- __ deals with the ability to verify that a message has been sent and received and that the sender can be identified and verified. Nonrepudiation
- __ is a group-wide decision that frequently comes through rounds of group negotiation. Consensus
- __ is the term that has been created to refer to the special targeting of groups with something in common when launching a phishing attack. Spear phishing
- __ refers to the “hacking” of the systems and computers used by a telephone company to operate its telephone network. Phreaking
- ____ is basically spam delivered via an instant messaging application. SPIM
- _____ is the concept of separating items so that they cannot interfere with each other. Isolation
- _______ is a procedure that allows communicating parties to verify that received or stored messages are authentic. Message authentication
- _______ is a set of actions taken to properly utilize resources to target the actual threats an enterprise is facing. Threat intelligence
- A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) _______ Vulnerability
- A social engineer uses various deceptive practices to convince the targeted person to divulge information they normally would not divulge or to convince the target of the attack to do something they normally wouldn’t do. True
- Also referred to as single-key encryption, the universal technique for providing confidentiality for transmitted or stored data is _______ Symmetric encryption
- Another term for defense in depth is layered security. True
- Because of malware’s nefarious purpose, there is no criminal distinction between the writers of malware and those who release malware. False
- Because of the nature of trust and its high-risk opportunity, the sage advice is to develop and maintain a culture embracing trust. False
- Combining one byte at a time with the plaintext stream using the XOR operation, a __________ is the output of the pseudorandom bit generator. Keystream
- Criminal activity on the Internet, at its most basic, is quite different from criminal activity in the physical world. False
- Cryptanalytic attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. False
- Encapsulation is the concept of separating items so that they cannot interfere with each other. True
- Exception handling is an important consideration during software development. True
- How did the Code Red worm spread? It made use of a buffer-overflow condition in Microsoft’s IIS web servers that had been known for a month.
- If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to use longer keys
- Impersonation can be employed in online attacks. True
- In 2014, on how many different threat actors, including criminals, hactivists, state-sponsored groups, and nation states, did CrowdStrike report? 39
- In April 2009, Homeland Security Secretary Janet Napolitano told reporters China and Russia made attempts to break into the US electric power grid
- In many early cases of computer crime, the perpetrator of the crime intended to cause damage to the computer. False
- In most security circles, security through obscurity is considered a good approach, especially if it is the only approach to security. False
- In most security circles, security through obscurity is considered a good approach, especially if it is the only approach to security. False
- In the Biba security model, instead of security classifications, integrity levels are used. True
- In the Clark-Wilson security model, what are the two levels of integrity? Constrained data items (CDIs) and unconstrained data items (UDIs)
- In the early days of computers, security was considered to be a binary condition in which your system was either secure or not secure True
- Into which threat category does information warfare fall Highly Structured
- Into which threat category does information warfare fall? highly structured
- Like the MAC, a hash function also takes a secret key as input. False
- Melissa is the best known of the early macro-type viruses that attach themselves to documents for programs that have limited macro programming capability. True
- Most current ransomware attacks use a hybrid encrypting scheme, locking the files on a victim’s computer until a ransom is paid. True
- On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack. Half
- Public-key algorithms are based on simple operations on bit patterns. False
- The ________ threat category contains threats that are characterized by a greater amount of planning, a longer period of time to conduct the activity, more financial backing to accomplish it, and possibly corruption of, or collusion with, insiders. Structured
- The ________ threat category contains threats that are characterized by a much longer period of preparation (years is not uncommon), tremendous financial backing, and a large and organized group of attackers. Highly structured
- The act of deliberately accessing computer systems and networks without authorization is generally referred to as hacking
- The advantage of a stream cipher is that you can reuse keys. False
- The entity that implements a chosen security policy and enforces those characteristics deemed most important by the system designers is known as the __________. Security Model
- The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the AES
- The principle of open design holds that the protection of an object should rely upon secrecy of the protection mechanism itself. False
- The purpose of a __________ is to produce a “fingerprint” of a file, message, or other block of data. hash function
- The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages. Diffie-Hellman Key Agreement
- The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm. True
- The term “________” refers to whether a control can be verified to be functioning properly. Auditability
- The term “script kiddies” refers to A hacker of low-end technical ability.
- Time can be manipulated to drive a sense of ________ and prompt shortcuts that can lead to opportunities for interjection into processes. Urgency
- Today, the data stored and processed by computers is almost always more valuable than the hardware. True
- Transmitted data stored locally are referred to as data at rest
- Two of the most important applications of public-key encryption are digital signatures and key management. True
- What are the policies of the Biba model? No read down, no write up, and no executing programs up
- What are the policies of the Biba model? Ring (no read down) and Low-Water-Mark (no write up)
- What are the three operational tenets found in secure deployments? Session management, exception management, and configuration management
- What are the three types of accounting records in TACACS+? START, STOP, and UPDATE
- What concept allows us to understand the relationship between prevention, detection, and response? time-based security
- What is one of the most fundamental principles in security? Least Privilege
- What name was given to an intellectual property attack executed against oil, gas, and petrochemical companies in the United States? Operation Night Dragon
- What name was given to an intellectual property attack executed against oil, gas, and petrochemical companies in the United States? Operation Night Dragon
- What name was given to the advanced persistent threat (APT) style spy network responsible for bugging the Dalai Lama’s office? GhostNet
- What name was given to the advanced persistent threat (APT)-style spy network responsible for bugging the Dalai Lama’s office? GhostNet
- What security design principle states that secrecy itself cannot be relied upon as a means of protection? open design
- What target did the teenage hacker who went by the name “Jester” attack in March 1997? He cut off telephone services to the FAA control tower as well as the emergency services at the Worcester Airport and the community of Rutland, Massachusetts.
- What was the primary lesson learned from the Slammer worm? It drove home the point that the Internet could be adversely impacted in a matter of minutes.
- What was the primary lesson learned from the Slammer worm? It drove home the point that internet could be adversely impacted in a matter of minutes.
- When an attacker uses a(n) ________ technique, the attacker assumes a role that is recognized by the person being attacked, and in assuming that role, the attacker uses the potential victim’s biases against their better judgment to follow procedures. Impersonation
- Where do changes in trust occur? At the trust boundary.
- Which brand-name attack group consists of Russian hackers who have brought major issues to Ukraine via numerous attacks over the past couple of years? Sandworm
- Which confidentiality model is defined by controlling read and write access based on conflict of interest rules Brewer-Nash security model
- Which confidentiality model is defined by controlling read and write access based on conflict of interest rules? Brewer-Nash security model
- Which equation describes the operational model of security? Protection = Prevention + (Detection + Response)
- Which Internet criminal is famous for conducting his attacks using a number of different “tools” and techniques, including social engineering, sniffers, and cloned cellular telephones?
B. Kevin Mitnick Kevin Mitnick - Which Internet worm created infected systems that were part of what is known as a bot network (or botnet) and could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users? Conficker
- Which Internet worm, released in 1988, is considered to be one of the first real Internet crime cases? The Morris Worm
- Which Internet worm, released in 1988, is considered to be one of the first real Internet crime cases? The Morris Worm
- Which of the following devices is a sophisticated countermeasure to piggybacking? a man trap
- Which poor security practice is one of the most common and most dangerous? choosing poor passwords
- Which security model uses transactions as the basis for its rules? Clark-Wilson
- Which security principle is characterized by the use of multiple, different defense mechanisms with a goal of improving the defensive response to an attack? defense in depth
- Which security principle is described as always using simple solutions when available? economy of mechanism
- Which security principle refers to the concept that each and every request should be verified? Complete mediation
- Which security principle states that if you have not specifically been allowed access, then it should be denied? Implicit deny
- Which statement accurately describes how pharming is accomplished? The attacker modifies the host files, which are used to convert the URLs to the appropriate IP address, so that the user is directed to a fake website.
- Which statement applies to viruses? They typically are highly visible once released.
- Which statement applies to viruses? They are typically highly visible once released.
- Which statement describes an example of a poor security practice? An employee creates a strong password and then uses it for all accounts.
- Which statement describes how dumpster diving is accomplished? An attacker attempts to find little bits of information that could be useful for an attack in a target’s trash can.
- Which statement describes how piggybacking is accomplished? An attacker follows closely behind a person who has just used their own access card or PIN to gain physical access to a room or a building.
- Which term describes a means of separating the operation of an application from the rest of the operating system? Sandboxing
- Which term describes an attack that changes URLs in a server’s domain name table? DNS poisoning
- Which term describes the process where individuals analyze the binaries for programs to discover embedded passwords or cryptographic keys? Reverse-engineering
- Which term is used when separation of privilege is applied to people? separation of duties
- Which term refers to an attack conducted against a site with software that is vulnerable to a specific exploit? Target of opportunity
- Which term refers to an attack conducted against a site with software that is vulnerable to a specific exploit? Target of opportunity attack
- Which term refers to making different layers of security dissimilar so that even if attackers know how to get through a system that comprises one layer, they may not know how to get through a different type of layer that employs a different system for security? Diversity of defense
- Which term refers to the design and operation of elements to ensure the proper functional environment of a system? Configuration Management
- Who is considered to be the ultimate insider, with his name being synonymous with the insider threat issue? Edward Snowden
Other Links:
See other websites for quiz:
Check on QUIZLET
