CIS3360 Final

Cards (31)

  • True
    HMAC can be proven secure provided that the embedded hash function has some reasonable cryptographic strengths. T/F
  • True
    T/F: An auditing function monitors and keeps a record of user accesses to system resources.
  • False
    T/F: Even though it is a high-level programming language, Java still suffers from buffer overflows because it permits more data to be saved into a buffer than it has space for.
  • True
    T/F: The one-way hash function is important not only in message authentication but also in digital signatures.
  • True
    T/F: Many computer security vulnerabilities result from poor programming practices.
  • False
    T/F: User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.
  • True
    T/F: A good technique for choosing a password is to use the first letter of each word of a phrase.
  • True
    T/F: Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion.
  • True
    T/F: Flooding attacks take a variety of forms based on which network protocol is being used to implement the attack.
  • False
    T/F: Security flaws occur as a consequence of sufficient checking and validation of data and error codes in programs.
  • True
    T/F: Software security is closely related to software quality and reliability.
  • True
    T/F: The default set of rights should always follow the rule of least privilege or read-only access.
  • overrun/overflow/overwrite
    A buffer _________ is a condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information.
  • identify the attack
    When a DoS attack is detected, the first step is to _______.
  • Risky Resource Management
    "Incorrect Calculation of Buffer Size" is in the __________ software error category.
  • Secure Programming
    Defensive programming is sometimes referred to as _________.
  • HMAC
    Issued as RFC 2104, __________ has been chosen as the mandatory-to-implement MAC for IP Security.
  • Morris Internet
    The buffer overflow type of attack has been known since it was first widely used by the __________ Worm in 1988.
  • Mandatory Access Control (MAC)

    __________ controls access based on comparing security labels with security clearances.
  • 160
    SHA-1 produces a hash value of __________ bits.
  • Privilege Management
    The __________ component deals with the management and control of the ways entities are granted access to resources.
  • Verification Step
    Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.
  • RFC 4949
    __________ defines user authentication as "the process of verifying an identity claimed by or for a system entity".
  • host-based IDS
    A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.
  • Porous Defenses
    "Improper Access Control (Authorization)" is in the _________ software error category.
  • Host Agent
    The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central manager.
  • Poison Packet
    A(n) ___________________ triggers a bug in the system's network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.
  • True
    At the basic machine level, all of the data manipulated by machine instructions executed by the computer processor are stored in either the processor's registers or in memory.
  • True
    Network-based intrusion detection makes use of signature detection and anomaly detection.
  • False
    A difference between defensive programming and normal practices is that everything is assumed.
  • True
    A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service.