Exam 1: Computer and Network Security Concepts

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An ___________ is any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.

(Short Answer)
4.8/5
(30)

Encryption algorithms that use a single key are referred to as ___________ encryption algorithms.

(Short Answer)
4.8/5
(37)

A _________ is a value computed with a cryptographic algorithm and associated with a data object in such a way that any recipient of the data can use the signature to verify the data's origin and integrity.

(Multiple Choice)
4.7/5
(41)

A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial-of-service attacks.

(Multiple Choice)
4.8/5
(28)

Information security and network security are subsets of cybersecurity.

(True/False)
4.8/5
(34)

A loss of __________ is the unauthorized disclosure of information.

(Multiple Choice)
4.9/5
(31)

Cryptographic algorithms can be divided into three categories: keyless, __________ , and two-key.

(Short Answer)
4.8/5
(30)

Authentication exchange is the use of a trusted third party to assure certain properties of a data exchange.

(True/False)
4.9/5
(30)

A ______________ is a process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.

(Short Answer)
4.7/5
(39)

Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________ .

(Multiple Choice)
4.7/5
(30)

__________ is a measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of 1) the adverse impacts that would arise if the circumstance or event occurs; and 2) the likelihood of occurrence.

(Short Answer)
4.8/5
(35)

A __________ is any action that compromises the security of information owned by an organization.

(Multiple Choice)
4.9/5
(33)

__________ is the protection of transmitted data from passive attacks.

(Multiple Choice)
4.8/5
(28)

__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

(Short Answer)
4.9/5
(31)

A(n) __________ is any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

(Multiple Choice)
4.8/5
(36)

Passive attacks are very easy to detect because they involve alteration of the dat A.

(True/False)
4.8/5
(31)

A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .

(Multiple Choice)
4.7/5
(28)

Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and users' assets against relevant security risks in the cyberspace environment.

(True/False)
4.8/5
(41)

the connection-oriented integrity service addresses both message stream modification and denial of service.

(True/False)
4.9/5
(38)

Security services implement security policies and are implemented by security mechanisms.

(True/False)
4.8/5
(35)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)