Deck 19: Computer and Network Security Techniques
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 19: Computer and Network Security Techniques
1
The WiFi standard known as Privacy with message integrity can be described as follows:
A)a way of ensuring the privacy of the individual using WiFi
B)a technique that ensures that the data transmitted using WiFi have not been altered
C)a way of providing mutual authentication between a user and an AS
D)none of the above
A)a way of ensuring the privacy of the individual using WiFi
B)a technique that ensures that the data transmitted using WiFi have not been altered
C)a way of providing mutual authentication between a user and an AS
D)none of the above
B
2
An uncontrolled port allows the exchange of PDUs between a supplicant and other systems on the LAN only if the current state of the supplicant authorizes such an exchange.
False
3
Generic decryption (GD)technology enables the antivirus program to easily detect even the most complex polymorphic viruses while maintaining fast scanning speeds.
True
4
Ipsec is based primarily upon the DES standard.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
IEEE 802.11i consists of two main functions: authentication and access control.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
A key logical component of an IDS is:
A)sensors
B)analyzers
C)user interface
D)all of the above
A)sensors
B)analyzers
C)user interface
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Two important SSL concepts are the SSL session and the SSL connection.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The primary benefit of a host-based IDS is that it can detect both external and internal intrusions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
A stateful inspection firewall ________.
A)applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet
B)controls TCP traffic by creating a directory of outbound TCP connections
C)acts as a relay of application-level traffic
D)sets up two TCP connections,one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host
A)applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet
B)controls TCP traffic by creating a directory of outbound TCP connections
C)acts as a relay of application-level traffic
D)sets up two TCP connections,one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Transport mode in IPSec provides protection to the entire IP packet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
The higher-layer protocols defined as part of SSL include:
A)handshake protocol
B)change cipher spec protocol
C)alert protocol
D)all of the above
A)handshake protocol
B)change cipher spec protocol
C)alert protocol
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Typically,a firewall is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
The Host-based IDS monitors network traffic for particular network segments or devices and analyzes network,transport, and application protocols to identify suspicious activity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
IPSec transport mode provides protection primarily for:
A)the Internet layer
B)upper-layer protocols
C)network and link-layer protocols
D)all of the above
A)the Internet layer
B)upper-layer protocols
C)network and link-layer protocols
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
SSL performs encryption first,followed by computing a message authentication code.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
A typical use of circuit-level gateways is a situation in which the system administrator trusts the internal users.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
IPSec provides authentication,encryption,and key exchange functions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
A security intrusion is defined as a successful attempt by a user to gain access to a system or system resource without proper authorization.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Ports are logical entities defined within the authenticator and refer to physical network connections.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
Most organizations agree that __________ become their worst security problem.
A)their own users
B)intrusions
B)viruses
D)managers
A)their own users
B)intrusions
B)viruses
D)managers
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
At _________ the IP header is exposed and so filtering or firewalls can be applied to IP addresses.
A)layer 1
B)layer 2
C)layer 3
D)layer 4
A)layer 1
B)layer 2
C)layer 3
D)layer 4
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
A __________ is a security service that monitors and analyzes system events for the purpose of finding,and providing real-time or near-real-time warning of, attempts to access system resources in an unauthorized manner.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is not a central element of a typical antivirus scheme?
A)detection
B)identification
C)removal
D)deterrence
A)detection
B)identification
C)removal
D)deterrence
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
The IPsec Architecture document mandates support for two types of key management: manual and ___________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
An IDS comprises three logical components: sensors,user interface,and _______.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
__________ is a monitored behavior.
A)Attempts to open,view,delete,and / or modify files
B)Attempts to format disk drives and other unrecoverable disk operations
C)Modification to the logic of executable files or macros
D)All of the above
A)Attempts to open,view,delete,and / or modify files
B)Attempts to format disk drives and other unrecoverable disk operations
C)Modification to the logic of executable files or macros
D)All of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is a higher-layer protocol defined as part of SSL?
A)the Handshake Protocol
B)the Change Cipher Spec Protocol
C)the Alert Protocol
D)all of the above
A)the Handshake Protocol
B)the Change Cipher Spec Protocol
C)the Alert Protocol
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The SSL Record Protocol provides two services for SSL connections: confidentiality and ___________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The ________________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
A ____________ is a security event,or a combination of multiple security events, that constitutes a security incident in which an intruder gains,or attempts to gain,access to a system (or system resource)without having authorization to do so.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The ideal solution to the threat of viruses is:
A)detection
B)prevention
C)identification
D)removal
A)detection
B)prevention
C)identification
D)removal
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
Which security area is addressed in IEEE 802.11i ?
A)authentication
B)key management
C)data transfer privacy
D)all of the above
A)authentication
B)key management
C)data transfer privacy
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The 802.11i architecture consists of ________ main ingredients.
A)one
B)two
C)three
D)four
A)one
B)two
C)three
D)four
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
IP-level security encompasses three functional areas: authentication, confidentiality,and _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
A(n)__________ looks for user behavior that differs from that expected from a legitimate user.
A)ACK
B)IDS
C)SSL
D)TLS
A)ACK
B)IDS
C)SSL
D)TLS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The _________ mechanism assures that a received packet was,in fact,transmitted by the party identified as the source in the packet header
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
In order to accelerate the introduction of strong security into WLANs,the Wi-Fi Alliance promulgated __________ as a Wi-Fi standard.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
The most complex part of SSL is the ___________ Protocol.
A)Handshake
B)Change Cipher Spec
C)Alert
D)Record
A)Handshake
B)Change Cipher Spec
C)Alert
D)Record
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
_________ mode is used when at least one of the two ends is a security gateway, such as a firewall or router,that implements IPsec.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
___________ is a set of protocols for providing encryption,authentication,and key management for IP.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The Secure Sockets Layer (SSL)and the follow-on Internet standard known as __________ provide a reliable end-to-end secure transport service over TCP.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
A _________ is a hardware or software entity inserted between a system or network to be protected and the Internet or other outside access network to control traffic in both directions to enforce a security policy.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
____________ integrates with the operating system of a host computer and monitors program behavior in real time for malicious actions and then blocks potentially malicious actions before they have a chance to affect the system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
Malware defense can involve a combination of prevention,__________,and removal.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck