HMAC can be proven secure provided that the embedded hash function has some reasonable cryptographic strengths. T/F
True
T/F: An auditing function monitors and keeps a record of user accesses to system resources.
False
T/F: Even though it is a high-level programming language, Java still suffers from buffer overflows because it permits more data to be saved into a buffer than it has space for.
True
T/F: The one-way hash function is important not only in message authentication but also in digital signatures.
True
T/F: Many computer security vulnerabilities result from poor programming practices.
False
T/F: User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.
True
T/F: A good technique for choosing a password is to use the first letter of each word of a phrase.
True
T/F: Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion.
True
T/F: Flooding attacks take a variety of forms based on which network protocol is being used to implement the attack.
False
T/F: Security flaws occur as a consequence of sufficient checking and validation of data and error codes in programs.
True
T/F: Software security is closely related to software quality and reliability.
True
T/F: The default set of rights should always follow the rule of least privilege or read-only access.
overrun/overflow/overwrite
A buffer _________ is a condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information.
identifytheattack
When a DoS attack is detected, the first step is to _______.
RiskyResourceManagement
"Incorrect Calculation of Buffer Size" is in the __________ software error category.
SecureProgramming
Defensive programming is sometimes referred to as _________.
HMAC
Issued as RFC 2104, __________ has been chosen as the mandatory-to-implement MAC for IP Security.
MorrisInternet
The buffer overflow type of attack has been known since it was first widely used by the __________ Worm in 1988.
MandatoryAccessControl (MAC)
__________ controls access based on comparing security labels with security clearances.
160
SHA-1 produces a hash value of __________ bits.
PrivilegeManagement
The __________ component deals with the management and control of the ways entities are granted access to resources.
VerificationStep
Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.
RFC 4949
__________ defines user authentication as "the process of verifying an identity claimed by or for a system entity".
host-basedIDS
A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.
PorousDefenses
"Improper Access Control (Authorization)" is in the _________ software error category.
Host Agent
The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central manager.
Poison Packet
A(n) ___________________ triggers a bug in the system's network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.
True
At the basic machine level, all of the data manipulated by machine instructions executed by the computer processor are stored in either the processor's registers or in memory.
True
Network-based intrusion detection makes use of signature detection and anomaly detection.
False
A difference between defensive programming and normal practices is that everything is assumed.
True
A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service.