Exam 1: Computer and Network Security Concepts
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
An ___________ is any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
(Short Answer)
4.8/5
(30)
Encryption algorithms that use a single key are referred to as ___________ encryption algorithms.
(Short Answer)
4.8/5
(37)
A _________ is a value computed with a cryptographic algorithm and associated with a data object in such a way that any recipient of the data can use the signature to verify the data's origin and integrity.
(Multiple Choice)
4.7/5
(41)
A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial-of-service attacks.
(Multiple Choice)
4.8/5
(28)
Information security and network security are subsets of
cybersecurity.
(True/False)
4.8/5
(34)
A loss of __________ is the unauthorized disclosure of information.
(Multiple Choice)
4.9/5
(31)
Cryptographic algorithms can be divided into three categories: keyless, __________ , and two-key.
(Short Answer)
4.8/5
(30)
Authentication exchange is the use of a trusted third party to
assure certain properties of a data exchange.
(True/False)
4.9/5
(30)
A ______________ is a process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
(Short Answer)
4.7/5
(39)
Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________ .
(Multiple Choice)
4.7/5
(30)
__________ is a measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of 1) the adverse impacts that would arise if the circumstance or event occurs; and 2) the likelihood of occurrence.
(Short Answer)
4.8/5
(35)
A __________ is any action that compromises the security of information owned by an organization.
(Multiple Choice)
4.9/5
(33)
__________ is the protection of transmitted data from passive attacks.
(Multiple Choice)
4.8/5
(28)
__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
(Short Answer)
4.9/5
(31)
A(n) __________ is any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
(Multiple Choice)
4.8/5
(36)
Passive attacks are very easy to detect because they involve
alteration of the dat
A.
(True/False)
4.8/5
(31)
A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .
(Multiple Choice)
4.7/5
(28)
Cybersecurity strives to ensure the attainment and maintenance of
the security properties of the organization and users' assets against relevant security risks in the cyberspace environment.
(True/False)
4.8/5
(41)
the connection-oriented integrity service addresses both
message stream modification and denial of service.
(True/False)
4.9/5
(38)
Security services implement security policies and are
implemented by security mechanisms.
(True/False)
4.8/5
(35)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)