Which of the following is not a step of AES? a. Byte Substitution b. Add Round key c. Mix Column d. Choice Permutation
Which of the following is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or data on the system? a. Risk b. Exploit c. Mitigation d. Vulnerability
Which of the following is not a phase in a worm attack? a. Paralyze b. Propagate c. Eradicate d. Persist
The great majority of software vulnerabilities that have been discovered are which of the following? a. Software overflows b. Heap overflows c. Stack vulnerabilities d. Buffer overflows
1.
a) Byte Substitution
2.
d) Vulnerability
3.
c) Eradicate
4.
d. Buffer overflows
Which of the following is not a step of AES? a. Byte Substitution b. Add Round...
TRUE/FALSE QUESTIONS: Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...
41. Which of the following cipher systems uses polyalphabetic substitution? A. Vigenère B. Substitution C. Transposition D. Shift 42. Which encryption algorithm can have key sizes of 128, 192, and 256 bits, with the key size affecting the number of rounds used in the algorithm? A. SHA B. RC С. AES D. DES 43. Which of the following security principles ensures that the sender and the recipient of a message are informed that the message was not altered in transmission?...
Java Quiz Which of the following are the wrapper classes? A. Random B. Vector C. Byte D. all of the above
4. Answer all of the following: (a) What information is stored in activation records? (b) Which of these information items are only in block-structured pro- gramming languages and why? (c) Name two programming languages where activation records are usu- ally stored on the stack and two where the activation records are usu ally on the heap. Page 2 of 7 Programming Languages Autumn 2012 (d) Describe why, in the latter two programming languages, it is necessary for the activation records...
1) Information security procedures protect information integrity A) preventing fictitious transactions. B) reducing the system cost. C) making the system more efficient. D) making it impossible for unauthorized users to access the system. 2) There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the "black hat" hackers. He had researched an exploit and determined that he could penetrate the target system, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes...
10 Which of the following BEST defines hackers? O A i Indviduals who use their technical computing and ps O B. indrviduals who use their technical C. individuals that use their computing resources in order to create vulnerabilities in computer prograns QUESTION 11 intrusion Detection Systems are able to detect unauthorized system O B. Accessing systems leave traces that are not easily removed QUESTION 12 several of s older i This is an example of outsourcing for the purpose of...
secuirty 1. When digitally signing a document, which key do you use? A: Symmetric key B: Public key C: Private Key D: Your house key 2. Which of the following protocols uses encryption? A: FTP B: Telnet C: SSH D: SMTP 3. What happens when rm is used to delete a file? A: Creates a new hardlink to the file B: Only removes the file pointer C: Removes file pointer and only writes over data D: Removes file pointer and...
IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...
CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...