Exam 1: Overview
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
The emphasis in dealing with active attacks is on prevention rather than detection.
Free
(True/False)
4.9/5
(33)
Correct Answer:
False
"The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity,availability and confidentiality of information system resources" is the definition of _________ .
Free
(Essay)
4.8/5
(28)
Correct Answer:
computer security
An __________ attack attempts to alter system resources or affect their operation.
Free
(Essay)
4.9/5
(42)
Correct Answer:
active
The three concepts that form what is often referred to as the CIA triad are ________ .These three concepts embody the fundamental security objectives for both data and for information and computing services.
(Multiple Choice)
4.8/5
(31)
In the United States,the release of student grade information is regulated by the __________ .
(Essay)
4.9/5
(34)
A ___________ is any process,or a device incorporating such a process,that is designed to detect,prevent,or recover from a security attack.Examples are encryption algorithms,digital signatures and authentication protocols.
(Essay)
4.9/5
(34)
A __________ is any action that compromises the security of information owned by an organization.
(Multiple Choice)
4.8/5
(32)
__________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.
(Multiple Choice)
4.9/5
(32)
The __________ service is concerned with assuring the recipient that the message is from the source that it claims to be from.This service must also assure that the connection is not interfered with in such a way that a third party can masquerade as one of the two legitimate parties for the purposes of unauthorized transmission or reception.
(Essay)
4.8/5
(37)
Authentication protocols and encryption algorithms are examples of security mechanisms.
(True/False)
4.8/5
(40)
An)__________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial- of- service attacks.
(Multiple Choice)
4.9/5
(33)
The field of network and Internet security consists of measures to deter,prevent,detect and correct security violations that involve the transmission of information.
(True/False)
4.9/5
(30)
A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .
(Multiple Choice)
4.9/5
(33)
The OSI security architecture was not developed as an international standard,therefore causing an obstacle for computer and communication vendors when developing security features.
(True/False)
4.8/5
(38)
A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions,but the effectiveness of the functions is significantly reduced.
(Multiple Choice)
4.9/5
(29)
A loss of _________ is the unauthorized modification or destruction of information.
(Essay)
4.9/5
(30)
An __________ is an assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system.
(Essay)
4.9/5
(30)
Data origin authentication does not provide protection against the modification of data units.
(True/False)
4.9/5
(46)
A loss of __________ is the unauthorized disclosure of information.
(Multiple Choice)
4.8/5
(29)
Patient allergy information is an example of an asset with a high requirement for integrity.
(True/False)
4.9/5
(31)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)