Deck 10: Information Security and Network Protocols

ملء الشاشة (f)
exit full mode
سؤال
Transport layer Protocol consists of ______________ main components

A)2
B)1
C)3
D)4
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
IPSec provides ______________protocols for network layer

A)7
B)3
C)1
D)4
سؤال
CIA triad is also known as ______________  

A)nic (non-repudiation, integrity, confidentiality)
B)aic (availability, integrity, confidentiality)
C)ain (availability, integrity, non-repudiation)
D)aic (authenticity, integrity, confidentiality)
سؤال
______________of information means, only authorised users are capable of accessing the information.

A)confidentiality
B)integrity
C)non-repudiation
D)availability
سؤال
______________means the protection of data from modification by unknown users.

A)confidentiality
B)integrity
C)authentication
D)non-repudiation
سؤال
When you use the word it means you are protecting your data from getting disclosed.

A)confidentiality
B)integrity
C)authentication
D)availability
سؤال
When integrity is lacking in a security system, ______________     occurs.

A)database hacking
B)data deletion
C)data tampering
D)data leakage
سؤال
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

A)they help understanding hacking better
B)they are key elements to a security breach
C)they help understands security and its components better
D)they help to understand the cyber-crime better
سؤال
This helps in identifying the origin of information and authentic user. This referred to here as ______________      

A)confidentiality
B)integrity
C)authenticity
D)availability
سؤال
Data is used to ensure confidentiality.

A)encryption
B)locking
C)deleting
D)backup
سؤال
Data integrity gets compromised when and are taken control off.

A)access control, file deletion
B)network, file permission
C)access control, file permission
D)network, system
سؤال
______________is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

A)network security
B)database security
C)information security
D)physical security
سؤال
From the options below, which of them is not a threat to information security?

A)disaster
B)eavesdropping
C)information leakage
D)unchanged default password
سؤال
Compromising confidential information comes under ______________    

A)bug
B)threat
C)vulnerability
D)attack
سؤال
The full form of OSI is OSI model is ____________________________ 

A)open systems interconnection
B)open software interconnection
C)open systems internet
D)open software internet
سؤال
In layer, vulnerabilities are directly associated with physical access to networks and hardware.

A)physical
B)data-link
C)network
D)application
سؤال
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
سؤال
If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
سؤال
The information that gets transformed in encryption is

A)plain text
B)parallel text
C)encrypted text
D)decrypted text
سؤال
A unique piece of information that is used in encryption.

A)cipher
B)plain text
C)key
D)cipher.
سؤال
Study of creating a d using encryption and decryption techniques.

A)cipher
B)cryptography
C)encryption
D)decryption
سؤال
An attack in which the user receives unwanted amount of e- mails.

A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
سؤال
In same keys are implemented for encrypting as well as decrypting the information.

A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/23
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Information Security and Network Protocols
1
Transport layer Protocol consists of ______________ main components

A)2
B)1
C)3
D)4
2
2
IPSec provides ______________protocols for network layer

A)7
B)3
C)1
D)4
7
3
CIA triad is also known as ______________  

A)nic (non-repudiation, integrity, confidentiality)
B)aic (availability, integrity, confidentiality)
C)ain (availability, integrity, non-repudiation)
D)aic (authenticity, integrity, confidentiality)
aic (availability, integrity, confidentiality)
4
______________of information means, only authorised users are capable of accessing the information.

A)confidentiality
B)integrity
C)non-repudiation
D)availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
5
______________means the protection of data from modification by unknown users.

A)confidentiality
B)integrity
C)authentication
D)non-repudiation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
6
When you use the word it means you are protecting your data from getting disclosed.

A)confidentiality
B)integrity
C)authentication
D)availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
7
When integrity is lacking in a security system, ______________     occurs.

A)database hacking
B)data deletion
C)data tampering
D)data leakage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
8
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

A)they help understanding hacking better
B)they are key elements to a security breach
C)they help understands security and its components better
D)they help to understand the cyber-crime better
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
9
This helps in identifying the origin of information and authentic user. This referred to here as ______________      

A)confidentiality
B)integrity
C)authenticity
D)availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
10
Data is used to ensure confidentiality.

A)encryption
B)locking
C)deleting
D)backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
11
Data integrity gets compromised when and are taken control off.

A)access control, file deletion
B)network, file permission
C)access control, file permission
D)network, system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
12
______________is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

A)network security
B)database security
C)information security
D)physical security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
13
From the options below, which of them is not a threat to information security?

A)disaster
B)eavesdropping
C)information leakage
D)unchanged default password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
14
Compromising confidential information comes under ______________    

A)bug
B)threat
C)vulnerability
D)attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
15
The full form of OSI is OSI model is ____________________________ 

A)open systems interconnection
B)open software interconnection
C)open systems internet
D)open software internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
16
In layer, vulnerabilities are directly associated with physical access to networks and hardware.

A)physical
B)data-link
C)network
D)application
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
17
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
18
If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
19
The information that gets transformed in encryption is

A)plain text
B)parallel text
C)encrypted text
D)decrypted text
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
20
A unique piece of information that is used in encryption.

A)cipher
B)plain text
C)key
D)cipher.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
21
Study of creating a d using encryption and decryption techniques.

A)cipher
B)cryptography
C)encryption
D)decryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
22
An attack in which the user receives unwanted amount of e- mails.

A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
23
In same keys are implemented for encrypting as well as decrypting the information.

A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.