Front | Back |
In the early 1980s, the IEEE began work on developing computer network architecture standards. The work was called Project _____, and it quickly expanded into several different categories of network technology.
100
302
513
802
|
D
|
_____ was designed to ensure that only authorized parties can view transmitted wireless information.
WEP
MAC
802.11g
WECA
|
A
|
The plaintext to be transmitted has a cyclic redundancy check (CRC) value calculated, which is a checksum based on the contents of the text. WEP calls this the ______ and appends it to the end of the text.
integrity check value (ICV)
keystream
initialization vector (IV)
pre-pended IV
|
1
|
In order to address growing wireless security concerns, in October 2003 the Wi-Fi Alliance introduced ______.
WPA
RC5
WEP2
AES
|
2
|
Regarding access control, a(n) _____ is a specific resource, such as a file or a hardware device.
asset
subject
object
operation
|
1
|
Known as _____, this practice requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.
job rotation
implicit deny
least privilege
separation of duties
|
1
|
The principle of _____ in access control means that each user should be given only the minimal amount of privileges necessary to perform his or her job function.
least privilege
implicit deny
separation of duties
job rotation
|
1
|
_____ is the presentation of credentials or identification, typically performed when logging on to a system.
Access
Authorization
Authentication
Identification
|
1
|
______ is the verification of the credentials to ensure that they are genuine and not fabricated.
Access
Authorization
Authentication
Identification
|
1
|
_____ is granting permission for admittance.
Authorization
Access
Authentication
Identification
|
1
|
There are several types of OTPs. The most common type is a ______ OTP.
challenge-based
time-synchronized
token-based
biometric-based
|
1
|
_____ is a decentralized open source FIM that does not require specific software to be installed on the desktop.
Windows Live ID
OpenID
NET Passport
Windows CardSpace
|
1
|
The International Organization for Standardization (ISO) created a standard for directory services known as _____.
X.400i
X.459
X.500
X.589
|
1
|
______ is a very basic authentication protocol that was used to authenticate a user to a remote access server or to an Internet Service Provider (ISP).
MS-CHAP
EAP-MD5
EAP-TLS
PAP
|
1
|
Known as ______, this in effect takes a snapshot of the security of the organization as it now stands.
risk identification
risk mitigation
vulnerability appraisal
threat identification
|
1
|