1. Among other things the X.800 Security Architecture defines security services and security mechanisms that are used by security professionals in implementing security in a network infrastructure.
True
False
2. The larger the symmetric key the stronger the key is from brute force or cryptanalysis cracking?
True
False
3. An application level gateway that is hardened or secured to protect against security attacks is known as what?___________
4. What is used to verify a functional requirement is met? ___________
5. Routers can be set up at the boundary between the internet and a system or in the interior of a system.
True
False
Answer For The First Question
1. Among other things the X.800...................
Answer:True, why?
X.800 , is the recommended security architecture for OSI by ITU(International Telecommunication Union).
The OSI security architecture focuses on security attacks, mechanisms, and services.These can be defined as,
• Security attack: Any action that compromises
the security of information
owned by an organization.
• Security mechanism: A process (or a device
incorporating such a process) that
is designed to detect, prevent, or recover from a security
attack.
• Security service: A processing or communication
service that enhances the
security of the data processing systems and the information
transfers of an
organization. The services are intended to counter security
attacks, and they
make use of one or more security mechanisms to provide the
service.
Answer For The Second Question
2. The larger the symmetric key the stronger the key..........
Answer:True, why?
In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher).
Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), since the security of all algorithms can be violated by brute-force attacks. Ideally, the lower-bound on an algorithm's security is by design equal to the key length (that is, the security is determined entirely by the keylength).For instance, Triple DES was designed to have a 168 bit key, but an attack of complexity 2112 is now known. So key length does matter
Answer For The Third Question
3. An application level gateway that is hardened or secured..........
Answer, Firewall / Application proxy
An application-level gateway, also called an application proxy.
An application gateway or application level gateway (ALG) is a firewall proxy which provides network security. It filters incoming node traffic to certain specifications which mean that only transmitted network application data is filtered.
Answer For The Fourth Question
4. What is used to verify a functional requirement is met?.......
Answer:Analysis
A functional requirement defines a function of a system or its component, where a function is described as a specification of behavior between outputs and inputs
Use cases, entity relationship diagrams, and other models are built to validate the requirement by analyst.
Analysis is the verification of a product or system using models, calculations and testing equipment. Analysis allows someone to make predictive statements about the typical performance of a product or system based on the confirmed test results of a sample set or by combining the outcome of individual tests to conclude something new about the product or system.
Answer For The Fifth Question
5. Routers can be set up at the boundary between the internet and a system .........
Answer:True ,why?
The router is the gateway between the Internet and your home network.The main purpose of a router is to connect multiple networks and forward packets destined either for its own networks or other networks. A router is considered a layer-3 device because its primary forwarding decision is based on the information in the layer-3 IP packet, specifically the destination IP address.
1. Among other things the X.800 Security Architecture defines security services and security mechanisms that are...
Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...
TRUE/FALSE QUESTIONS: Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...
Chapter overview 1. Reasons for international trade Resources reasons Economic reasons Other reasons 2. Difference between international trade and domestic trade More complex context More difficult and risky Higher management skills required 3. Basic concept s relating to international trade Visible trade & invisible trade Favorable trade & unfavorable trade General trade system & special trade system Volume of international trade & quantum of international trade Commodity composition of international trade Geographical composition of international trade Degree / ratio of...