2009年3月11日星期三

CISSP Concept study 4

101 what type of malicious code launches itself when certain conditions(such as a specific date) are met?

Logic bomb

什么类型的malicious code 在一定条件下启动他自身(比如在一个特定的时间)

logic bomb 逻辑炸弹


102 what were the mechanism of action used by Robert T. Morris's Internet Worm of 1988?

the worm exploited vulnerabilities in the sendmail debug mode and finger daemon, launched password attacks, and exploited trust relationships between systems.

Morris's 蠕虫1988 使用的是什么机制?

该蠕虫利用的漏洞, sendmail的调试模式和手指守护进程,启动密码攻击,并利用信托关系系统。


103 where are passwords stored in an unix system?

in the /etc/passwd or /etc/shadow file


104 what term is used to describe hackers rooting through trash looking for useful information?

dumpster diving

什么词汇用来描述hacker从垃圾桶中寻找有用的资源?

垃圾堆跳水 dumpster diving


105 what is the cornerstone of computer security?

education

什么是计算机安全的基石?
教育


106 what are the three phases of the three-way handshake used by tcp/ip?

SYN, SYN/ACK, ACK


107 how does the teardrop attack operate?

it sends overlapping packet fragments to the victim machine.

泪滴(teardrop)是如何进行攻击运作?
它发出的数据包片段重叠的受害者机器。


108 what is the term used to describe a secret method used by a programmer to gain access to the system?

Trap door( or back door)活门/后门

什么词汇用来描述一个程序员获得一个系统的访问的秘密的方法


109 when is the XOR function true?

when only one of the input bits is true


110 what term describes a mathematical function that easily produces output values for each possible combination of inputs but makes it impossible to retrieve the input values?

one-way function



111 true of false? all ciphers are meant to obscure the meaning of a message.

True所有密码的目的是掩盖意义的信息


112 True or false? All codes are meant to obscure the meaning of a message

False


113 what occurs when a change in the plaintext results in multiple changes spread throughout the cipher text?

Diffusion


114 what is the code name of the project in which the national security Agency successfully broke a Soviet one-time pad system in the 1940s?

VENONA


115 what type of cipher is the Caesar cipher?

Simple substitution --代替


116 true or false? Modern cryptosystems rely upon the secrecy of the encryption algorithm

False


117 what is the length of the key used by the standard DES algorithm?

56 bits


118 how many rounds of encryption does DES utilize?

16


119 true or false? the IDEA algorithm is available free for noncommercial use.

True


120 what encryption algorithm was selected for the Advanced encryption standard(AES)?

Rijndael


121 what is the Diffie-Hellman algorithm is most commonly used for?

Key exchange


122 True or false? the Hashed Message Authentication Code provides nonrepudiation.

False


123 what are the three encryption algorithms supported by the Digital Signature standard?

DSA, RSA, and ECDSA

什么是加密算法的三所支持的数字签名标准


124 what ITU standard describes the contents of a digital certificate?

x.509


125 what is the process by which you are issued a digital certificate?

Enrollment

没有评论:

发表评论