Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
information_security_test_questions_1.docx
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
49.23 Кб
Скачать

116. Centralized access control provides remote users with all of the following properties except

Availability

117. What are three principals of identification and authentication?

Something you know, something you are, something you have

118. Which technique monitors networks and computer systems for signs of intrusion or misuse?

FIREWALL

119. What is Galois Fields?

finite fields play a key role in cryptography

can show number of elements in a finite field

must be a power of a prime pn

120. Which of the following is a knowledge-based authentication mechanism?

Password

121. Restoring system to clean state

Reaction

122. What is prevention?

Prevention is creating conditions that promote good health. It is achieved by reducing those factors that are known to cause illness and problem behaviors (risk factors) and encouraging those factors that buffer individuals and promote good health (protective factors).

123. Administrative Assistants and Secretaries are particularly vulnerable to what type of attack?

Fishing

124. Using users distributed privileges or byexploiting system vulnerabilities

Worms

125. Which of the following is described as a potential event that could cause a compromise of security?

Security attack:

126. Which file extension would be most concerning if received as an email attachment?

vbs.

127. Typically spreads over a network

Worms

128. This is a document that states in writing how a company plans to protect the company's physical and IT assets

security policy

129. Spread using email with attachment containing a macro virus

Email Virus

130. This is a set of related programs, usually located at a network gateway server, that protects the resources of a private network from other networks.

FIREWALL

131. Interpreted by program using file – eg Word/Excel macros

  • Macro Virus macro code attached to some data file

132. This is a class of programs that searches your hard drive and floppy disks for any known or potential viruses.

antivirus software

133. Code embedded in legitimate program

Malware

134. A piece of self-replicating code attached to some other code

Computer Virus

135. Exploits known flaws in network systems

Zombie

136. This is the conversion of data into a ciphertext that cannot be easily understood by unauthorized people

encryption

137. To be effective, this should ideally contain at least one digit and not match a natural language word

password

138. A stream cipher, but it’s a much different beast from  A5/1.

RC4

139. This enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority

Public Key Infrastructure (PKI)

140.

One of the drawback of the OTP

The pad (key) is the same length as the message.

Pad must be securely transmitted to the recipient

before the ciphertext can be decrypted.

If we can securely transmit the pad, why not simply

transmit the plaintext by the same means?

For modern high data-rate systems, a one-time pad

cipher is totally impractical.

141. Other name of Vernam cipher?

One-time pad

142. The set of related monoalphabetic substitution rules  consists of the 26 Caesarciphers, with shifts of 0  through 25.