CSO Quiz 2a

Whatever  

24 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
In the early 1980s, the IEEE began work on developing computer network architecture standards. The work was called Project _____, and it quickly expanded into several different categories of network technology. 100 302 513 802
D
_____ was designed to ensure that only authorized parties can view transmitted wireless information. WEP MAC 802.11g WECA
A
The plaintext to be transmitted has a cyclic redundancy check (CRC) value calculated, which is a checksum based on the contents of the text. WEP calls this the ______ and appends it to the end of the text. integrity check value (ICV) keystream initialization vector (IV) pre-pended IV
1
In order to address growing wireless security concerns, in October 2003 the Wi-Fi Alliance introduced ______. WPA RC5 WEP2 AES
2
Regarding access control, a(n) _____ is a specific resource, such as a file or a hardware device. asset subject object operation
1
Known as _____, this practice requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals. job rotation implicit deny least privilege separation of duties
1
The principle of _____ in access control means that each user should be given only the minimal amount of privileges necessary to perform his or her job function. least privilege implicit deny separation of duties job rotation
1
_____ is the presentation of credentials or identification, typically performed when logging on to a system. Access Authorization Authentication Identification
1
______ is the verification of the credentials to ensure that they are genuine and not fabricated. Access Authorization Authentication Identification
1
_____ is granting permission for admittance. Authorization Access Authentication Identification
1
There are several types of OTPs. The most common type is a ______ OTP. challenge-based time-synchronized token-based biometric-based
1
_____ is a decentralized open source FIM that does not require specific software to be installed on the desktop. Windows Live ID OpenID NET Passport Windows CardSpace
1
The International Organization for Standardization (ISO) created a standard for directory services known as _____. X.400i X.459 X.500 X.589
1
______ is a very basic authentication protocol that was used to authenticate a user to a remote access server or to an Internet Service Provider (ISP). MS-CHAP EAP-MD5 EAP-TLS PAP
1
Known as ______, this in effect takes a snapshot of the security of the organization as it now stands. risk identification risk mitigation vulnerability appraisal threat identification
1