Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Exam 1 com sci

        Help!  

Question
Answer
The original message or data that is fed into the algorithm is (BLANK)   Plaintext  
🗑
The (BLANK) is the encryption algorithm run in reverse   Decryption Algorithm  
🗑
(BLANK) is the scrambled message produced as output   Plaintext  
🗑
On average, (BLANK) of all possible keys must be tried in order to achieve success with a brute-force attack   Brute-force attack  
🗑
The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the (BLANK)   AES  
🗑
(BLANK) is a procedure that allows communicating parties to verify that received or stored messages are authentic   Message Authentication  
🗑
The purpose of a (BLANK) is to produce a “fingerprint” of a file, message, or other block of data   hash functions  
🗑
(BLANK) is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n   RSA  
🗑
Transmitted data stored locally are referred to as (BLANK)   data at rest  
🗑
Digital signatures and key management are the two most important applications of (BLANK) encryption   public-key  
🗑
A (BLANK) is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained   Brute-force attack  
🗑
Combined one byte at a time with the plaintext stream using the XOR operation, a (BLANK) is the output of the pseudorandom bit generator   keystream  
🗑
A (BLANK) protects against an attack in which one party generates a message for another party to sign   strong has function  
🗑
(BLANK) encryption is used primarily to provide confidentiality   Symmetric  
🗑
Two of the most important applications of public-key encryption are (BLANK) signatures and key management   digital  
🗑
(BLANK) attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained   brute-force attack  
🗑
(BLANK) takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits   The DES algorithm/Triple DES  
🗑
(BLANK) are the alternative techniques that have been developed to increase the security of symmetric block encryption for large sequences of data   Modes of operation  
🗑
The advantage of a (BLANK) cipher is that you can reuse keys   block  
🗑
A (BLANK) is a small block of data generated by a secret key and appended to a message   message authentication code  
🗑
The strength of a (BLANK) against brute-force attacks depends solely on the length of the hash code produced by the algorithm   hash function  
🗑
Public-key cryptography is (BLANK)   asymmetric cryptography  
🗑
Public-key algorithms are based on (BLANK)   simple operations on bit pattern  
🗑
The purpose of the (BLANK) algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages   DSS algorithm  
🗑
An important element in many computer security services and applications is the use of (BLANK)   cryptographic algorithms  
🗑
Some form of (BLANK) is needed for public-key distribution   protocol  
🗑
Recognition by fingerprint, retina, and face are examples of (BLANK)   Biometric authentication  
🗑
A (BLANK) is a password guessing program   A password cracker  
🗑
The (BLANK) strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords   User Education  
🗑
A (BLANK) strategy is one in which the system periodically runs its own password cracker to find guessable passwords   Reactive Password Checking  
🗑
The most common means of human-to-human identification are (BLANK)   Facial Recognition  
🗑
(BLANK) systems identify features of the hand, including shape, and lengths and widths of fingers   Hand Geometry  
🗑
Each individual who is to be included in the database of authorized users must first be (BLANK) in the system   Enrolled  
🗑
To counter threats to remote user authentication, systems generally rely on some form of (BLANK) protocol   Challenge and Response  
🗑
A (BLANK) is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path   Client Attack  
🗑
A (BLANK) is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored   Host Attack  
🗑
A (BLANK) attack involves an adversary repeating a previously captured user response   Replay  
🗑
An institution that issues debit cards to cardholders and is responsible for the cardholder’s account and authorizing transactions is the (BLANK)   Issuer  
🗑
(BLANK) allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide   EFT  
🗑
(BLANK) is the fundamental building block and the primary line of defense   user authentication  
🗑
(BLANK) is the means of establishing the validity of a claimed identity provided by a user   Identification  
🗑
Depending on the details of the overall authentication system, the (BLANK) issues some sort of electronic credential to the subscriber   registration authority  
🗑
Many users choose a (BLANK) that is too short or too easy to guess   passsword  
🗑
(BLANK) is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic   User authentication  
🗑
A good technique for choosing a password is to use the (BLANK) of each word of a phrase   first letter  
🗑
(BLANK) is the basis for most types of access control and for user accountability   User authentication  
🗑
Depending on the application, (BLANK) on a biometric system involves either verification or identification   user authentication  
🗑
A smart card contains an entire (BLANK)   microprocessor  
🗑
Keylogging is a form of (BLANK)   host attack  
🗑
In a (BLANK) some physical characteristic of the individual is mapped into a digital representation   biometric scheme  
🗑
(BLANK) implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance   Access control  
🗑
(BLANK) is verification that the credentials of a user or other system entity are valid   Authentication  
🗑
(BLANK) is the granting of a right or permission to a system entity to access a system resource   Authorization  
🗑
(BLANK) is the traditional method of implementing access control   DAC discretionary access control (letter by letter)  
🗑
(BLANK) controls access based on comparing security labels with security clearances   MAC mandatory access control (letter by letter)  
🗑
A concept that evolved out of requirements for military information security is (BLANK)   mandatory access control  
🗑
A (BLANK) is an entity capable of accessing objects   subject  
🗑
A(n) is a resource to which access is controlled   object  
🗑
The final permission bit is the (BLANK) bit   Sticky  
🗑
(BLANK) is based on the roles the users assume in a system rather than the user’s identity   RBAC (letter by letter)  
🗑
A (BLANK) is a named job function within the organization that controls this computer system   role  
🗑
(BLANK) provide a means of adapting RBAC to the specifics of administrative and security policies in an organization   Constraints  
🗑
(BLANK) refers to setting a maximum number with respect to roles   Cardinality  
🗑
Subject attributes, object attributes and environment attributes are the three types of attributes in the (BLANK) model   ABAC (learn letter for letter)  
🗑
The (BLANK) component deals with the management and control of the ways entities are granted access to resources   access management  
🗑
(BLANK) is the central element of computer security   Access control  
🗑
The (BLANK) function determines who is trusted for a given purpose   authentication  
🗑
An (BLANK) monitors and keeps a record of user accesses to system resources   auditing function  
🗑
External devices such as firewalls (BLANK) provide access control services   cannot  
🗑
The (BLANK) of computer security are to prevent unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner   The principal objectives  
🗑
(BLANK) indicate which system entities are eligible to access certain resources   Security labels  
🗑
A user may belong to multiple (BLANK)   groups  
🗑
An (BLANK) describes the way in which a subject may access an object   access right  
🗑
The (BLANK) should always follow the rule of least privilege or read-only access   default set of rights  
🗑
A user program executes in a (BLANK) in which certain areas of memory are protected from the user’s use and certain instructions may not be executed   user mode  
🗑
Any program that is owned by, and SetUID to, the “superuser” potentially grants (BLANK) access to the system to any user executing that program   unrestricted  
🗑
Traditional RBAC systems define the access rights (BLANK)   of individual users and groups of users  
🗑
A (BLANK) is a defined relationship among roles or a condition related to roles   A constraint  
🗑
An (BLANK) model can define authorizations that express conditions on properties of both the resource and the subject   An ABAC  
🗑
A(n) (BLANK) is a structured collection of data stored for use by one or more applications   database  
🗑
The basic building block of a (BLANK) is a table of data, consisting of rows and columns, similar to a spreadsheet   relational database  
🗑
In relational database parlance, the basic building block is a (BLANK) which is a flat table   relation  
🗑
In a relational database rows are referred to as (BLANK)   primary key  
🗑
A (BLANK) is defined to be a portion of a row used to uniquely identify a row in a table   primary key  
🗑
A (BLANK) is a virtual table   view  
🗑
A(n) (BLANK) is a user who has administrative responsibility for part or all of the database   administrator  
🗑
An end user who operates on database objects via a particular application but does not own any of the database objects is the (BLANK)   end user other than application owner  
🗑
(BLANK) is the process of performing authorized queries and deducing unauthorized information from the legitimate responses received   Inference  
🗑
A (BLANK) is the portion of the data center that houses data processing equipment   computer room  
🗑
(BLANK) houses cross-connects and active equipment for distributing cable to the equipment distribution area   tuples  
🗑
(BLANK) is an organization that produces data to be made available for controlled release, either within the organization or to external users   data owner  
🗑
(BLANK) is an organization that receives the encrypted data from a data owner and makes them available for distribution to clients   Server  
🗑
(BLANK) specifies the minimum requirements for telecommunications infrastructure of data centers   TIA-492  
🗑
A query language provides a (BLANK) interface to the database   Uniform  
🗑
A single countermeasure is (BLANK) for SQLi attacks   Sufficient  
🗑
To create a relationship between two tables, the attributes that define the primary key in one table must appear as attributes in another table, where they are referred to as a (BLANK)   foreign key  
🗑
The value of a primary key must be (BLANK) for each tuple of its table   unique  
🗑
A foreign key value can appear (BLANK) times in a table   multiple  
🗑
A view (BLANK) provide restricted access to a relational database so it (BLANK) be used for security purposes   Cannot  
🗑
The (BLANK) makes use of the database description tables to manage the physical database   Database management system  
🗑
Two (BLANK) to database encryption are key management and inflexibility   disadvantages  
🗑
Fixed (BLANK) roles operate at the level of an individual database   Server  
🗑
(BLANK) allows users to create roles that can then be assigned access rights to portions of the database   SQL server  
🗑
A (BLANK) generally includes backup power supplies   Data center  
🗑
(BLANK) security of the data center itself includes barriers to entry, coupled with authentication techniques for gaining physical access   Site  
🗑
(BLANK) security is extremely important in a facility in which such a large collection of assets is concentrated in a single place and accessible by external network connections   Network  
🗑
Security specifically tailored to (BLANK) is an increasingly important component of an overall organizational security strategy   Databases  
🗑
(BLANK) becomes the last line of defense in database security   Encryption  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: Catst