Shared Flashcard Set

Details

SSCP
NA
61
Computer Science
Professional
03/07/2009

Additional Computer Science Flashcards

 


 

Cards

Term
PREVENTATIVE Access Controls
Definition
Detur intrusion or attacks, Example:Seperation of duties
Term
What are Objects?
Definition
Objects are data applications, systems, networks, and physical space.
Term
Authentication
Definition
The process of validating a subject's identity.
Term
TECHNICAL Access Controls
Definition
Computer mechanisms that restrict access. Example: Encryption
Term
PHYSICAL Access Controls
Definition
Restrict or conrol physical access.
Term
Cognitave password
Definition
Related to things people know, such as mothers maden name.
Term
What kind of password is marryhadalittlelamb?
Definition
Cognitave
Term
Which of the following defines the CROSSOVER RATE for evaluating biometric systems?
Definition
The point where the number of false positives matches the number of false negatives in a biometric systems.
Term
What conditions are disirable when selecting a biomeric system?
Definition
Low crossever error rate, and a high processing rate
Term
False negitive
Definition
When someone is denied access when they should be allowed access.
Term
What should be done to a user account if the user goes on an extended vacation?
Definition
Lock the account
Term
Syncronous Token Devices
Definition
Devices Synchronized to an authentication server
Term
What is a strong password?
Definition
A strong password should not contain dictionary words or any part of the log in name. They should include upper case letters, numbrtd, snf dymbold. In addition, longer is better.
Term
What kind of access controls should be used implement short term repairs to restore basic functionality after an attack?
Definition
Corrective
Term
Which of the following is an example of type 1 authentication?
A. Smart card
B. User name
C. Passphrase
D. Retina scan
Definition
C. Pass Phrase
Term
You have just configured and set the password policy and set the minumum password age to 10. What will be the effect of this configuration?
Definition
Users cannot change their password for 10 days.
Term
You implemented account lockout with a clipping level of 4. What will be the effect of this setting?
Definition
The account will be locked out after 4 incorrect attempts.
Term
What is the best action taken after noticing a user has written their password down?
Definition
Implement end-user training
Term
What is the best way to dispose of data stored on CD-Rs?
Definition
Sred it bich
Term
What is the star property of Bell-Padula?
Definition
no write-down?
Term
What is the Clark-Wilson model primarily based on?
Definition
Controlled Intermediary access applications
Term
The brewer-bash model is designed to prevent what?
Definition
Conflicts of interest
Term
Which access control model manages rights and permissions based on job descriptions and responsibilities?
Definition
Mandatory Access Control (MAC)
Term
What does the Mandatory Access Control (MAC) method use to control access?
Definition
Sensitivity labels mofo
Term
Discretionary Access Control (DAC) Manages access resources using what primary element or aspect?
Definition
Identity
Term
DAC (Discretionary Access Control)
Definition
Uses Identities to control resource access. Users can define access controls to their owned resources.
Term
What kind of access control focuses on assigning privlages based on security clearance and data sensitivity?
Definition
MAC (Mandatory Access Control)
Term
Which principles is implemented in a mandatory access control model to determine access to an object using classification levels?
Definition
Need to know
Term
NEED TO KNOW is required to access what types of resources?
Definition
Compartmentalized resources
Term
In what orm of access control enviroment is access controlled by rules rather than by identity?
Definition
Mandatory Access Control (MAC)
Term
What form of access control is based on job descriptions?
Definition
Role Based access control (RBAC)
Term
What are two examples of single sign-on authentication solutions?
Definition
SESAME and Keberos
Term
Which of the following is not a characeristic of Keberos?

A. End to end security
B.Symmetric key cryptography
C. Peer to peer relationships
D. Data Encryption Standard
Definition
C. Peer to peer relationships
Term
What is another term for the type of logon credentials provided by a token device?
Definition
One-time password motha fucka
Term
Which of the following is the strongest form of multi-factor authentication?
A. Two passwords
B. Two-factor authentication
C. A password,a biometric scan, and a token device
D. A password and a biometric scan
Definition
C. A password, a biometric scan, and a token device
Term
Mutual authentication
Definition
A process by which each party in an online communication verifies the identity of the other party.
Term
Which of the following is not a form of biometric?
A. Token device
B. Face recognition
C. Retina scan
D. Finger print
Definition
A. Token Device
Term
What are two disadvantages of biometrics?
Definition
When used alone or solely, they are no more secure than a strong password. Also, they have a potential for numerous false rejections
Term
What form of authentication solution employs a hashed form of the user's password that has an assed time stamp as a form of identity?
Definition
Keberos
Term
What is the most important aspect of a biometric device?
Definition
Accuracy
Term
What is the strongest biometric factor?
Definition
A two factor authentication
Term
Which of the following is not an example of a single sign-on solution?
A. Scripted access
B. Keberos
C. Directory services
D. Workgroup
Definition
D. Workgroup
Term
Name two advantages single sign on (SSO) provide?
Definition
1. The elimination of multiple user accounts and passwords for an individual.
2. Access to all authhorized resources with a single instance og authentication.
Term
A smart card can be used to store all BUT which of the following items?
A. Digital signature
B. Biometric template original
C. Cryptography keys
D. Identifaction codes
Definition
B. Biometric template original
Term
Which teo of the following are requirements to deploy keberos on a network?
A. A centralized database of users and passwords
B. Time Syncronization between devices
C. Blocking of remote connectivity
D. Use of token devices and one-time passwords
E. A directory service
Definition
A. A centralized database of users and passwords
B. Time syncronization between devices
Term
Which of the following is NOT an important aspect of password management?
A. Enable account lockout
B. Prevent use of personal information in a password
C.Always store passwords in a secure medium
D. Training users to create complex passwords that use that are easy to remember
Definition
A. Enable account lockout
Term
In a variation of the brute force attack, an attacker may use a predefined list (dictionary) of commonly used usernames and passwords to gain access to existing user accounts. Which countermeasure best addresses this issue?
Definition
A strong password policy
Term
What is an example of privlage escalation?
Definition
Creeping privlages
Term
Which of the following is the least reliable means to clean or purge media?
A. Overwritting every sector with alternating 1's and 0's
B. OS low-level formatting
C.Drive controller hardware level formatting
D. Degaussing
Definition
D. Degaussing
Term
In a high society enviroment, what is the most important concern when a removable media is no longer needed?
Definition
Destruction
Term
In a high society enviroment, what is the most important concern when a removable media is no longer needed?
Definition
Destruction
Term
What type of cipher changes the POSITION of the characters in a plaintext message?
Definition
Transportation
Term
The Enigma machine, a crptographic tool introduced in 1944 and used in WW2, Encrypted messages by replacing characters for plaintext. What type of cipher does the Enigma machine use?
Definition
Substitution
Term
By definition, which security concept ensures that only authorized parties can access data?
Definition
Confidentiality
Term
In a cryptographic system, name two properties should initialization vector have?
Definition
Large, and unpredictable
Term
name two things that are true of triple DES (3DES)?
Definition
Is used in IPSEC, and it uses a 168-bit-key
Term
What is the is the most frequently used symmetric key stream sipher?
Definition
Ron's Cipher v4 (RC4)
Term
Which of the following is NOT true concerning symmetric key cryptograpghy?
A.Before communications begin, both parties must exchange the shared secret key
B.Key management is easy when imlemented on a large scale.
C.Each pair of communicating entities requires a unique shared key
D. The key is not shared with other communication partners
E. Both parties share the same key (which is kept secret)
Definition
B. Key management is easy when implemented on a large scale.
Term
What form of cryptography is best implemented in hardware?
Definition
Symmetric steam
Term
Name two Advanced Encryption Standard (AES) Symmetric block cipher?
Definition
AES uses a variable length block and key length (128-,192-, or 256-bit keys) and AES uses the Rijndael block cipher.
Term
Which of the following symmetric block ciphers does NOT use a variable block length?
A. Elliptic Curve (EC)
B. International Data Encryption Algorithm (IDEA)
C. Standard (AES)
D. Ron's Cipher v5 (RC5)
Definition
B. International Data Encryption Algorithm (IDEA)
Supporting users have an ad free experience!