Deck 11: Security Topics
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 11: Security Topics
1
9)All e-mail servers communicate with each other using ____.
A) SSH
B) FTP
C) SMTP
D) HTTP
A) SSH
B) FTP
C) SMTP
D) HTTP
C
2
15)A ____ is a statement of security the system should enforce when implemented correctly.
A) security policy
B) security model
C) security plan
D) security tree
A) security policy
B) security model
C) security plan
D) security tree
A
3
19)The OSI ____ layer provides switching and routing technologies for transmitting data from node to node.
A) transport
B) network
C) session
D) data link
A) transport
B) network
C) session
D) data link
B
4
7)A SMTP server listens on a well-known TCP port ____ for an incoming request.
A) 21
B) 25
C) 110
D) 115
A) 21
B) 25
C) 110
D) 115
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
18)The OSI ____ layer provides the mechanisms to establish, manage, and terminate connections between applications.
A) session
B) transport
C) network
D) presentation
A) session
B) transport
C) network
D) presentation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
6)____ is a simple text-based protocol where one or more recipients of a message are specified and then the message text is transferred.
A) SMTP
B) TCP
C) IP
D) SSL
A) SMTP
B) TCP
C) IP
D) SSL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
4)PGP and S/MIME is compatible at the protocol level.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
12)The OS provides its services through a well-defined ____.
A) GUI
B) UI
C) command line interface
D) API
A) GUI
B) UI
C) command line interface
D) API
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
8)The SMTP server supports two common protocols for e-mail retrieval: IMAP and ____.
A) TCP
B) IP
C) ICMP
D) POP
A) TCP
B) IP
C) ICMP
D) POP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
13)Users can interact directly with the OS through a user interface such as a command language or a(n) ____.
A) GUI
B) API
C) DLL
D) DBMS
A) GUI
B) API
C) DLL
D) DBMS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
Security applies to every aspect of computing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
2)E-mail is one of the most secure types of communication media.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
10)The two common database formats are relational, using constructs such as tables, views, and procedures, and ____, using objects and hierarchy.
A) procedure-oriented
B) object-oriented
C) hierarchy-based
D) view-based
A) procedure-oriented
B) object-oriented
C) hierarchy-based
D) view-based
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
5)The DBMS should provide fine-grained access control besides the file permissions that control the OS user's access.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
14)____ and segmentation can provide a way of managing main memory.
A) Sectoring
B) Clustering
C) Paging
D) Partitioning
A) Sectoring
B) Clustering
C) Paging
D) Partitioning
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
20)The OSI ____ layer defines all electrical and physical specifications for devices.
A) network
B) application
C) data link
D) physical
A) network
B) application
C) data link
D) physical
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
11)____ is the first step in providing security for databases.
A) Access control
B) ACL
C) Authentication
D) Authorization
A) Access control
B) ACL
C) Authentication
D) Authorization
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
3)E-mail messages are stored in plain, unencrypted text on SMTP servers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
16)A ____ is a representation of the security policy of the OS.
A) security plan
B) security tree
C) security infrastructure
D) security model
A) security plan
B) security tree
C) security infrastructure
D) security model
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
17)A ____ is a group of computers and peripherals connected together to communicate with each other and to share information and resources.
A) domain
B) computer network
C) computer cluster
D) computer partition
A) domain
B) computer network
C) computer cluster
D) computer partition
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
31)A(n) ____________________ is the fundamental component of the computer system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
22)____ is a network layer protocol. It performs tasks such as routing, carrying datagrams, and mapping an Internet address to a physical network address.
A) TCP
B) IP
C) UDP
D) ICMP
A) TCP
B) IP
C) UDP
D) ICMP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
33)What are the scenarios that can result from using SMTP protocol for delivering e-mail messages?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
36)Describe the mail access vulnerability.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
41)What are the four types of separation supported by an OS?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
25)A(n) ____ firewall provides the highest level of security and provides full application layer awareness without interposing a proxy server.
A) application gateway
B) route-filtering
C) packet-filtering
D) proxy
A) application gateway
B) route-filtering
C) packet-filtering
D) proxy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
29)A(n) ____________________ is a repository or store of data that has an internal organization using a particular format.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
35)Describe the inter-mail server vulnerability.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
26)____ is a set of automated methods for recognizing or verifying the identity of a person based on a physiological or behavioral characteristic.
A) Multifactor authentication
B) Database authentication
C) Biometrics
D) RADIUS
A) Multifactor authentication
B) Database authentication
C) Biometrics
D) RADIUS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
30)The term ____________________ is applied to a software product that manages the creation, modification, and deletion of database objects such as databases instances and users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
28)____________________ is a standard for public key encryption and signing of e-mail encapsulated in MIME.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
38)What are the e-mail security problems addressed by asymmetric key encryption used in conjunction with SSL?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
24)A(n) ____ firewall scans all network packets and blocks all but selected network traffic according to policies set in the firewall.
A) proxy
B) route-filtering
C) application gateway
D) packet-filtering
A) proxy
B) route-filtering
C) application gateway
D) packet-filtering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
40)Why are the security measures taken by DBMSs unlikely to be sufficient to prevent attacks by themselves?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
27)____________________ is the de facto standard for e-mail transmission.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
21)____ is a name given to the collection of networking protocols that have been used to construct the global Internet.
A) SSL
B) HTTPS
C) TCP/IP
D) HTTP
A) SSL
B) HTTPS
C) TCP/IP
D) HTTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
39)What are the authentication considerations for network access regarding mobile devices?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
23)The ____ attack enables one host to claim that it has the IP address of another. It is most effective where trusted relationships exist between machines networked using TCP/IP.
A) denial of service
B) TCP SYN flood
C) IP spoofing
D) IP session hijacking
A) denial of service
B) TCP SYN flood
C) IP spoofing
D) IP session hijacking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
34)Describe the process of receiving an e-mail.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
37)Briefly describe e-mail identity spoofing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
What are the steps to develop a secure OS?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck