Exam 1 com sci
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | Plaintext
🗑
|
||||
The (BLANK) is the encryption algorithm run in reverse | show 🗑
|
||||
show | Plaintext
🗑
|
||||
On average, (BLANK) of all possible keys must be tried in order to achieve success with a brute-force attack | show 🗑
|
||||
The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the (BLANK) | show 🗑
|
||||
(BLANK) is a procedure that allows communicating parties to verify that received or stored messages are authentic | show 🗑
|
||||
show | hash functions
🗑
|
||||
(BLANK) is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n | show 🗑
|
||||
Transmitted data stored locally are referred to as (BLANK) | show 🗑
|
||||
Digital signatures and key management are the two most important applications of (BLANK) encryption | show 🗑
|
||||
A (BLANK) is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained | show 🗑
|
||||
Combined one byte at a time with the plaintext stream using the XOR operation, a (BLANK) is the output of the pseudorandom bit generator | show 🗑
|
||||
A (BLANK) protects against an attack in which one party generates a message for another party to sign | show 🗑
|
||||
show | Symmetric
🗑
|
||||
show | digital
🗑
|
||||
show | brute-force attack
🗑
|
||||
(BLANK) takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits | show 🗑
|
||||
show | Modes of operation
🗑
|
||||
show | block
🗑
|
||||
show | message authentication code
🗑
|
||||
The strength of a (BLANK) against brute-force attacks depends solely on the length of the hash code produced by the algorithm | show 🗑
|
||||
Public-key cryptography is (BLANK) | show 🗑
|
||||
show | simple operations on bit pattern
🗑
|
||||
The purpose of the (BLANK) algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages | show 🗑
|
||||
An important element in many computer security services and applications is the use of (BLANK) | show 🗑
|
||||
Some form of (BLANK) is needed for public-key distribution | show 🗑
|
||||
Recognition by fingerprint, retina, and face are examples of (BLANK) | show 🗑
|
||||
A (BLANK) is a password guessing program | show 🗑
|
||||
The (BLANK) strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords | show 🗑
|
||||
A (BLANK) strategy is one in which the system periodically runs its own password cracker to find guessable passwords | show 🗑
|
||||
The most common means of human-to-human identification are (BLANK) | show 🗑
|
||||
(BLANK) systems identify features of the hand, including shape, and lengths and widths of fingers | show 🗑
|
||||
show | Enrolled
🗑
|
||||
show | Challenge and Response
🗑
|
||||
show | Client Attack
🗑
|
||||
A (BLANK) is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored | show 🗑
|
||||
show | Replay
🗑
|
||||
An institution that issues debit cards to cardholders and is responsible for the cardholder’s account and authorizing transactions is the (BLANK) | show 🗑
|
||||
show | EFT
🗑
|
||||
show | user authentication
🗑
|
||||
(BLANK) is the means of establishing the validity of a claimed identity provided by a user | show 🗑
|
||||
show | registration authority
🗑
|
||||
Many users choose a (BLANK) that is too short or too easy to guess | show 🗑
|
||||
(BLANK) is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic | show 🗑
|
||||
A good technique for choosing a password is to use the (BLANK) of each word of a phrase | show 🗑
|
||||
show | User authentication
🗑
|
||||
Depending on the application, (BLANK) on a biometric system involves either verification or identification | show 🗑
|
||||
A smart card contains an entire (BLANK) | show 🗑
|
||||
show | host attack
🗑
|
||||
In a (BLANK) some physical characteristic of the individual is mapped into a digital representation | show 🗑
|
||||
(BLANK) implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance | show 🗑
|
||||
(BLANK) is verification that the credentials of a user or other system entity are valid | show 🗑
|
||||
show | Authorization
🗑
|
||||
(BLANK) is the traditional method of implementing access control | show 🗑
|
||||
(BLANK) controls access based on comparing security labels with security clearances | show 🗑
|
||||
A concept that evolved out of requirements for military information security is (BLANK) | show 🗑
|
||||
show | subject
🗑
|
||||
show | object
🗑
|
||||
The final permission bit is the (BLANK) bit | show 🗑
|
||||
show | RBAC (letter by letter)
🗑
|
||||
show | role
🗑
|
||||
show | Constraints
🗑
|
||||
(BLANK) refers to setting a maximum number with respect to roles | show 🗑
|
||||
show | ABAC (learn letter for letter)
🗑
|
||||
show | access management
🗑
|
||||
(BLANK) is the central element of computer security | show 🗑
|
||||
show | authentication
🗑
|
||||
An (BLANK) monitors and keeps a record of user accesses to system resources | show 🗑
|
||||
show | cannot
🗑
|
||||
show | The principal objectives
🗑
|
||||
(BLANK) indicate which system entities are eligible to access certain resources | show 🗑
|
||||
A user may belong to multiple (BLANK) | show 🗑
|
||||
An (BLANK) describes the way in which a subject may access an object | show 🗑
|
||||
show | default set of rights
🗑
|
||||
show | user mode
🗑
|
||||
show | unrestricted
🗑
|
||||
Traditional RBAC systems define the access rights (BLANK) | show 🗑
|
||||
A (BLANK) is a defined relationship among roles or a condition related to roles | show 🗑
|
||||
show | An ABAC
🗑
|
||||
A(n) (BLANK) is a structured collection of data stored for use by one or more applications | show 🗑
|
||||
show | relational database
🗑
|
||||
In relational database parlance, the basic building block is a (BLANK) which is a flat table | show 🗑
|
||||
show | primary key
🗑
|
||||
A (BLANK) is defined to be a portion of a row used to uniquely identify a row in a table | show 🗑
|
||||
show | view
🗑
|
||||
show | administrator
🗑
|
||||
An end user who operates on database objects via a particular application but does not own any of the database objects is the (BLANK) | show 🗑
|
||||
show | Inference
🗑
|
||||
show | computer room
🗑
|
||||
(BLANK) houses cross-connects and active equipment for distributing cable to the equipment distribution area | show 🗑
|
||||
(BLANK) is an organization that produces data to be made available for controlled release, either within the organization or to external users | show 🗑
|
||||
show | Server
🗑
|
||||
(BLANK) specifies the minimum requirements for telecommunications infrastructure of data centers | show 🗑
|
||||
show | Uniform
🗑
|
||||
show | Sufficient
🗑
|
||||
To create a relationship between two tables, the attributes that define the primary key in one table must appear as attributes in another table, where they are referred to as a (BLANK) | show 🗑
|
||||
show | unique
🗑
|
||||
show | multiple
🗑
|
||||
show | Cannot
🗑
|
||||
The (BLANK) makes use of the database description tables to manage the physical database | show 🗑
|
||||
Two (BLANK) to database encryption are key management and inflexibility | show 🗑
|
||||
show | Server
🗑
|
||||
show | SQL server
🗑
|
||||
show | Data center
🗑
|
||||
(BLANK) security of the data center itself includes barriers to entry, coupled with authentication techniques for gaining physical access | show 🗑
|
||||
show | Network
🗑
|
||||
Security specifically tailored to (BLANK) is an increasingly important component of an overall organizational security strategy | show 🗑
|
||||
show | Encryption
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
Catst