Deck 4: Information Security and Encryption

Full screen (f)
exit full mode
Question
From the options below, which of them is not a threat to information security?

A)disaster
B)eavesdropping
C)information leakage
D)unchanged default password
Use Space or
up arrow
down arrow
to flip the card.
Question
Compromising confidential information comes under __________________________________________ 

A)bug
B)threat
C)vulnerability
D)attack
Question
Which of the following are not security policies?

A)regulatory
B)advisory
C)availability
D)user policies
Question
Examples of User Policies is/are:

A)password policies
B)internet usage
C)system use
D)all of the above
Question
____________________________Policy ensures that the organization is maintaining standards set by specific industry regulation.

A)regulatory
B)advisory
C)availability
D)user policies
Question
____________________________  Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior

A)regulatory
B)advisory
C)availability
D)user policies
Question
What defines the restrictions on employees such as usage?

A)regulatory
B)advisory
C)availability
D)user policies
Question
The full form of OSI is OSI model is ____________________________

A)open systems interconnection
B)open software interconnection
C)open systems internet
D)open software internet
Question
In layer, vulnerabilities are directly associated with physical access to networks and hardware.

A)physical
B)data-link
C)network
D)application
Question
Which of the following attack can actively modify communications or data?

A)both active and passive attacks
B)neither active and passive attacks
C)active attacks
D)passive attacks
Question
Release of Message Content and Traffic analysis are type of :

A)both active and passive attacks
B)neither active and passive attacks
C)active attacks
D)passive attacks
Question
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
Question
If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
Question
____________________________  means when an attacker pretends to be authentic user

A)masquerade
B)replay
C)modification
D)traffic analysis
Question
______________ attack is when original data is modified and malicious data is inserted

A)masquerade
B)replay(rewrite)
C)modification
D)traffic analysis
Question
When original data is changed to make it non-meaningful by attacker it is known as

A)masquerade
B)replay
C)modification of messages
D)traffic analysis
Question
Which is the type of attack when Network is made unavailable for user

A)masquerade
B)replay
C)modification
D)denial of service
Question
Modification of Data is done in:

A)both active and passive attacks
B)neither active and passive attacks
C)active attacks
D)passive attacks
Question
The information that gets transformed in encryption is

A)plain text
B)parallel text
C)encrypted text
D)decrypted text
Question
A process of making the encrypted text readable again.

A)decryption
B)encryption
C)network security
D)information hiding
Question
A unique piece of information that is used in encryption.

A)cipher
B)plain text
C)key
D)cipher.
Question
Assurance that authentic user is taking part in communication is:

A)authentication
B)authorization
C)access control
D)auditing
Question
ATM pin while withdrawing money is an example of using:

A)authentication
B)authorization
C)access control
D)auditing
Question
Study of creating a d using encryption and decryption techniques.

A)cipher
B)cryptography
C)encryption
D)decryption
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Information Security and Encryption
1
From the options below, which of them is not a threat to information security?

A)disaster
B)eavesdropping
C)information leakage
D)unchanged default password
unchanged default password
2
Compromising confidential information comes under __________________________________________ 

A)bug
B)threat
C)vulnerability
D)attack
threat
3
Which of the following are not security policies?

A)regulatory
B)advisory
C)availability
D)user policies
availability
4
Examples of User Policies is/are:

A)password policies
B)internet usage
C)system use
D)all of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
____________________________Policy ensures that the organization is maintaining standards set by specific industry regulation.

A)regulatory
B)advisory
C)availability
D)user policies
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
____________________________  Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior

A)regulatory
B)advisory
C)availability
D)user policies
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
What defines the restrictions on employees such as usage?

A)regulatory
B)advisory
C)availability
D)user policies
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
The full form of OSI is OSI model is ____________________________

A)open systems interconnection
B)open software interconnection
C)open systems internet
D)open software internet
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
In layer, vulnerabilities are directly associated with physical access to networks and hardware.

A)physical
B)data-link
C)network
D)application
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following attack can actively modify communications or data?

A)both active and passive attacks
B)neither active and passive attacks
C)active attacks
D)passive attacks
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
Release of Message Content and Traffic analysis are type of :

A)both active and passive attacks
B)neither active and passive attacks
C)active attacks
D)passive attacks
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
____________________________  means when an attacker pretends to be authentic user

A)masquerade
B)replay
C)modification
D)traffic analysis
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
______________ attack is when original data is modified and malicious data is inserted

A)masquerade
B)replay(rewrite)
C)modification
D)traffic analysis
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
When original data is changed to make it non-meaningful by attacker it is known as

A)masquerade
B)replay
C)modification of messages
D)traffic analysis
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
Which is the type of attack when Network is made unavailable for user

A)masquerade
B)replay
C)modification
D)denial of service
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
Modification of Data is done in:

A)both active and passive attacks
B)neither active and passive attacks
C)active attacks
D)passive attacks
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
The information that gets transformed in encryption is

A)plain text
B)parallel text
C)encrypted text
D)decrypted text
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
A process of making the encrypted text readable again.

A)decryption
B)encryption
C)network security
D)information hiding
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
A unique piece of information that is used in encryption.

A)cipher
B)plain text
C)key
D)cipher.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
Assurance that authentic user is taking part in communication is:

A)authentication
B)authorization
C)access control
D)auditing
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
ATM pin while withdrawing money is an example of using:

A)authentication
B)authorization
C)access control
D)auditing
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
Study of creating a d using encryption and decryption techniques.

A)cipher
B)cryptography
C)encryption
D)decryption
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 24 flashcards in this deck.