Exam 1: Computer and Network Security Concepts
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
__________ is the property of a system, or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system.
Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Availability
A __________ takes place when one entity pretends to be a different entity.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
B
__________ is a characteristic of an entity that reflects the degree to which that entity is deserving of trust.
Free
(Short Answer)
4.7/5
(33)
Correct Answer:
Trustworthiness
__________ prevents either sender or receiver from denying a transmitted message.
(Short Answer)
4.8/5
(23)
the emphasis in dealing with active attacks is on prevention
rather than detection.
(True/False)
4.9/5
(35)
Integrity can apply to a stream of messages, a single message, or
selected fields within a message.
(True/False)
4.9/5
(26)
two types of __________ attacks are the release of message contents and traffic analysis.
(Multiple Choice)
4.8/5
(37)
the general security objectives of cybersecurity comprise the following: availability; integrity, which may include data authenticity and nonrepudiation; and __________ .
(Short Answer)
4.9/5
(39)
_________ is a branch of mathematics that deals with the transformation of dat A.
(Multiple Choice)
4.8/5
(38)
A __________ attack attempts to learn or make use of information from the system but does not affect system resources.
(Short Answer)
4.8/5
(32)
Data authenticity assures that private or confidential information is
not made available or disclosed to unauthorized individuals.
(True/False)
4.9/5
(36)
the emphasis in dealing with __________ attacks is on prevention rather than detection.
(Short Answer)
4.8/5
(38)
A loss of integrity is the unauthorized modification or destruction
of information.
(True/False)
4.7/5
(33)
_______ is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyberspace environment and organization and users' assets.
(Multiple Choice)
4.9/5
(38)
A __________ is a hardware and/or software capability that limits access between a network and device attached to the network, in accordance with a specific security policy.
(Multiple Choice)
4.8/5
(38)
the denial of service prevents or inhibits the normal use or
management of communication facilities.
(True/False)
4.9/5
(35)
the OSI security architecture focuses on security attacks,
mechanisms, and services.
(True/False)
4.8/5
(36)
the OSI security architecture focuses on security attacks,
mechanisms, and services.
(True/False)
4.9/5
(34)
A __________ number generator produces a deterministic sequence of numbers or bits that has the appearance of being a truly random sequence.
(Short Answer)
4.8/5
(35)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)