COSC 25904

subject Type Homework Help
subject Pages 13
subject Words 1621
subject Authors Lawrie Brown, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
__________ controls access based on comparing security labels with security
clearances.
A. MAC
B. DAC
C. RBAC
D. MBAC
The wireless environment lends itself to a ______ attack because it is so easy for the
attacker to direct multiple wireless messages at the target.
A. DoS
B. man-in-the-middle
C. network injection
D. identity theft
A message store cannot be located on the same machine as the MUA.
page-pf2
A(n) __________ is a user who has administrative responsibility for part or all of the
database.
A. administrator
B. database relations manager
C. application owner
D. end user other than application owner
A _________ consists of a set of computers that interconnect by means of a relatively
unsecure network and makes use of encryption and special protocols to provide
security.
A. proxy
B. UTM
C. VPN
D. stateful inspection firewall
page-pf3
A _______ attack is where the input includes code that is then executed by the attacked
system.
A. SQL injection
B. cross-site scripting
C. code injection
D. interpreter injection
Unsolicited bulk e-mail is referred to as __________.
A. spam
B. propagating
C. phishing
D. crimeware
A ________ level breach of security could be expected to have a severe or catastrophic
adverse effect on organizational operations, organizational assets, or individuals.
A. low
page-pf4
B. moderate
C. normal
D. high
An example of a(n) __________ attack is one in which bogus reconfiguration
commands are used to affect routers and switches to degrade network performance.
A. identity theft
B. ad hoc network
C. network injection
D. man-in-the-middle
The ________ is a module that transmits the audit trail records from its local system to
the centralized audit trail collector.
A. audit dispatcher
B. audit analyzer
C. audit trail collector
page-pf5
D. none of the above
The _________ attack exploits the common use of a modular exponentiation algorithm
in RSA encryption and decryption, but can be adapted to work with any implementation
that does not run in fixed time.
A. mathematical
B. timing
C. chosen ciphertext
D. brute-force
The Secure Hash Algorithm (SHA) was developed by the _________ and published as
a federal information processing standard (FIPS 180) in 1993.
page-pf6
______ is the recommended technique for wireless network security.
A. Using encryption
B. Using anti-virus and anti-spyware software
C. Turning off identifier broadcasting
D. All of the above
A _________ is defined to be a portion of a row used to uniquely identify a row in a
table.
A. foreign key
B. query
C. primary key
D. data perturbation
The ______ process makes copies of data at regular intervals for recovery of lost or
corrupted data over short time periods.
A. logging
B. backup
page-pf7
C. hardening
D. archive
__________ allows an issuer to access regional and national networks that connect
point of sale devices and bank teller machines worldwide.
A. EFT
B. BTM
C. POS
D. ATF
_______ are ways for an awareness program to promote the security message to
employees.
A. Posters
B. Newsletters
C. Workshops and training sessions
D. All of the above
page-pf8
_________ are either individuals or members of a larger group of outsider attackers
who are motivated by social or political causes.
A. State-sponsored organizations
B. Activists
C. Cyber criminals
D. Others
Which of the following need to be taken into consideration during the system security
planning process?
A. how users are authenticated
B. the categories of users of the system
C. what access the system has to information stored on other hosts
D. all of the above
page-pf9
Security awareness, training, and education programs can serve as a deterrent to fraud
and actions by disgruntled employees by increasing employees' knowledge of their
________ and of potential penalties.
A. regulations
B. accountability
C. liability
D. incidents
The Packet Storm Web site includes a large collection of packaged shellcode, including
code that can:
A. create a reverse shell that connects back to the hacker
B. flush firewall rules that currently block other attacks
C. set up a listening service to launch a remote shell when connected to
D. all of the above
page-pfa
The __________ is what the virus "does".
A. infection mechanism
B. trigger
C. logic bomb
D. payload
The function of ________ was to transfer control to a user command-line interpreter,
which gave access to any program available on the system with the privileges of the
attacked program.
A. shellcode
B. stacking
C. no-execute
D. memory management
_______ should be located on the floor of computer rooms as well as under raised
floors, and should cut off power automatically in the event of a flood.
A. Smoke detectors
page-pfb
B. UPS
C. Water sensors
D. Equipment power off switches
A __________ is to try every possible key on a piece of ciphertext until an intelligible
translation into plaintext is obtained.
A. mode of operation
B. hash function
C. cryptanalysis
D. brute-force attack
A _______ policy states that violation of this policy may result in immediate
termination of employment or other discipline deemed appropriate by the company.
A. disciplinary action
B. company rights
C. policy scope
D. business use only
page-pfc
An area of a facility that has no security interest is classified as _________.
A. unrestricted
B. controlled
C. limited
D. exclusion
A _________ attack occurs when the input is used in the construction of a command
that is subsequently executed by the system with the privileges of the Web server.
A. command injection
B. SQL injection
C. code injection
D. PHP remote code injection
page-pfd
The ________ is responsible for determining if an intrusion has occurred.
A. analyzer
B. host
C. user interface
D. sensor
"Improper Access Control (Authorization)" is in the _________ software error category.
A. Porous Defenses
B. Allocation of Resources
C. Risky Resource Management
D. Insecure Interaction Between Components
Typically the systems in the _________ require or foster external connectivity such as a
corporate Web site, an e-mail server, or a DNS server.
A. DMZ
page-pfe
B. IP protocol field
C. boundary firewall
D. VPN
Confidentiality, Integrity, and Availability form what is often referred to as the _____.
The lowest layer of the IEEE 802 reference model is the __________ layer.
A traditional packet filter makes filtering decisions on an individual packet basis and
does not take into consideration any higher layer context.
page-pff
The ________ is an application or user who examines the audit trail and the audit
archives for historical trends, for computer forensic purposes, and for other analysis.
With _________ encryption the encryption process is carried out at the two end
systems.
The correct implementation in the case of an atomic operation is to test separately for
the presence of the lockfile and to not always attempt to create it.
page-pf10
The audit analyzer prepares human-readable security reports.
Without suitable synchronization of accesses it is possible that values may be corrupted,
or changes lost, due to over-lapping access, use, and replacement of shared values.
The U.S. legal system distinguishes three primary types of property: real property,
personal property, and _________ property.
Federated identity management makes use of a number of standards that provide the
building blocks for secure identity information exchange across different domains or
heterogeneous systems.
page-pf11
_______ or cybercrime, is a term used broadly to describe criminal activity in which
computers or computer networks are a tool, a target, or a place of criminal activity.
______ is detection of events within a given set of parameters, such as within a given
time period or outside a given time period.
A buffer overflow error is not likely to lead to eventual program termination.
page-pf12
The _________ is used to convey SSL-related alerts to the peer entity.
Human-caused threats are less predictable than other types of physical threats.
A security association is uniquely identified by three parameters: security parameter
index, protocol identifier, and ________________.
UNIX related systems provide the chroot system function to limit a program's view of
the file system to just one carefully configured section that is known as a ________.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.