Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
Password combined with PIN used as an authentication requirement is an example of: |
Something that the user knows |
|
Which of the following answers refers to a security measure providing protection against various password-based attacks, specifically password sniffing and replay attacks? |
OTP (One Time Password) |
|
What algorithm computes a one-time password from a shared secret key and the current time? |
TOTP |
|
Which of the following protocols transmits passwords over the network in an unecrypted form and is therefore considered unsecure? |
PAP |
|
Which part of the AAA framework deals with granting or denying access to resources? |
Authorization |
|
An access control model in which every resource has a sensitivity label matching a clearance level assigned to a user is known as: |
MAC (Mandatory Access Control) |
|
An access control model in which access to resources is granted or denied depending on Access Control List (ACL) entries is known as: |
Rule-Based Access Control |
|
Which of the following answers list the characteristic features of the Mandatory Access Control (MAC) model? (Select 3) |
- Users are not allowed to change access policies at their own discretion - Labels and clearance levels can only be applied and changed by an administrator - Every resource has a sensitivity label matching a clearance level assigned to a user |
|
Which of the following answers lists the most common access control model used in Trusted OS implementations? |
MAC |
|
One of the basic requirements of the Mandatory Access Control (MAC) model is that in order to be able to access a resource user's clearance level must be equal or higher than the sensitivity level assigned to the resource. (True / False) |
True |
|
Which of the following terms refers to an access control method based on the identity of subjects and/or groups to which they belong? |
DAC |
|
Which of the following answers refer to the Rule-Based Access Control (RBAC) model? (Select 2) |
- Implemented in network devices such as firewalls in order to control inbound and outbound traffic based on filtering rules -Access to resources granted or denied depending on Access Control List (ACL) entries |
|
Which of the following access control models enforces the strictest set of access rules? |
MAC |
|
In computer security, biometrics refers to physical characteristics of the human body that can be used for identification and access control purposes. |
True |
|
Which part of the AAA framework incorporates the time-of-day restrictions requirement? |
Authorization |
|
Which of the following account policy settings forces users to come up with a new password every time they are required to change their old password? |
Password history |
|
Which of the following passwords is the most complex? |
T$7C52WL4SU , GdL3tU8wxYz , @TxBL$nW@Xt, G$L3tU8wY@z |
|
Which of the following account policies provides a countermeasure against malicious users attempting to determine an account password by trial and error? |
Account lockout |
|
The two factors that are considered important for creating strong passwords are: |
Password complexity / Password length |
|
The two basic techniques for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption. (also called secret-key encryption.) (True / False) |
False |
|
In asymmetric encryption, any message encrypted with the use of the public key can only be decrypted by applying the same algorithm and the matching private key. (True / False) |
True |
|
Large amount of processing power required to both encrypt and decrypt the content of the message causes that symmetric-key encryption algorithms are much slower when compared to algorithms used in asymmetric encryption. (True / False) |
False |
|
A cryptographic key generated to be used only once within a short time frame is known as session key. (True / False) |
True |
|
In asymmetric encryption, data encrypted with the use of a private key can only be decrypted with the use of a matching public key. (True / False) |
True |
|
Key exchange mechanism whereby the cryptographic key is being delivered over a different channel than the main communication channel (for example on a USB thumb drive) is an example of an in-band key exchange. (True / False) |
False |