Exam 1: Introduction

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________ is defined as "the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources".

Free
(Short Answer)
4.9/5
(34)
Correct Answer:
Verified

Computer Security

__________ attacks attempt to alter system resources or affect their operation.


Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

A

There is a natural tendency on the part of users and system managers to perceive little benefit from security investment until a security failure occurs.

Free
(True/False)
4.9/5
(25)
Correct Answer:
Verified

True

A connection-oriented integrity service deals with individual messages without regard to any larger context and generally provides protection against message modification only.

(True/False)
4.8/5
(31)

In developing a particular security mechanism or algorithm one must always consider potential attacks on those security features.

(True/False)
4.8/5
(35)

With the introduction of the computer the need for automated tools for protecting files and other information stored on the computer became evident.

(True/False)
4.8/5
(34)

The prevention of unauthorized use of a resource is __________ .


(Multiple Choice)
4.7/5
(33)

Data integrity is the protection of data from unauthorized disclosure.

(True/False)
4.9/5
(35)

A __________ is data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.

(Short Answer)
4.7/5
(29)

__________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.


(Multiple Choice)
4.8/5
(41)

A loss of _________ is the disruption of access to or use of information or an information system.

(Short Answer)
4.7/5
(33)

_________ is a professional membership society with worldwide organizational and individual membership that provides leadership in addressing issues that confront the future of the Internet and is the organization home for the groups responsible for Internet infrastructure standards, including the IETF and the IAB.

(Multiple Choice)
4.9/5
(29)

A __________ attack attempts to learn or make use of information from the system but does not affect system resources.


(Short Answer)
4.8/5
(33)

The protection of data from unauthorized disclosure is _________ .


(Multiple Choice)
4.8/5
(30)

__________ prevents either sender or receiver from denying a transmitted message; when a message is sent the receiver can prove that the alleged sender in fact sent the message and when a message is received the sender can prove that the alleged receiver in fact received the message.


(Short Answer)
4.8/5
(33)

A __________ takes place when one entity pretends to be a different entity.


(Multiple Choice)
4.8/5
(30)

The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity is _________ .

(Multiple Choice)
4.9/5
(44)

In the context of network security, _________ is the ability to limit and control the access to host systems and applications via communications links.


(Short Answer)
4.8/5
(35)

__________ is a U.S.federal agency that deals with measurement science, standards, and technology related to U.S.government use and to the promotion of U.S.private sector innovation.

(Multiple Choice)
5.0/5
(36)

The __________ is a worldwide federation of national standards bodies that promote the development of standardization and related activities with a view to facilitating the international exchange of goods and services and to developing cooperation in the spheres of intellectual, scientific, technological, and economic activity.


(Essay)
4.7/5
(40)
Showing 1 - 20 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)