Deck 15: Computer Security Techniques

Full screen (f)
exit full mode
Question
Anomaly approaches attempt to define proper behavior.
Use Space or
up arrow
down arrow
to flip the card.
Question
__________ controls access based on comparing security labels with security clearances.

A) RBAC
B) DAC
C) MAC
D) ACM
Question
A password cracker is a password guessing program.
Question
The __________ determines whether the user is authorized to gain access to a system and the privileges accorded to the user.

A) RBAC
B) ID
C) IDS
D) DAC
Question
Smart tokens include an embedded __________ .

A) PIN
B) memory card
C) IDS
D) microprocessor
Question
The _________ prevents duplicate passwords from being visible in the password file.

A) access control
B) rootkit
C) salt
D) hash
Question
The success of the digital immune system depends on the ability of the virus analysis machine to detect new and innovative virus strains.
Question
Passwords serve to authenticate the ID of the individual logging on to the system.
Question
Once a worm is resident on a machine, antivirus software cannot be used to detect it.
Question
An important feature of Windows security is that applications can make use of the Windows security framework for user-defined objects.
Question
DAC is a concept that evolved out of requirements for military information security.
Question
For user authentication to computer, the most important category of smart token is the smart card.
Question
An effective IDS can serve as a deterrent, thus acting to prevent intrusions.
Question
Rootkits are easy to detect and neutralize.
Question
When a file containing a polymorphic virus is executed, the virus must decrypt itself to activate.
Question
Memory cards can store and process data.
Question
With a _________ protocol, the user authenticates himself or herself to the token and then the token authenticates the user to the computer.

A) challenge
B) response
C) static
D) dynamic password generator
Question
In the case of a challenge-response protocol the token generates a unique password periodically.
Question
A user only needs a password in order to log on to a UNIX system.
Question
Traditional DAC systems define the access rights of individual users and groups of users.
Question
A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.
Question
Virtually all multiuser systems, network-based servers, Web-based e-commerce sites, and other similar services require that a user provide not only a name or identifier (ID) but also a _________ .
Question
A hashed password technique typically combines the password with ___________ .

A) a user name
B) a salt value
C) an encryption key
D) a smart card
Question
Authentication protocols used with smart tokens are classified into three categories: static, dynamic password generator, and __________ .
Question
__________ involves an attempt to define a set of rules or attack patterns that can be used to decide that a given behavior is that of an intruder.

A) Signature detection
B) Anomaly detection
C) Profile based detection
D) Threshold detection
Question
An antiworm approach that blocks outgoing traffic when a threshold is exceeded is referred to as _________ .

A) rate limiting
B) rate halting
C) source based scanning
D) threshold random walk detection
Question
__________ add a specialized layer of security software to vulnerable or sensitive systems; examples include database servers and administrative systems.
Question
__________ integrates with the operating system of a host computer and monitors program behavior in real time for malicious actions.

A) Intrusion detection
B) Fingerprint based scanners
C) Behavior blocking software
D) Heurisics
Question
__________ is based on pattern recognition.

A) Password authentication
B) Biometrics
C) Token based authentication
D) Salt value
Question
__________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled.

A) Bot countermeasures
B) Compile-time defenses
C) Behavior blocking software
D) Digital immune systems
Question
__________ controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.
Question
An __________ dictates what types of access are permitted, under what circumstances, and by whom.
Question
__________ technology enables the antivirus program to easily detect even the most complex polymorphic viruses while maintaining fast scanning speeds.
Question
_________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.
Question
_________ is not a central element of a typical antivirus scheme.

A) Identification
B) Removal
C) Detection
D) Deterrence
Question
__________ is based on the roles that users assume in a system rather than the user's identity.

A) DAC
B) ACM
C) RBAC
D) MAC
Question
The primary purpose of a(n) _________ is to detect intrusions, log suspicious events, and send alerts.

A) smart card
B) DAC
C) antivirus
D) IDS
Question
The motivation for the development of the __________ has been the rising threat of Internet-based virus propagation.
Question
Objects that a user possesses for the purpose of user authentication are called _________ .
Question
_________ controls access based on the identity of the requestor and on access rules (authorizations) stating what requestors are (or are not) allowed to do.

A) Role-based access control
B) Access control
C) Discretionary access control
D) Mandatory access control
Question
The two broad categories of approaches to dealing with buffer overflow attacks are run-time defenses and __________ .
Question
One of the best known protection mechanisms is __________ , which is a compiler extension that inserts additional function entry and exit code.
Question
_________ define the type and contents of a security descriptor.
Question
The key ingredients of an access matrix are __________ , objects, and access rights.
Question
The two types of audit records that may be used in an IDS are detection specific audit records and _________ .
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Computer Security Techniques
1
Anomaly approaches attempt to define proper behavior.
False
2
__________ controls access based on comparing security labels with security clearances.

A) RBAC
B) DAC
C) MAC
D) ACM
C
3
A password cracker is a password guessing program.
True
4
The __________ determines whether the user is authorized to gain access to a system and the privileges accorded to the user.

A) RBAC
B) ID
C) IDS
D) DAC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Smart tokens include an embedded __________ .

A) PIN
B) memory card
C) IDS
D) microprocessor
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
The _________ prevents duplicate passwords from being visible in the password file.

A) access control
B) rootkit
C) salt
D) hash
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The success of the digital immune system depends on the ability of the virus analysis machine to detect new and innovative virus strains.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Passwords serve to authenticate the ID of the individual logging on to the system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Once a worm is resident on a machine, antivirus software cannot be used to detect it.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
An important feature of Windows security is that applications can make use of the Windows security framework for user-defined objects.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
DAC is a concept that evolved out of requirements for military information security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
For user authentication to computer, the most important category of smart token is the smart card.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
An effective IDS can serve as a deterrent, thus acting to prevent intrusions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Rootkits are easy to detect and neutralize.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
When a file containing a polymorphic virus is executed, the virus must decrypt itself to activate.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Memory cards can store and process data.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
With a _________ protocol, the user authenticates himself or herself to the token and then the token authenticates the user to the computer.

A) challenge
B) response
C) static
D) dynamic password generator
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
In the case of a challenge-response protocol the token generates a unique password periodically.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
A user only needs a password in order to log on to a UNIX system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Traditional DAC systems define the access rights of individual users and groups of users.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
Virtually all multiuser systems, network-based servers, Web-based e-commerce sites, and other similar services require that a user provide not only a name or identifier (ID) but also a _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
A hashed password technique typically combines the password with ___________ .

A) a user name
B) a salt value
C) an encryption key
D) a smart card
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Authentication protocols used with smart tokens are classified into three categories: static, dynamic password generator, and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
__________ involves an attempt to define a set of rules or attack patterns that can be used to decide that a given behavior is that of an intruder.

A) Signature detection
B) Anomaly detection
C) Profile based detection
D) Threshold detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
An antiworm approach that blocks outgoing traffic when a threshold is exceeded is referred to as _________ .

A) rate limiting
B) rate halting
C) source based scanning
D) threshold random walk detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
__________ add a specialized layer of security software to vulnerable or sensitive systems; examples include database servers and administrative systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
__________ integrates with the operating system of a host computer and monitors program behavior in real time for malicious actions.

A) Intrusion detection
B) Fingerprint based scanners
C) Behavior blocking software
D) Heurisics
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
__________ is based on pattern recognition.

A) Password authentication
B) Biometrics
C) Token based authentication
D) Salt value
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
__________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled.

A) Bot countermeasures
B) Compile-time defenses
C) Behavior blocking software
D) Digital immune systems
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
__________ controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
An __________ dictates what types of access are permitted, under what circumstances, and by whom.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
__________ technology enables the antivirus program to easily detect even the most complex polymorphic viruses while maintaining fast scanning speeds.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
_________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
_________ is not a central element of a typical antivirus scheme.

A) Identification
B) Removal
C) Detection
D) Deterrence
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
__________ is based on the roles that users assume in a system rather than the user's identity.

A) DAC
B) ACM
C) RBAC
D) MAC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The primary purpose of a(n) _________ is to detect intrusions, log suspicious events, and send alerts.

A) smart card
B) DAC
C) antivirus
D) IDS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The motivation for the development of the __________ has been the rising threat of Internet-based virus propagation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
Objects that a user possesses for the purpose of user authentication are called _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
_________ controls access based on the identity of the requestor and on access rules (authorizations) stating what requestors are (or are not) allowed to do.

A) Role-based access control
B) Access control
C) Discretionary access control
D) Mandatory access control
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The two broad categories of approaches to dealing with buffer overflow attacks are run-time defenses and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
One of the best known protection mechanisms is __________ , which is a compiler extension that inserts additional function entry and exit code.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
_________ define the type and contents of a security descriptor.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The key ingredients of an access matrix are __________ , objects, and access rights.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The two types of audit records that may be used in an IDS are detection specific audit records and _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.