1/17
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
________ involves the passive capture of a data unit and its subsequent transmission to produce an unauthorized effect
Disruption
Replay
Service denial
Masquerade
Replay
A ________ is a potential for violation of security which exists when there is a circumstance, capability, action or event that could breach security and cause harm
Attack
Risk
Attack vector
Threat
Threat
A loss of _______ is the unauthorized disclosure of information
Authenticity
Confidentiality
Reliability
Integrity
Confidentiality
Unsecured user accounts is _____
Technology weakness
Configuration weakness
None of the above
security policy weakness
Configuration weakness
The key used in symmetric encryption is referred to as a _______ key
Private
Decryption
Session
secret
Secret
A ________ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained
Caesar attack
Ciphertext only
Chosen plaintext
brute force
Brute force
The vast majority of network based symmetric cryptographic applications make use of _______ ciphers
Block
Permutation
Stream
linear
Block
Asymmetric encryption can be used for _______
Neither confidentiality and authentication
Confidentiality
Authentication
both confidentiality and authentication
Both confidentiality and authentication
Security policy should be based on business needs: true or false
true
Reconnaissance is an active attack: true or false
False
Phishing is an attack aimed at redirecting the traffic of a website to a fake website to collect your sensitive information: true or false
false
To protect against pharming, organizations implement “personalization” technologies, such as user chosen images on the login page: true or false
true
ARP resolve symbolic domain names to IP addresses: true or false
false
Ping of death is a DOS attack: true or false
true
Syn flood is a confidentiality attack: true or false
false
Smurf attack is an availability attack: true or false
true
When using symmetric encryption, it is very important to keep the algorithm secret: true or false
false
A public key encryption scheme is not vulnerable to a brute force attack: true or false
false