What is a worm - Answers Malware
An attempt by a threat agent to exploit assets without permission is referred to as - Answers an
attack
This yields a more specific set of attacks tied to our particular threat agents - Answers attack matrix
CIA properties do not include - Answers authentication
AUP stands for - Answers acceptable use policy
Zero Day vulnerability is one that has been reported to the software's vendor and the general public -
Answers false
A person skilled in attacking computer systems, who uses those skills as a security expert to help
protect systems is a - Answers white hat hacker
A security analyst is performing a security assessment, the analyst should not - Answers take action
to mitigate a serious risk
victims can protect themselves against zero day attacks - Answers false
When you analyze a system using the six-phase security process you are performing a - Answers risk
assessment
An attack in which someone tries to trick a system administrator into divulging a password is called -
Answers social engineering
authentication does what - Answers associated and individual with and identity
An authentication system that requires the user to provide two different passwords and a fingerprint
scan is an example of - Answers two-factor authentication
there are three types of tokens they do not include - Answers offensive tokens
the most recent list hash algorithm is what - Answers SHA-512
The following are associated with a weak threat except - Answers all are associated with weak threats
Hashing - Answers transforms readable text into gibberish
in a password system the total number of possible passwords is - Answers search space
An attack the blocks access to a system by other users is called - Answers denial of service
something you know, something you have and something you are....something you make is not -
Answers fundamental strategies for authenticating people
The type of cypher that rearranges the text of a message is called a - Answers transposition cipher
The Enigma was - Answers a rotor machine
File encryption on a computers hard drive involves what risk - Answers all of the answers
Hiding an object, such as a diary to prevent other from finding it is an example of - Answers security
through obscurity
Encryption protects information by presenting - Answers a key
AES was introduced in - Answers 2002
AN encryption algorithm that uses the same key for both encryption and decryption is - Answers
symmetric
to use symmetric cryptography , the sender and receiver must share - Answers a secret key
Moore's Law observed that computing power will double every - Answers 18 months
The process of decrypting is - Answers Cryptanalysis
Digital signatures are often used to provide - Answers Nonrepudiation
In diffie helllman calculation using P=g^s mod N, s= - Answers the private key value
An Advanced Encryption Standard (AES) key may not be - Answers 16 bits
Encrypting an encryption key using a passphrase is called - Answers Key wrapping
A public key certificate generally does not contain - Answers A private key
SHA-1 produces a _________ bit message digest, which can then be used as an input to a digital
algorithm. - Answers 160
Using the Diffie-Hellman algorithm - Answers both participants in the exchange must have a
public/private key pair
What was the first web browser to use public key certificates - Answers Netscape Navigator
PGP implemented a ________________ making it so that no single persosn was universally trusted to
sign certificates - Answers Web of trust
The method used to encrypt with multiple ciphers is called - Answers KEK
What is SCADA associated with? - Answers Utilities
What does CIA stand for? - Answers confidentiality, Integrity, availibity