
- •15. Which type of encryption occurs between original source and final destination?
- •Verses 26 for a monoalphabetic
- •45. What key length does aes not support?
- •Internet Security
- •56. The Caesar Cipher is an example of what kind of cipher?
- •Violates computer security for little reason beyond maliciousness or for personal gain
- •78. Which of the following is a disadvantage of asymmetric cryptology?
- •83. Which of the following is a disadvantage of asymmetric cryptology?
- •89. Which of the following allows attackers to break passwords?
- •90. What is Denial of Service in Threat Modeling?
- •116. Centralized access control provides remote users with all of the following properties except
- •117. What are three principals of identification and authentication?
- •120. Which of the following is a knowledge-based authentication mechanism?
- •135. Exploits known flaws in network systems
- •Vigenere cipher
- •Vulnerability
- •192. Which term relates specifically to the art and science of code breaking?
- •194. Which of the following is a disadvantage of asymmetric cryptology?
- •Is a system in which a private key generated randomly is used only once to encrypt a message that is then decrypted by the receiver using a matching one-time pad and key.
116. Centralized access control provides remote users with all of the following properties except
Availability
117. What are three principals of identification and authentication?
Something you know, something you are, something you have
118. Which technique monitors networks and computer systems for signs of intrusion or misuse?
FIREWALL
119. What is Galois Fields?
finite fields play a key role in cryptography
• can show number of elements in a finite field
must be a power of a prime pn
120. Which of the following is a knowledge-based authentication mechanism?
Password
121. Restoring system to clean state
Reaction
122. What is prevention?
Prevention is creating conditions that promote good health. It is achieved by reducing those factors that are known to cause illness and problem behaviors (risk factors) and encouraging those factors that buffer individuals and promote good health (protective factors).
123. Administrative Assistants and Secretaries are particularly vulnerable to what type of attack?
Fishing
124. Using users distributed privileges or byexploiting system vulnerabilities
Worms
125. Which of the following is described as a potential event that could cause a compromise of security?
Security attack:
126. Which file extension would be most concerning if received as an email attachment?
vbs.
127. Typically spreads over a network
Worms
128. This is a document that states in writing how a company plans to protect the company's physical and IT assets
security policy
129. Spread using email with attachment containing a macro virus
Email Virus
130. This is a set of related programs, usually located at a network gateway server, that protects the resources of a private network from other networks.
FIREWALL
131. Interpreted by program using file – eg Word/Excel macros
Macro Virus macro code attached to some data file
132. This is a class of programs that searches your hard drive and floppy disks for any known or potential viruses.
antivirus software
133. Code embedded in legitimate program
Malware
134. A piece of self-replicating code attached to some other code
Computer Virus
135. Exploits known flaws in network systems
Zombie
136. This is the conversion of data into a ciphertext that cannot be easily understood by unauthorized people
encryption
137. To be effective, this should ideally contain at least one digit and not match a natural language word
password
138. A stream cipher, but it’s a much different beast from A5/1.
RC4
139. This enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority
Public Key Infrastructure (PKI)
140.
One of the drawback of the OTP
The pad (key) is the same length as the message.
● Pad must be securely transmitted to the recipient
before the ciphertext can be decrypted.
● If we can securely transmit the pad, why not simply
transmit the plaintext by the same means?
● For modern high data-rate systems, a one-time pad
cipher is totally impractical.
141. Other name of Vernam cipher?
One-time pad
142. The set of related monoalphabetic substitution rules consists of the 26 Caesarciphers, with shifts of 0 through 25.