Exam 4: Information Security and Encryption

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Examples of User Policies is/are:

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

D

Which of the following attack can actively modify communications or data?

Free
(Multiple Choice)
4.9/5
(22)
Correct Answer:
Verified

C

In layer, vulnerabilities are directly associated with physical access to networks and hardware.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

A

______________ attack is when original data is modified and malicious data is inserted

(Multiple Choice)
4.7/5
(41)

The information that gets transformed in encryption is

(Multiple Choice)
4.9/5
(45)

From the options below, which of them is not a threat to information security?

(Multiple Choice)
4.7/5
(35)

Release of Message Content and Traffic analysis are type of :

(Multiple Choice)
4.8/5
(38)

The full form of OSI is OSI model is ____________________________

(Multiple Choice)
4.8/5
(46)

____________________________Policy ensures that the organization is maintaining standards set by specific industry regulation.

(Multiple Choice)
4.9/5
(42)

Compromising confidential information comes under __________________________________________ 

(Multiple Choice)
4.8/5
(34)

When original data is changed to make it non-meaningful by attacker it is known as

(Multiple Choice)
4.9/5
(39)

Which of the following are not security policies?

(Multiple Choice)
4.9/5
(25)

Modification of Data is done in:

(Multiple Choice)
4.9/5
(37)

A process of making the encrypted text readable again.

(Multiple Choice)
4.9/5
(40)

ATM pin while withdrawing money is an example of using:

(Multiple Choice)
4.8/5
(33)

Study of creating a d using encryption and decryption techniques.

(Multiple Choice)
4.9/5
(37)

If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

(Multiple Choice)
4.8/5
(37)

If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

(Multiple Choice)
4.9/5
(39)

What defines the restrictions on employees such as usage?

(Multiple Choice)
4.8/5
(39)

Which is the type of attack when Network is made unavailable for user

(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 24
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)