Shared Flashcard Set

Details

midterm security
info security
100
Computer Science
Undergraduate 1
03/06/2018

Additional Computer Science Flashcards

 


 

Cards

Term
Smart phones give the owner of the device the ability to download security updates.
Definition
False
Term
Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?
Definition
HIPAA
Term
Successful attacks are usually not from software that is poorly designed and has architecture/design weaknesses.
Definition
False
Term
Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.
Definition
integrity
Term
One of the challenges in combating cyberterrorism is that many of the prime targets are not owned and managed by the federal government.
Definition
True
Term
According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024?
Definition
18
Term
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?
Definition
Advanced Persistent Threat
Term
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?
Definition
distributed
Term
What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?
Definition
identity theft
Term
Which of the following is a common security framework? (Choose all that apply.)
Definition
ISO RFC COBIT
Term
In information security, what can constitute a loss?
Definition
a delay in transmitting information that results in a financial penalty
the loss of good will or a reputation
theft of information
all of the above
Term
Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?
Definition
script kiddies
Term
What information security position reports to the CISO and supervises technicians, administrators, and security staff?
Definition
security manager
Term
The Security Administrator reports directly to the CIO.
Definition
False
Term
What process describes using technology as a basis for controlling the access and usage of sensitive data?
Definition
technical controls
Term
Which term below is frequently used to describe the tasks of securing information that is in a digital format?
Definition
information security
Term
What term describes a layered security approach that provides the comprehensive protection?
Definition
defense-in-depth
Term
What term is used to describe a group that is strongly motivated by ideology, but is usually not considered to be well-defined and well-organized?
Definition
hactivists
Term
A vulnerability is a flaw or weakness that allows a threat to bypass security.
Definition
True
Term
Which of the following are considered threat actors? (Choose all that apply.)
Definition
brokers
competitors
Term
What type of malware is heavily dependent on a user in order to spread?
Definition
virus
Term
Phishing is sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.
Definition
True
Term
How many different Microsoft Windows file types can be infected with a virus?
Definition
50
Term
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
Definition
A macro
Term
Select below the type of malware that appears to have a legitimate use, but contains something malicious:
Definition
Trojan
Term
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as a virus?
Definition
rootkit
Term
What specific science discipline do most social engineering attacks rely on when they are being used?
Definition
psychology
Term
A virus self-replicates on the host computer and spreads to other computers by itself.
Definition
False
Term
A remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols.
Definition
True
Term
What type of structure is used to provide instructions to infected bot computers?
Definition
command & control
Term
What social engineering principal frightens and coerces a victim by using threats?
Definition
intimidation
Term
Malware is software that enters a computer system with the user's knowledge or consent and then performs an unwanted and harmful action.
Definition
False
Term
A polymorphic virus changes its internal code to one of a set number of predefined mutations whenever it is executed.
Definition
False
Term
A rootkit can hide its presence, but not the presence of other malware.
Definition
False
Term
What specific type of phishing attack uses the telephone to target a victim?
Definition
vishing
Term
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks?
Definition
Easter egg
Term
Select the term used to describe tracking software that is deployed without the consent or control of the user.
Definition
spyware
Term
Two types of malware have the primary trait of circulation. These are viruses and worms.
Definition
True
Term
What type of ransomware displays a screen and prevents the user from accessing the computer's resources?
Definition
blocker ransomware
Term
What social engineering principal convinces a victim an immediate action is needed?
Definition
urgency
Term
One of the first popular symmetric cryptography algorithms was RSA.
Definition
False
Term
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
Definition
sponge
Term
What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
Definition
Blowfish
Term
The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?
Definition
substitution
Term
What alternative term can be used to describe asymmetric cryptographic algorithms?
Definition
public key cryptography
Term
Obfuscation is making something well known or clear.
Definition
False
Term
Which of the following asymmetric cryptography algorithms is most commonly used?
Definition
RSA
Term
When Bob needs to send Alice a message with a digital signature, whose private key is used to encrypt the hash?
Definition
Bob's private key
Term
What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?
Definition
full disk encryption
Term
Asymmetric cryptographic algorithms are also known as private key cryptography.
Definition
False
Term
What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?
Definition
hash
Term
What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?
Definition
PGP
Term
What type of cipher takes one character and replaces it with one character, working one character at a time?
Definition
stream cipher
Term
Which of the following are considered to be common asymmetric cryptographic algorithms? (Choose all that apply.)
Definition
Digital Signature Algorithm
Elliptic Curve Cryptography
Term
What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryptographic key?
Definition
HMAC
Term
Which of the following is not one of the functions of a digital signature?
Definition
protect the public key
Term
GNU Privacy Guard a proprietary software that runs on different operating systems.
Definition
False
Term
Data that is in an unencrypted form is referred to as which of the following?
Definition
cleartext
Term
What technology uses a chip on the motherboard of the computer to provide cryptographic services?
Definition
TPM
Term
The XOR cipher is based on the binary operation eXclusive OR that compares two bits.
Definition
True
Term
A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?
Definition
Certificate practice statement (CPS)
Term
Select the secure alternative to the telnet protocol:
Definition
SSH
Term
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?
Definition
bridge trust
Term
What protocol below supports two encryption modes: transport and tunnel?
Definition
IPSec
Term
What is used to create session keys?
Definition
master secret
Term
The Authentication Header (AH) protocol is a part of what encryption protocol suite below?
Definition
IPSec
Term
What block cipher mode of operation uses the most basic approach where the plaintext is divided into blocks, and each block is then encrypted separately?
Definition
Electronic Code Book
Term
What process links several certificates together to establish trust between all the certificates involved?
Definition
certificate chaining
Term
Which of the following is an input value that must be unique within some specified scope, such as for a given period or an entire session?
Definition
nonce
Term
SSL v3.0 served as the basis for TLS v1.0.
Definition
True
Term
Stream ciphers work on multiple characters at a time.
Definition
False
Term
What type of trust model is used as the basis for most digital certificates used on the Internet?
Definition
distributed trust
Term
What block cipher mode of operation encrypts plaintext and computes a message authentication code to ensure that the message was created by the sender and that it was not tampered with during transmission?
Definition
Galois/Counter
Term
What common method is used to ensure the security and integrity of a root CA?
Definition
Keep it in an offline state from the network.
Term
What is a value that can be used to ensure that plaintext, when hashed, will not consistently result in the same digest?
Definition
salt
Term
What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?
Definition
public web
Term
A framework for all of the entities involved in digital certificates for digital certificate management is known as:
Definition
public key infrastructure
Term
Digital certificates should last forever.
Definition
False
Term
What protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?
Definition
SSL
Term
Some CAs issue only entry-level certificates that provide domain-only validation.
Definition
True
Term
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?
Definition
DNS poisoning
Term
When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:
Definition
DNS
Term
Which SQL injection statement example below could be used to discover the name of the table?
Definition
whatever' AND 1=(SELECT COUNT(*) FROM tabname); --
Term
What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?
Definition
domain hijacking
Term
The exchange of information among DNS servers regarding configured zones is known as:
Definition
zone transfer
Term
What type of privileges to access hardware and software resources are granted to users or devices?
Definition
access rights
Term
What type of additional attack does ARP spoofing rely on?
Definition
MAC spoofing
Term
On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?
Definition
Privilege escalation
Term
A DNS amplification attack floods an unsuspecting victim by redirecting valid responses to it.
Definition
True
Term
What type of web server application attacks introduce new input to exploit a vulnerability?
Definition
injection attacks
Term
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
Definition
Session hijacking
Term
What protocol can be used by a host on a network to find the MAC address of another device based on an IP address?
Definition
ARP
Term
Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?
Definition
whatever' AND email IS NULL; --
Term
What language below is used to view and manipulate data that is stored in a relational database?
Definition
SQL
Term
Traditional network security devices can block traditional network attacks, but they cannot always block web application attacks.
Definition
True
Term
What specific ways can a session token be transmitted? (Choose all that apply.)
Definition
In the header of the HTTP requisition.
In the URL.
Term
Securing web applications is easier than protecting other systems.
Definition
False
Term
The malicious content of an XSS URL is confined to material posted on a website
Definition
False
Term
Choose the SQL injection statement example below that could be used to find specific users:
Definition
whatever' OR full_name LIKE '%Mia%'
Term
In an integer overflow attack, an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.
Definition
True
Supporting users have an ad free experience!