Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Exam 1 com sci

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show Plaintext  
🗑
The (BLANK) is the encryption algorithm run in reverse   show
🗑
show Plaintext  
🗑
On average, (BLANK) of all possible keys must be tried in order to achieve success with a brute-force attack   show
🗑
The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the (BLANK)   show
🗑
(BLANK) is a procedure that allows communicating parties to verify that received or stored messages are authentic   show
🗑
show hash functions  
🗑
(BLANK) is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n   show
🗑
Transmitted data stored locally are referred to as (BLANK)   show
🗑
Digital signatures and key management are the two most important applications of (BLANK) encryption   show
🗑
A (BLANK) is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained   show
🗑
Combined one byte at a time with the plaintext stream using the XOR operation, a (BLANK) is the output of the pseudorandom bit generator   show
🗑
A (BLANK) protects against an attack in which one party generates a message for another party to sign   show
🗑
show Symmetric  
🗑
show digital  
🗑
show brute-force attack  
🗑
(BLANK) takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits   show
🗑
show Modes of operation  
🗑
show block  
🗑
show message authentication code  
🗑
The strength of a (BLANK) against brute-force attacks depends solely on the length of the hash code produced by the algorithm   show
🗑
Public-key cryptography is (BLANK)   show
🗑
show simple operations on bit pattern  
🗑
The purpose of the (BLANK) algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages   show
🗑
An important element in many computer security services and applications is the use of (BLANK)   show
🗑
Some form of (BLANK) is needed for public-key distribution   show
🗑
Recognition by fingerprint, retina, and face are examples of (BLANK)   show
🗑
A (BLANK) is a password guessing program   show
🗑
The (BLANK) strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords   show
🗑
A (BLANK) strategy is one in which the system periodically runs its own password cracker to find guessable passwords   show
🗑
The most common means of human-to-human identification are (BLANK)   show
🗑
(BLANK) systems identify features of the hand, including shape, and lengths and widths of fingers   show
🗑
show Enrolled  
🗑
show Challenge and Response  
🗑
show Client Attack  
🗑
A (BLANK) is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored   show
🗑
show Replay  
🗑
An institution that issues debit cards to cardholders and is responsible for the cardholder’s account and authorizing transactions is the (BLANK)   show
🗑
show EFT  
🗑
show user authentication  
🗑
(BLANK) is the means of establishing the validity of a claimed identity provided by a user   show
🗑
show registration authority  
🗑
Many users choose a (BLANK) that is too short or too easy to guess   show
🗑
(BLANK) is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic   show
🗑
A good technique for choosing a password is to use the (BLANK) of each word of a phrase   show
🗑
show User authentication  
🗑
Depending on the application, (BLANK) on a biometric system involves either verification or identification   show
🗑
A smart card contains an entire (BLANK)   show
🗑
show host attack  
🗑
In a (BLANK) some physical characteristic of the individual is mapped into a digital representation   show
🗑
(BLANK) implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance   show
🗑
(BLANK) is verification that the credentials of a user or other system entity are valid   show
🗑
show Authorization  
🗑
(BLANK) is the traditional method of implementing access control   show
🗑
(BLANK) controls access based on comparing security labels with security clearances   show
🗑
A concept that evolved out of requirements for military information security is (BLANK)   show
🗑
show subject  
🗑
show object  
🗑
The final permission bit is the (BLANK) bit   show
🗑
show RBAC (letter by letter)  
🗑
show role  
🗑
show Constraints  
🗑
(BLANK) refers to setting a maximum number with respect to roles   show
🗑
show ABAC (learn letter for letter)  
🗑
show access management  
🗑
(BLANK) is the central element of computer security   show
🗑
show authentication  
🗑
An (BLANK) monitors and keeps a record of user accesses to system resources   show
🗑
show cannot  
🗑
show The principal objectives  
🗑
(BLANK) indicate which system entities are eligible to access certain resources   show
🗑
A user may belong to multiple (BLANK)   show
🗑
An (BLANK) describes the way in which a subject may access an object   show
🗑
show default set of rights  
🗑
show user mode  
🗑
show unrestricted  
🗑
Traditional RBAC systems define the access rights (BLANK)   show
🗑
A (BLANK) is a defined relationship among roles or a condition related to roles   show
🗑
show An ABAC  
🗑
A(n) (BLANK) is a structured collection of data stored for use by one or more applications   show
🗑
show relational database  
🗑
In relational database parlance, the basic building block is a (BLANK) which is a flat table   show
🗑
show primary key  
🗑
A (BLANK) is defined to be a portion of a row used to uniquely identify a row in a table   show
🗑
show view  
🗑
show administrator  
🗑
An end user who operates on database objects via a particular application but does not own any of the database objects is the (BLANK)   show
🗑
show Inference  
🗑
show computer room  
🗑
(BLANK) houses cross-connects and active equipment for distributing cable to the equipment distribution area   show
🗑
(BLANK) is an organization that produces data to be made available for controlled release, either within the organization or to external users   show
🗑
show Server  
🗑
(BLANK) specifies the minimum requirements for telecommunications infrastructure of data centers   show
🗑
show Uniform  
🗑
show Sufficient  
🗑
To create a relationship between two tables, the attributes that define the primary key in one table must appear as attributes in another table, where they are referred to as a (BLANK)   show
🗑
show unique  
🗑
show multiple  
🗑
show Cannot  
🗑
The (BLANK) makes use of the database description tables to manage the physical database   show
🗑
Two (BLANK) to database encryption are key management and inflexibility   show
🗑
show Server  
🗑
show SQL server  
🗑
show Data center  
🗑
(BLANK) security of the data center itself includes barriers to entry, coupled with authentication techniques for gaining physical access   show
🗑
show Network  
🗑
Security specifically tailored to (BLANK) is an increasingly important component of an overall organizational security strategy   show
🗑
show Encryption  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: Catst