Podcast
Questions and Answers
Which access control model enables the resource owner to specify access permissions for subjects?
Which access control model enables the resource owner to specify access permissions for subjects?
What are the layers of the TCP/IP model from bottom to top?
What are the layers of the TCP/IP model from bottom to top?
If the client's private key is Kc = 13 and the public parameter is p = 1013 with generator 2, what is the client's public key?
If the client's private key is Kc = 13 and the public parameter is p = 1013 with generator 2, what is the client's public key?
What shared secret information is exchanged between the client and server if the server's private key is Ks = 11?
What shared secret information is exchanged between the client and server if the server's private key is Ks = 11?
Signup and view all the answers
What is the encryption key in hexadecimal form after applying MD5 to the shared secret information with ASCII encoding?
What is the encryption key in hexadecimal form after applying MD5 to the shared secret information with ASCII encoding?
Signup and view all the answers
What does the Enigma machine allow for in its encryption process?
What does the Enigma machine allow for in its encryption process?
Signup and view all the answers
In the context of the Advanced Encryption Standard (AES), which component is responsible for performing substitutions on the input data?
In the context of the Advanced Encryption Standard (AES), which component is responsible for performing substitutions on the input data?
Signup and view all the answers
Which mode of operation does not allow for probabilistic encryption?
Which mode of operation does not allow for probabilistic encryption?
Signup and view all the answers
What is indicated by the term 'avalanche effect' in cryptography?
What is indicated by the term 'avalanche effect' in cryptography?
Signup and view all the answers
Which statement about MAC algorithms is incorrect?
Which statement about MAC algorithms is incorrect?
Signup and view all the answers
When utilizing block ciphers, what is a crucial step to maintain confidentiality?
When utilizing block ciphers, what is a crucial step to maintain confidentiality?
Signup and view all the answers
What is the significance of the Rijndael S-box in the AES?
What is the significance of the Rijndael S-box in the AES?
Signup and view all the answers
How does the Counter mode (CTR) function in terms of encryption?
How does the Counter mode (CTR) function in terms of encryption?
Signup and view all the answers
Which access control model uses attributes of the user, resource, and environment to control access?
Which access control model uses attributes of the user, resource, and environment to control access?
Signup and view all the answers
What does a low false nonmatch rate in biometric systems primarily ensure?
What does a low false nonmatch rate in biometric systems primarily ensure?
Signup and view all the answers
Is multi-factor authentication generally more secure than single-factor authentication?
Is multi-factor authentication generally more secure than single-factor authentication?
Signup and view all the answers
Which statement regarding file permissions is incorrect based on the output of 'ls -l /sbin'?
Which statement regarding file permissions is incorrect based on the output of 'ls -l /sbin'?
Signup and view all the answers
Which authentication factor is demonstrated when Martin uses his employee card?
Which authentication factor is demonstrated when Martin uses his employee card?
Signup and view all the answers
What is the consequence of restricting user passwords to a length of only 8 digits as done by Olav?
What is the consequence of restricting user passwords to a length of only 8 digits as done by Olav?
Signup and view all the answers
Which access control model is most appropriate for granting user access based on job functions?
Which access control model is most appropriate for granting user access based on job functions?
Signup and view all the answers
What character set was used in the password entry generated by Windows LAN Manager?
What character set was used in the password entry generated by Windows LAN Manager?
Signup and view all the answers
What is the numerical representation of the permission drwxr-xr-x for a directory?
What is the numerical representation of the permission drwxr-xr-x for a directory?
Signup and view all the answers
What role does salt play in common password storage techniques?
What role does salt play in common password storage techniques?
Signup and view all the answers
What type of entity is described as capable of accessing a resource in an access control system?
What type of entity is described as capable of accessing a resource in an access control system?
Signup and view all the answers
What is the default umask value for newly created directories in Linux systems?
What is the default umask value for newly created directories in Linux systems?
Signup and view all the answers
How does salted hashing contribute to the security of stored passwords?
How does salted hashing contribute to the security of stored passwords?
Signup and view all the answers
What does the term 'false acceptance rate' refer to in biometric authentication?
What does the term 'false acceptance rate' refer to in biometric authentication?
Signup and view all the answers
Which access control model compares security labels to determine access rights?
Which access control model compares security labels to determine access rights?
Signup and view all the answers
Which of the following best describes the common practice of hashing passwords with a salt?
Which of the following best describes the common practice of hashing passwords with a salt?
Signup and view all the answers
What significantly distinguishes public-key cryptography from symmetric encryption?
What significantly distinguishes public-key cryptography from symmetric encryption?
Signup and view all the answers
What does a public key certificate primarily consist of?
What does a public key certificate primarily consist of?
Signup and view all the answers
Who were the developers behind the RSA public-key scheme?
Who were the developers behind the RSA public-key scheme?
Signup and view all the answers
What is the primary purpose of the Diffie-Hellman key exchange algorithm?
What is the primary purpose of the Diffie-Hellman key exchange algorithm?
Signup and view all the answers
What is the limitation of the Diffie-Hellman scheme regarding the messages exchanged?
What is the limitation of the Diffie-Hellman scheme regarding the messages exchanged?
Signup and view all the answers
What is the main goal of digital signatures in public-key cryptography?
What is the main goal of digital signatures in public-key cryptography?
Signup and view all the answers
Which of the following best describes the RSA algorithm's method of operation?
Which of the following best describes the RSA algorithm's method of operation?
Signup and view all the answers
In symmetric key cryptography, which statement is true?
In symmetric key cryptography, which statement is true?
Signup and view all the answers
What umask value should be set to achieve the desired directory permissions of rwxrwxr--?
What umask value should be set to achieve the desired directory permissions of rwxrwxr--?
Signup and view all the answers
What is the first step in establishing a TCP connection using the TCP three-way handshake?
What is the first step in establishing a TCP connection using the TCP three-way handshake?
Signup and view all the answers
What does the Server send back after it receives the SYN packet from the Client?
What does the Server send back after it receives the SYN packet from the Client?
Signup and view all the answers
Which umask would result in directory permissions of 755?
Which umask would result in directory permissions of 755?
Signup and view all the answers
What primary function does DHCP serve in computer networking?
What primary function does DHCP serve in computer networking?
Signup and view all the answers
Which umask would result in 774 directory permissions?
Which umask would result in 774 directory permissions?
Signup and view all the answers
In the context of TCP connection establishment, what does the acronym 'SYN' stand for?
In the context of TCP connection establishment, what does the acronym 'SYN' stand for?
Signup and view all the answers
What is the final step in the TCP three-way handshake after the Client receives the SYN-ACK?
What is the final step in the TCP three-way handshake after the Client receives the SYN-ACK?
Signup and view all the answers
Study Notes
INF 140 - Introduction to Cyber Security
- Course is structured around quizzes and previous exams
- Modules cover various cybersecurity aspects
- Module 1: Overview of Cybersecurity, encompassing fundamental security design principles and attributes
- Module 2: Cryptographic tools - focusing on symmetric primitives
- Module 3: Cryptographic tools - focusing on public-key cryptography
- Module 4: User authentication
- Module 5: Access control and auditing
- Module 6: Network protocols and attacks
- Module 7: Firewalls
- Module 8: Security protocol - application security and TLS
- Module 9: Network authentication and WLAN security
- Module 10: Intrusion Detection System (IDS)
- Module 11: Malware
Quiz 1 - Overview
- Cybersecurity protects five key attributes of assets in cyberspace
- Authenticity: refers to genuine or verifiable property
- Security design principles: Open design, Principle of least privilege, Separation of privilege, etc
- Layering: multiple, overlapping protection approaches across people, technology, and operational aspects of information systems
- Adversary: Individual, group, organization, or government that conducts or intends detrimental actions against security attributes of assets
- Sabotage: Techniques intended to limit or impair the operational effectiveness of adversarial or undesirable activity within a system
- Weakness/vulnerability: refers to a weakness in an information system, procedures, internal controls, etc
Quiz 2 - Symmetric Crypto
- Key stream: 8-bit stream cipher string 01010011
- Playfair Cipher: encryption matrix used to encrypt plaintext "SECURITY"
Quiz 3 - Asymmetric Crypto
- Public-Key Cryptography (PKC): More secure than symmetric cryptography, offers key sharing convenience, and non-repudiation
- RSA: Integer factorization is a key element of security, public key e must be coprime to n.
Quiz 4 - User Authentication
- Multi-factor authentication: more secure than single-factor authentication
- User authentication methods: What a user knows, is, has, does
- Techniques involved in authentication: user ID, salt, hash(salt, password)
Quiz 5- Access Control
- Access control models: ABAC, DAC, and RBAC, use attributes of user, resources and conditions
- Administrators need to define permissions, policies and security standards for each access control model
Quiz 6 - Network Protocols and Attacks
- TCP/IP layers
- Network devices and protocols.
- Attacks: DOS and DDoS, spoofing
Quiz 7- Firewalls
- Firewall rules to block traffic incoming or outgoing based on source IP, destination IP, destination port, etc
Quiz 8 - Cryptographic Security and TLS
- Protocol for secure communication over TCP
- Handshake protocol, Change Cipher Spec Protocol, Alert Protocol
- HTTPS operates on application layer, TLS/SSL operates in Transport Layer
Quiz 9 - Network Authentication and WLAN Security
- Protocol for authentication: Password-based, Challenge-Handshake (CHAP), Extensible Authentication Protocol (EAP)
- AAA standards: RADIUS, Kerberos
- Public key systems are common in secured access
Quiz 10 - Intrusion Detection System (IDS)
- Intrusion detection and prevention systems (IDS/IPS) detect unauthorized activity in the system
- Intrusions might include: masquerader, misfeasor, clandestine user
- Detection methods include: anomaly detection, and signature detection
Quiz 11 - Malware
- Malicious software (Malware) targeting Confidentiality, Integrity, and availability
- Types of malware include: Adware, Attack Kits, Backdoors, Downloaders, Exploits, Flooders(DoS Client), Keyloggers, Macro Virus, Mobile Code, Rootkits, Spammers, Spyware, and Trojan Horses
- Malware propagation techniques: Social Engineering
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on access control models, TCP/IP layers, public key generation, and encryption techniques in network security. This quiz covers essential concepts and technical details that are foundational to understanding secure communications.