Computer Network Security – Flashcards

Unlock all answers in this set

Unlock answers
question
Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is
answer
Authentic
question
A _______________ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.
answer
Brute Force
question
If both parties use only one key over a secure encrypted channel, such a system is referred to as:
answer
Symmetric Encryption
question
T/F A digital signature can guarantee the source but not the integrity of the message
answer
False
question
X.509 defines the format for public-key certificates
answer
True
question
Communication between end systems is encrypted using a
answer
Session Key
question
What is an IPS
answer
An IPS blocks traffic
question
Find the determinant mod of (A B) (C D)
answer
(A*D) - (B*C)
question
What is the formula for finding the ciphertext C in rsa
answer
M^e Mod n
question
What is the formula for finding the plaintext P in rsa
answer
C^d Mod n
question
What is the formula for finding d
answer
de = 1 mod phi(n)
question
T/F The most important development from the work on public Key encryption is the digital signature
answer
True
question
The digital signature is formed by
answer
taking the hash of the message and encrypting the message with the creators private key
question
X.509 is based on the use of
answer
Public Key cryptography and digital signatures
question
What does TLS entail
answer
Transport Layer Security provides communications security over a computer network
question
What does SSL entail
answer
Secure Socket Layer is the standard security technology for establishing an encrypted link between a web server and a browser
question
Master key is
answer
Shared by the key distribution center and an end system or user and is used to encrypt the session key
question
A nonce is
answer
A unique identifier, it needs to be hard to guess, such as a random number
question
What is a passive threat
answer
Eavesdropping on, or monitoring transmissions
question
What is an active security threat
answer
Modification, deletion, unauthorized access
question
What are the four means of authenticating a user's identity
answer
Something the individual knows, possesses, is, does
question
What are two common techniques used to protect a password file?
answer
Restrict access to the password file, Force users to select passwords that are difficult to guess.
question
What is DAC
answer
Discretionary access control controls access based on identity.
question
What is MAC
answer
Mandatory access control controls access based on comparing security labels
question
What is a honeypot?
answer
Honeypots are decoy systems that are designed to lure a potential attacker away from critical systems.
question
What are typical phases of operation of a virus or worm?
answer
A dormant phase, a propagation phase, a triggering phase, and an execution phase
question
Define a denial of service (DOS) attack
answer
A denial of service attack is an action that prevents or impairs the network, system, or application
question
Define a DDoS attack
answer
A Distributed Denial of Service attack uses multiple attacking systems, often using compromised user workstations or PCs
question
What is an application-level gateway
answer
Also known as a proxy server, acts as a relay of application-level traffic
question
Define Buffer Overflow
answer
A buffer overflow results from adding more information to a programs buffer than it was designed to hold
question
What is a hello in a rail fence cipher
answer
hlo el
question
What are the two ways to break a cipher
answer
Brute force, Cryptanalysis
question
What are the 4 steps in AES
answer
Add round key, Substitute bytes, shift rows, Mix columns
question
How is the hash value of a message encrypted?
answer
with a users private key
question
What does EAP stand for
answer
Extensible authentication Protocol
question
What is a stateful firewall
answer
watches traffic from end to end, it keeps track of the state of network connections, it knows if packets are fragmented
question
What mechanisms can a virus use to conceal itself
answer
encryption, stealth, polymorphism, metamorphism
question
What metrics are useful for profile based intrusion detection
answer
Solution counter, gauge, interval timer, resource utilization
question
What are the two basic functions used in encryption algorithms
answer
Permutation and substitution
question
what are the three broad categories of applications of public key cryptosystems
answer
Encryption/decryption, Digital signature, Key exchange
question
What is a trap-door one-way function
answer
easy to calculate in one direction but unfeasible to calculate the other direction
question
What is a MAC algorithm
answer
A message authentication code uses a secret key to calculate a code used for authentication
question
What is salt
answer
salt is combined with the password at the input to the one-way encryption routine which results in a hash value
question
List three design goals for a firewall
answer
All traffic must pass through the firewall, only authorized traffic is allowed to pass, the firewall is immune to penetration
question
What is a weakness of a packet filtering firewall
answer
they don't examine upper layer data
question
Why is it useful to have host-based firewalls
answer
Filtering rules can be tailored to the host environment, protection is provided independent of topology
question
What is a DMZ network and what types of systems would you expect to find on such networks
answer
Between internal and external firewalls are one or more networked devices in a region referred to as a demilitarized zone
question
What are three broad mechanisms that malware can use to propagate
answer
Infections of existing content, exploit of software vulnerabilities, social engineering attacks
question
What is the difference between machine-executable and macro viruses?
answer
machine executable infect executable program files, macro viruses infect files with macro or scripting code
question
What services are provided by the SSL Record Protocol
answer
Confidentiality, Message Integrity
question
What steps are involved in the SSL record protocol transmission
answer
Fragmentation, compression, add MAC, encrypt, append ssl record header
question
For what applications is SSH useful
answer
Providing a secure remote logon facility to replace TELNET
question
What is NAC
answer
Network Access control, managing access to a network
question
What is EAPOL
answer
EAP over LAN operates at the network layers and makes use of IEEE 802 LAN
question
What is the function of IEEE 802.1X
answer
To provide access control functions for LANs
question
What is a key distribution center
answer
a system is authorized to transmit temporary session keys to principals.
question
What is a public key certificate
answer
It contains a public key and other information, is created by a certificate authority and is given to the participant with the matching private key
question
How is an X.509 certificate revoked
answer
The owner of a public-key can issue a certificate revocation list that revokes one or more certificates
question
What types of attacks are addressed by message authentication
answer
Masquerade, content modification, sequence modification, timing modification
question
Why is it important to study the feistel cipher
answer
Most symmetric block encryption algorithms in current use
question
Explain the avalance effect
answer
a property of any encryption algorithm such that a small change in either plaintext or key produces a significant change in the ciphertext
question
What is the OSI security architecture
answer
a framework that provides a systematic way of defining the requirement for security and characterizing the approaches to satisfying those requirements.
question
What are the three key security objectives as per OSI
answer
Confidentiality, integrity, availability
question
List the categories of security services
answer
Authentication, access control, data confidentiality, data integrity
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New