Exam 1: Overview

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The emphasis in dealing with active attacks is on prevention rather than detection.

Free
(True/False)
4.9/5
(33)
Correct Answer:
Verified

False

"The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity,availability and confidentiality of information system resources" is the definition of _________ .

Free
(Essay)
4.8/5
(28)
Correct Answer:
Verified

computer security

An __________ attack attempts to alter system resources or affect their operation.

Free
(Essay)
4.9/5
(42)
Correct Answer:
Verified

active

The three concepts that form what is often referred to as the CIA triad are ________ .These three concepts embody the fundamental security objectives for both data and for information and computing services.

(Multiple Choice)
4.8/5
(31)

In the United States,the release of student grade information is regulated by the __________ .

(Essay)
4.9/5
(34)

A ___________ is any process,or a device incorporating such a process,that is designed to detect,prevent,or recover from a security attack.Examples are encryption algorithms,digital signatures and authentication protocols.

(Essay)
4.9/5
(34)

A __________ is any action that compromises the security of information owned by an organization.

(Multiple Choice)
4.8/5
(32)

__________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

(Multiple Choice)
4.9/5
(32)

The __________ service is concerned with assuring the recipient that the message is from the source that it claims to be from.This service must also assure that the connection is not interfered with in such a way that a third party can masquerade as one of the two legitimate parties for the purposes of unauthorized transmission or reception.

(Essay)
4.8/5
(37)

Authentication protocols and encryption algorithms are examples of security mechanisms.

(True/False)
4.8/5
(40)

An)__________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial- of- service attacks.

(Multiple Choice)
4.9/5
(33)

The field of network and Internet security consists of measures to deter,prevent,detect and correct security violations that involve the transmission of information.

(True/False)
4.9/5
(30)

A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .

(Multiple Choice)
4.9/5
(33)

The OSI security architecture was not developed as an international standard,therefore causing an obstacle for computer and communication vendors when developing security features.

(True/False)
4.8/5
(38)

A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions,but the effectiveness of the functions is significantly reduced.

(Multiple Choice)
4.9/5
(29)

A loss of _________ is the unauthorized modification or destruction of information.

(Essay)
4.9/5
(30)

An __________ is an assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system.

(Essay)
4.9/5
(30)

Data origin authentication does not provide protection against the modification of data units.

(True/False)
4.9/5
(46)

A loss of __________ is the unauthorized disclosure of information.

(Multiple Choice)
4.8/5
(29)

Patient allergy information is an example of an asset with a high requirement for integrity.

(True/False)
4.9/5
(31)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)