Exam 1: Computer Systems Overview

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Replay,masquerade,modification of messages,and denial of service are example of _________ attacks.

Free
(Essay)
4.9/5
(50)
Correct Answer:
Verified

active

Computer security is protection of the integrity,availability,and confidentiality of information system resources.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

True

A __________ is data appended to,or a cryptographic transformation of,a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.

Free
(Essay)
4.7/5
(29)
Correct Answer:
Verified

digital signature

X.800 architecture was developed as an international standard and focuses on security in the context of networks and communications.

(True/False)
4.8/5
(28)

Security mechanisms typically do not involve more than one particular algorithm or protocol.

(True/False)
4.8/5
(36)

Assurance is the process of examining a computer product or system with respect to certain criteria.

(True/False)
4.8/5
(27)

__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

(Multiple Choice)
4.8/5
(32)

The _________ prevents or inhibits the normal use or management of communications facilities.

(Multiple Choice)
4.9/5
(36)

The more critical a component or service,the higher the level of availability required.

(True/False)
4.9/5
(38)

A ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations,organizational assets,or individuals.

(Multiple Choice)
4.9/5
(32)

The "A" in the CIA triad stands for "authenticity".

(True/False)
4.8/5
(33)

__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

(Multiple Choice)
4.7/5
(38)

A(n)__________ is an action,device,procedure,or technique that reduces a threat,a vulnerability,or an attack by eliminating or preventing it,by minimizing the harm it can cause,or by discovering and reporting it so that correct action can be taken.

(Multiple Choice)
4.7/5
(37)

Contingency planning is a functional area that primarily requires computer security technical measures.

(True/False)
4.9/5
(35)

A(n)_________ is any means taken to deal with a security attack.

(Essay)
4.9/5
(38)

A flaw or weakness in a system's design,implementation,or operation and management that could be exploited to violate the system's security policy is a(n)__________.

(Multiple Choice)
4.9/5
(38)

________ assures that a system performs its intended function in an unimpaired manner,free from deliberate or inadvertent unauthorized manipulation of the system.

(Multiple Choice)
4.8/5
(38)

__________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity,availability,and confidentiality of information system resources.

(Essay)
4.8/5
(29)

An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.

(Multiple Choice)
4.9/5
(30)

Misappropriation and misuse are attacks that result in ________ threat consequences.

(Essay)
4.9/5
(28)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)