment, the first ticket in the two-step process is the ticket-granting ticket.
Definition
TRUE
Term
Which of the following describes the wireless standard?
Definition
8O2.11
Term
TACACS+ is a client/server protocol that uses IP as its transport protocol.
Definition
FALSE
Supporting users have an ad free experience!