Shared Flashcard Set

Details

ITIS 3200 Midterm 2
authQ - applicationQ
80
Computer Science
Undergraduate 3
10/30/2016

Additional Computer Science Flashcards

 


 

Cards

Term
In biometrics authentication, one way to avoid the potential difficulties associated with having users eventually becoming unrecognizable is to update their template after a successful authentication. This process is called:
Definition
Adaptation
Term
During what operation, does a biometric system collect captured biometric data and a claimed identity and determine whether or not the captured biometric data matches the template saved for the identity?
Definition
Answer: None of the above
Error correction
Template adaptation
SAN protocol
Enrollment
Term
Which of the following biometrics methods is the least accurate?
Definition
Voice
Term
Which of the following method can be used to clone a fingerprint
Definition
Used wine class
Cell phone
Photos
Door knobs
Correct! All of the above
Term
Why password based authentication can be expensive
Definition
Resetting passwords is an expensive manual process
Term
Which of the following categories does authentication using site key fall under?
Definition
It is not a full authentication method, but can be used help identify phishing sites
Term
One time password authentication can be easily compromised by
Correct!
Definition
Using a phishing website
Term
Security risks to a system that uses two factor authentication based on a text message include:
Definition
The person being authenticated may have misplaced cell phone, someone else can get the message

The cell phone is out of battery

Cell phone OS has a vulnerability that can be exploited by an app to steal text messages

Correct! All of the above (a-c)
Term
A man-in-the middle attack can be successful against the following authentication methods
Definition
One time password
Two factor authentication with a text message
Site key
Correct! All of the above (a-c)
Term
The use of captcha to distinguish a person from a computer program can be easily defeated by
Definition
Fake web site and man-in-the middle attack
Term
The geographical location of a subject can be revealed by
Definition
Phishing
Clickjacking
Social engineering
Man in the middle attacks
Correct! All of the above
Term
What is the best practice to protect passwords
Definition
Use a best practice algorithm to hash the password
Term
A false positive for biometric authentication means
Definition
An angry customer whose account was accessed by an attacker
Term
Which of the following two factor authentication scheme would you recommend
Definition
User id, password, and one time code
Term
Which of the following is true related to a subject?
Definition
The subject is always the entity that receives information about or data from an object
Term
What can you use to prevent users from rotating between two passwords?
Definition
Password history
Term
Which of the following provides authentication based on a physical characteristic of a subject?
Definition
Biometrics
Term
What is a mechanical form and can be thought of as physical access to a room with a key?
Definition
Physical access control
Term
What is a secure method for authenticating a request for a service in a network?
Definition
Kerberos
Term
Which of the following would NOT be an asset that an organization would want to protect with access control?
Definition
Information
Systems
Devices
Facilities
Correct! None of the above
Term
Which of the following is true related to a subject?
Definition
The subject is always the entity that receives information about or data from an object
Term
Which of the following types of access control uses fences, security policies, security awareness training, and antivirus software to stop an unwanted or unauthorized activity from occurring?
Definition
Preventive
Term
Which of the following BEST describes the primary goal when controlling access to assets?
Definition
Preserves confidentiality, integrity, and availability of systems and data
Term
A user logs in with a login ID and a password. What is the purpose of the login ID?
Definition
Identification
Term
Which of the following BEST identifies the benefit of a pass phrase?
Definition
It is easy to remember
Term
Your organization issues devices to employees. These devices generate one-time passwords every 60 seconds. A server hosted within the organization knows what this password is at aby given time. What type of device is this?
Definition
Synchronous token
Term
Which of the following provides authentication based on a physical characteristic of a subject?
Definition
Biometrics
Term
What does the crossover error rate (CER) for a biometric device indicate?
Definition
It indicates the point where the false rejection rate equals the false acceptance rate
Term
What is the primary purpose of Kerboros?
Definition
Authentication
Term
What could have discovered problems with this user’s account while he was employed?
Definition
Account review
Term
Which of the following BEST describes the explicit deny principle?
Definition
All actions that are not expressly allowed are denied
Term
What is the intent of least privileges?
Definition
Enforce the most restrictive rights required by users to complete assigned tasks
Term
A table includes multiple objects and subjects and it identifies the specific access each subject has to different objects. What is this table?
Definition
Access control matrix
Term
Who, or what, grants permissions to users in a discretionary access control model?
Definition
The data custodian
Term
Which of the following models is also known as an identity-based access control model?
Definition
Discretionary access control
Term
A central authority determines which files or a user can access. Which of the following best describes this?
Definition
Nondiscretionary access control
Term
A central authority determines which files a user can access based on organization’s hierarchy. Which of the following best describes this?
Definition
Role-based access control
Term
Which of the following statements is true related to the role-based access control (RBAC) model?
Definition
A RBAC model allows users membership in multiple groups
Term
Which of the following is the BEST choice for a role within an organization implementing a RBAC access control model?
Definition
Programmer
Term
Which of the following can help mitigate the success of an online brute-force attack?
Definition
Account lockout
Term
Values monitored for unexpected changes to files or configuration items include the following?
Definition
Privileges and security settings
Content
Core attributes and size
Correct! All of the above (a-c)
Term
What phase focuses on attack surface analysis?
Definition
Analyze
Term
What describes the product capabilities of gathering, analyzing, and presenting information from network and security devices; identify and access management applications; vulnerability management and policy compliance tools, operating system, database, and application logs; and external threat data?
Correct!
Definition
Security Information Event Management
Term
What is it called when SIEM/LM tools take event data and turn it into informational charts to assist in seeing patters, or identifying activity that is not forming a standard pattern?
Definition
Dashborads
Term
What is the most likely reason for choosing to use HEAD requests instead of GET requests when scanning for the presence of vulnerable web-based applications?
Definition
Attacker is doing an efficient scan of a large number of hosts looking for meta information on requested resources
Term
What are parts of a time stamp except that
Definition
Cryptographic hash as a stamp
Term
What is the purpose of implementing full-packet capture devices?
Correct!
Definition
Capture and record all network traffic
Term
What are the exceptions of full packet capture?
Definition
Smart phones
Dumb phones
Encrypted traffic
Storage device and media
Correct! All of the above
Term
A Demyo plug performs the following,
Definition
Provides cell connectivity for an attacker to remotely control the device and performs attacks against devices with wireless communication capabilities

Provides cell connectivity for attackers to remotely control the device and performs attacks against corporate network devices that is plugged into the same electric system as the Demyo plug

Attacks GSM communication systems by hijacking cell tower signals

Correct! None of the above
Term
Enabled promiscuous mode on a network interface is a suspicious event because
Definition
Computers can read frames intended for other machines or network devices
Term
Which devices can locate wireless signals within a certain range, where they can siphon off the data being transmitted over the signals?
Correct!
Definition
Wireless sniffers
Term
You can expect to have continued problems maintaining good network security awareness. Keep it simple. You need to draft some policies that define your network and its basic architecture. A good place to start is by asking the following questions, except which one?
Definition
Will internal users be accessing the network, and if so, how many?
Term
The latest trend to emerge in the network intrusion prevention arena is referred to as:
Definition
Unified threat management
Term
Which of the following are true:
Definition
Motive for cyber-attacks can be mainly attributed to financial and political. Attackers are often after the stealing data.
Term
Vulnerability scanning objectives include the following:
Definition
Assess risk faced components include: network risk, application risk, and host risks
Term
Which of the following is true
Definition
Audit’s primary objective include: making sure security policies are followed, identify violations and damage after attack, and provide input to recover from attack
Term
When a user is granted access to resources on a computing system, it is of vital importance to establish and verify the identity of the requesting entity. This process sis commonly referred to as:
Definition
Authentication
Term
The login process is a system daemon that is responsible for coordinating authentication and process setup for interactive users. To do this, the login process does the following, except which one?
Definition
Present the user credential to only one of the configured user databases (typically, these can be files, NIS, kerberros servers, or LDAP directories) for authentication. *
Term
What was introduced to simplify the administration of small groups of computers?
Definition
Network Information System
Term
The most sensible alternative to the traditional interactive session protocols such as Telnet is the:
Definition
Secure Shell (SSH) system
Term
What allows for the loading of additional drivers for file systems?
Definition
File systems in user space
Term
What can be seen as another way to reduce the attack surface area?
Definition
Access control
Term
Information is vulnerable as it flows across the network, unless it is:
Definition
Encrypted
Term
The Unix group mechanism allows for a single user to belong to one or more:
Definition
Groups
Term
Even after hardening a Unix system with restrictive user permissions and ACLs, it is important to maintain logs of:
Definition
System activities
Term
An additional source of audit trail data about system activities is the history logs kept by a login shell such as:
Definition
Bash
Term
What is a mechanical form and can be thought of as physical access to a room with a key?
Definition
Physical access control
Term
What might involve confirming the identity of a person or software program?
Definition
Authentication
Term
What requires every device to supply a pre-shared key (PSK) derived from a passphrase?
Definition
WPA2-Personal
Term
What is an authentication scheme used by point-to-point protocol (PPP) hosts to authorize the identity of remote users and clients?
Definition
Challenge-Handshake Authentication Protocol (CHAP)
Term
The following statements about session management are true except this one
Definition
Session id is stored in a cookie and it is retrieved by the server upon request
Term
The following statements about direct object reference are true except this one
Definition
Application should encrypt objects so that they cannot be directly accessed
Term
White list based input validation is preferred over black list input validation because
Definition
It is difficulty to make sure that all bad input are listed
Term
Which of the following about running an application in a sandbox is true?
Definition
Browsers, virtual machines, and unix jails are all examples of sandboxes to isolate applications from one another so that if one of them is malicious it would not be able to compromise applications running in other sandboxes
Term
Which of the following is true with respect to the “heart bleed” vulnerability in OpenSSL
Definition
Developers using OpenSSL should have erased memory containing secret information
Term
Which of the following are true about logging
Definition
Only two of the above are true
Term
Including native library calls, which of the following languages can lead to buffer overflow vulnerabilities?
Definition
All of the above
Term
What programming languages are native libraries for Windows written in?
Definition
C
Term
Which of the following security properties does SQL injection violate
Definition
Confidentiality, Integrity, and Availability
Term
Which of the following security properties does CSRF violate
Definition
Integrity only
Supporting users have an ad free experience!