1. (TCO 10) Secure hashing is also known as _____.
public-key cryptography
a message digest
Transport Layer Security
Secure Sockets Layer
IPSec
Question 2. 2. (TCO 10) Which of the following uses symmetric-key or shared-secret cryptography?
RSA
Diffie Hellman
MD5
PSA
Question 3. 3. (TCO 11) Firewalls can operate at all OSI layers except which of the following?
7 - application
4 - transport
3 - network
2 - data link
1 - physical
Question 4. 4. (TCO 11) Four general techniques used by firewalls are object control, direction control, behavior control, and _____.
flow control
subject control
access control
audit control
authentication control
Question 5. 5. (TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____.
software
remote procedure calls
agent technology
common interfaces
access to local audit records
Question 6. 6. (TCO 12) The Internet Engineering Task Force Intrusion Detection working group has developed a standard called the _____.
Intrusion Detection Standard
Intrusion Detection Framework
Intrusion Detection Data Model
Intrusion Detection Exchange Format
Intrusion Detection Data Format
Question 7. 7. (TCO 12) _____ intrusions are harder to detect than _____ intrusions.
Anomalous, misuse
Misuse, anomalous
Well-defined, unplanned
Well-planned, automated
Automated, well-planned
Question 8. 8. (TCO 13) Which form of malware is dependent on operating systems and replicating?
Trap door
Virus
Worm
Trojan
Logic bomb
Question 9. 9. (TCO 13) In which system life cycle phase should security policy be established?
Test and evaluation
Operations and maintenance
Requirements definition
Acquisition
Initiation
Question 10. 10. (TCO 13) _____ is a category of software that contains code which intends to wreak havoc on the host computer.
An antivirus program
Malware
A firewall
A logic bomb
A trojan horse