• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

Password combined with PIN used as an authentication requirement is an example of:

Something that the user knows

Which of the following answers refers to a security measure providing protection against various password-based attacks, specifically password sniffing and replay attacks?

OTP (One Time Password)

What algorithm computes a one-time password from a shared secret key and the current time?

TOTP

Which of the following protocols transmits passwords over the network in an unecrypted form and is therefore considered unsecure?

PAP

Which part of the AAA framework deals with granting or denying access to resources?

Authorization

An access control model in which every resource has a sensitivity label matching a clearance level assigned to a user is known as:

MAC (Mandatory Access Control)

An access control model in which access to resources is granted or denied depending on Access Control List (ACL) entries is known as:

Rule-Based Access Control

Which of the following answers list the characteristic features of the Mandatory Access Control (MAC) model? (Select 3)

- Users are not allowed to change access policies at their own discretion


- Labels and clearance levels can only be applied and changed by an administrator


- Every resource has a sensitivity label matching a clearance level assigned to a user

Which of the following answers lists the most common access control model used in Trusted OS implementations?

MAC

One of the basic requirements of the Mandatory Access Control (MAC) model is that in order to be able to access a resource user's clearance level must be equal or higher than the sensitivity level assigned to the resource. (True / False)

True

Which of the following terms refers to an access control method based on the identity of subjects and/or groups to which they belong?

DAC

Which of the following answers refer to the Rule-Based Access Control (RBAC) model? (Select 2)

- Implemented in network devices such as firewalls in order to control inbound and outbound traffic based on filtering rules


-Access to resources granted or denied depending on Access Control List (ACL) entries

Which of the following access control models enforces the strictest set of access rules?

MAC

In computer security, biometrics refers to physical characteristics of the human body that can be used for identification and access control purposes.

True

Which part of the AAA framework incorporates the time-of-day restrictions requirement?

Authorization

Which of the following account policy settings forces users to come up with a new password every time they are required to change their old password?

Password history

Which of the following passwords is the most complex?

T$7C52WL4SU , GdL3tU8wxYz , @TxBL$nW@Xt, G$L3tU8wY@z

Which of the following account policies provides a countermeasure against malicious users attempting to determine an account password by trial and error?

Account lockout

The two factors that are considered important for creating strong passwords are:

Password complexity / Password length

The two basic techniques for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption. (also called secret-key encryption.)


(True / False)

False

In asymmetric encryption, any message encrypted with the use of the public key can only be decrypted by applying the same algorithm and the matching private key. (True / False)

True

Large amount of processing power required to both encrypt and decrypt the content of the message causes that symmetric-key encryption algorithms are much slower when compared to algorithms used in asymmetric encryption. (True / False)

False

A cryptographic key generated to be used only once within a short time frame is known as session key. (True / False)

True

In asymmetric encryption, data encrypted with the use of a private key can only be decrypted with the use of a matching public key.


(True / False)

True

Key exchange mechanism whereby the cryptographic key is being delivered over a different channel than the main communication channel (for example on a USB thumb drive) is an example of an in-band key exchange.


(True / False)

False