Deck 15: Computer Security Techniques
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 15: Computer Security Techniques
1
Anomaly approaches attempt to define proper behavior.
False
2
__________ controls access based on comparing security labels with security clearances.
A) RBAC
B) DAC
C) MAC
D) ACM
A) RBAC
B) DAC
C) MAC
D) ACM
C
3
A password cracker is a password guessing program.
True
4
The __________ determines whether the user is authorized to gain access to a system and the privileges accorded to the user.
A) RBAC
B) ID
C) IDS
D) DAC
A) RBAC
B) ID
C) IDS
D) DAC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Smart tokens include an embedded __________ .
A) PIN
B) memory card
C) IDS
D) microprocessor
A) PIN
B) memory card
C) IDS
D) microprocessor
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
The _________ prevents duplicate passwords from being visible in the password file.
A) access control
B) rootkit
C) salt
D) hash
A) access control
B) rootkit
C) salt
D) hash
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The success of the digital immune system depends on the ability of the virus analysis machine to detect new and innovative virus strains.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Passwords serve to authenticate the ID of the individual logging on to the system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Once a worm is resident on a machine, antivirus software cannot be used to detect it.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
An important feature of Windows security is that applications can make use of the Windows security framework for user-defined objects.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
DAC is a concept that evolved out of requirements for military information security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
For user authentication to computer, the most important category of smart token is the smart card.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
An effective IDS can serve as a deterrent, thus acting to prevent intrusions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Rootkits are easy to detect and neutralize.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
When a file containing a polymorphic virus is executed, the virus must decrypt itself to activate.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Memory cards can store and process data.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
With a _________ protocol, the user authenticates himself or herself to the token and then the token authenticates the user to the computer.
A) challenge
B) response
C) static
D) dynamic password generator
A) challenge
B) response
C) static
D) dynamic password generator
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
In the case of a challenge-response protocol the token generates a unique password periodically.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
A user only needs a password in order to log on to a UNIX system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Traditional DAC systems define the access rights of individual users and groups of users.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
Virtually all multiuser systems, network-based servers, Web-based e-commerce sites, and other similar services require that a user provide not only a name or identifier (ID) but also a _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
A hashed password technique typically combines the password with ___________ .
A) a user name
B) a salt value
C) an encryption key
D) a smart card
A) a user name
B) a salt value
C) an encryption key
D) a smart card
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Authentication protocols used with smart tokens are classified into three categories: static, dynamic password generator, and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
__________ involves an attempt to define a set of rules or attack patterns that can be used to decide that a given behavior is that of an intruder.
A) Signature detection
B) Anomaly detection
C) Profile based detection
D) Threshold detection
A) Signature detection
B) Anomaly detection
C) Profile based detection
D) Threshold detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
An antiworm approach that blocks outgoing traffic when a threshold is exceeded is referred to as _________ .
A) rate limiting
B) rate halting
C) source based scanning
D) threshold random walk detection
A) rate limiting
B) rate halting
C) source based scanning
D) threshold random walk detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
__________ add a specialized layer of security software to vulnerable or sensitive systems; examples include database servers and administrative systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
__________ integrates with the operating system of a host computer and monitors program behavior in real time for malicious actions.
A) Intrusion detection
B) Fingerprint based scanners
C) Behavior blocking software
D) Heurisics
A) Intrusion detection
B) Fingerprint based scanners
C) Behavior blocking software
D) Heurisics
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
__________ is based on pattern recognition.
A) Password authentication
B) Biometrics
C) Token based authentication
D) Salt value
A) Password authentication
B) Biometrics
C) Token based authentication
D) Salt value
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
__________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled.
A) Bot countermeasures
B) Compile-time defenses
C) Behavior blocking software
D) Digital immune systems
A) Bot countermeasures
B) Compile-time defenses
C) Behavior blocking software
D) Digital immune systems
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
__________ controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
An __________ dictates what types of access are permitted, under what circumstances, and by whom.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
__________ technology enables the antivirus program to easily detect even the most complex polymorphic viruses while maintaining fast scanning speeds.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
_________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
_________ is not a central element of a typical antivirus scheme.
A) Identification
B) Removal
C) Detection
D) Deterrence
A) Identification
B) Removal
C) Detection
D) Deterrence
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
__________ is based on the roles that users assume in a system rather than the user's identity.
A) DAC
B) ACM
C) RBAC
D) MAC
A) DAC
B) ACM
C) RBAC
D) MAC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The primary purpose of a(n) _________ is to detect intrusions, log suspicious events, and send alerts.
A) smart card
B) DAC
C) antivirus
D) IDS
A) smart card
B) DAC
C) antivirus
D) IDS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The motivation for the development of the __________ has been the rising threat of Internet-based virus propagation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
Objects that a user possesses for the purpose of user authentication are called _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
_________ controls access based on the identity of the requestor and on access rules (authorizations) stating what requestors are (or are not) allowed to do.
A) Role-based access control
B) Access control
C) Discretionary access control
D) Mandatory access control
A) Role-based access control
B) Access control
C) Discretionary access control
D) Mandatory access control
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The two broad categories of approaches to dealing with buffer overflow attacks are run-time defenses and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
One of the best known protection mechanisms is __________ , which is a compiler extension that inserts additional function entry and exit code.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
_________ define the type and contents of a security descriptor.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The key ingredients of an access matrix are __________ , objects, and access rights.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The two types of audit records that may be used in an IDS are detection specific audit records and _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck