Exam 1: Computer and Network Security Concepts

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________ is the property of a system, or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system.

Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Verified

Availability

A __________ takes place when one entity pretends to be a different entity.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

B

__________ is a characteristic of an entity that reflects the degree to which that entity is deserving of trust.

Free
(Short Answer)
4.7/5
(33)
Correct Answer:
Verified

Trustworthiness

__________ prevents either sender or receiver from denying a transmitted message.

(Short Answer)
4.8/5
(23)

the emphasis in dealing with active attacks is on prevention rather than detection.

(True/False)
4.9/5
(35)

Integrity can apply to a stream of messages, a single message, or selected fields within a message.

(True/False)
4.9/5
(26)

Security attacks are classified as either passive or aggressive.

(True/False)
4.8/5
(44)

two types of __________ attacks are the release of message contents and traffic analysis.

(Multiple Choice)
4.8/5
(37)

the general security objectives of cybersecurity comprise the following: availability; integrity, which may include data authenticity and nonrepudiation; and __________ .

(Short Answer)
4.9/5
(39)

_________ is a branch of mathematics that deals with the transformation of dat A.

(Multiple Choice)
4.8/5
(38)

A __________ attack attempts to learn or make use of information from the system but does not affect system resources.

(Short Answer)
4.8/5
(32)

Data authenticity assures that private or confidential information is not made available or disclosed to unauthorized individuals.

(True/False)
4.9/5
(36)

the emphasis in dealing with __________ attacks is on prevention rather than detection.

(Short Answer)
4.8/5
(38)

A loss of integrity is the unauthorized modification or destruction of information.

(True/False)
4.7/5
(33)

_______ is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyberspace environment and organization and users' assets.

(Multiple Choice)
4.9/5
(38)

A __________ is a hardware and/or software capability that limits access between a network and device attached to the network, in accordance with a specific security policy.

(Multiple Choice)
4.8/5
(38)

the denial of service prevents or inhibits the normal use or management of communication facilities.

(True/False)
4.9/5
(35)

the OSI security architecture focuses on security attacks, mechanisms, and services.

(True/False)
4.8/5
(36)

the OSI security architecture focuses on security attacks, mechanisms, and services.

(True/False)
4.9/5
(34)

A __________ number generator produces a deterministic sequence of numbers or bits that has the appearance of being a truly random sequence.

(Short Answer)
4.8/5
(35)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)