CSS 111 - Introduction to Information System Security
Review for Second Test
The following questions are provided to help you study for
the second test. Do not expect to see these exact questions on the test.
- What is access control about? What are three actions that
are typically taken by administrators regarding access control?
- In which kind of access control might users permit or deny
access to assets? Which kind of access control is the most restrictive?
Which kind of access control might be linked to roles or group
- If a user is authorized but not authenticated why can't
they access resources? How about if they are authenticated but not
- Give an example of a security measure that depends on
- something you know
- something you have
- something you are
- What does it mean to use two level authentication?
- On what layer of the OSI model do packet filtering firewalls function?
- What are three elements, normally found in a packet, that a firewall might base a rejection on?
- What makes a firewall a "static firewall"?
- What would make a firewall dynamic?
- What kind of traffic do stateful firewalls watch for and reject?
- What is the FTP protocol used for?
- What is the SMTP protocol used for?
- Which layer of the OSI model does not have a type of firewall associated with it?
- The text says firewalls should not be configurable from a part of our network. Which part?
- What kind of product is SurfControl? Why would you install a product like that?
- What kind of network access does a RADIUS server support?
- What is the difference between a trusted VPN and a secure VPN?
- What is the general formula the book used to calculate a Cost Benefit Analysis?
- What is the difference between intrusion detection and intrusion prevention?
- If we have installed a host-based IDPS, what assets can we expect it to protect?
- What is a honeypot supposed to do?
- What does a port scanner do? Which kind of firewall should be looking for traffic from a hacker who has used a port scanner?
- What does a packet sniffer do? What else might it be
called? What are the three rules from the text about using a packet
- What is the overall IEEE standard that applies to wireless networking?
- Define plaintext and ciphertext.
- Why is a Caesar cipher easy to crack?
- What general kind of cipher is the Caesar cipher an example of?
- What is hashing? What does hashing do that makes it harder to crack?
- How is a symmetric algorithm system different from an asymmetric system? What must be done in both cases to defeat it?
- What are the three symmetric algorithms that the text discussed?
- What common web transaction uses an asymmetric encryption algorithm?
- What is the value of authentication in PKI?
- What is the meaning of nonrepudiation?
- What role does a certificate authority play in PKI?
- What is PKI?
- What should happen when a certificate is reported as being hacked?
- Why can we say that Pretty Good Privacy uses both symmetric and asymmetric keys?
- What does steganography mean? Why is this likely to require more file space than other encryption methods?
- You are setting up a wireless access point. It offers WEP,
WPA, and WPA2 as encryption choices. Should you have a preference for
which one to use? Why?
- How do ID badges provide physical security? What about doors whose locks are opened by an ID badge?
- What is a tailgater? How might you avoid allowing this activity?
- What does a fail-safe electronic lock do when there is a
power failure? How about a fail-secure lock? Which was on the vault in
the Nakatomi Plaza?
- What is a mantrap? Why would you use one?
- What is a plenum?
- What kind of fire detection depends on human action?
- What is the difference between flame detection and thermal fire detection?
- What are the four standard US classes for fire extinguishers?
- The video I showed in class for water mist points out a
problem with this type of system, and with sprinklers as well. What is
- Gas dispersant systems can be effective, but what is their specific danger?
- How might data be intercepted by direct observation?
- What are two ways that data transmission might be intercepted?
- Where are portable devices most often stolen? What does this tell you about security for such devices?