Deck 4: Information Security and Encryption
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
Play
Full screen (f)
Deck 4: Information Security and Encryption
1
From the options below, which of them is not a threat to information security?
A)disaster
B)eavesdropping
C)information leakage
D)unchanged default password
A)disaster
B)eavesdropping
C)information leakage
D)unchanged default password
unchanged default password
2
Compromising confidential information comes under __________________________________________
A)bug
B)threat
C)vulnerability
D)attack
A)bug
B)threat
C)vulnerability
D)attack
threat
3
Which of the following are not security policies?
A)regulatory
B)advisory
C)availability
D)user policies
A)regulatory
B)advisory
C)availability
D)user policies
availability
4
Examples of User Policies is/are:
A)password policies
B)internet usage
C)system use
D)all of the above
A)password policies
B)internet usage
C)system use
D)all of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
____________________________Policy ensures that the organization is maintaining standards set by specific industry regulation.
A)regulatory
B)advisory
C)availability
D)user policies
A)regulatory
B)advisory
C)availability
D)user policies
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
____________________________ Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior
A)regulatory
B)advisory
C)availability
D)user policies
A)regulatory
B)advisory
C)availability
D)user policies
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
What defines the restrictions on employees such as usage?
A)regulatory
B)advisory
C)availability
D)user policies
A)regulatory
B)advisory
C)availability
D)user policies
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
The full form of OSI is OSI model is ____________________________
A)open systems interconnection
B)open software interconnection
C)open systems internet
D)open software internet
A)open systems interconnection
B)open software interconnection
C)open systems internet
D)open software internet
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
In layer, vulnerabilities are directly associated with physical access to networks and hardware.
A)physical
B)data-link
C)network
D)application
A)physical
B)data-link
C)network
D)application
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following attack can actively modify communications or data?
A)both active and passive attacks
B)neither active and passive attacks
C)active attacks
D)passive attacks
A)both active and passive attacks
B)neither active and passive attacks
C)active attacks
D)passive attacks
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
Release of Message Content and Traffic analysis are type of :
A)both active and passive attacks
B)neither active and passive attacks
C)active attacks
D)passive attacks
A)both active and passive attacks
B)neither active and passive attacks
C)active attacks
D)passive attacks
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:
A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
If communication between 2 people is overheard by a third person without extraction of any data, it is called as:
A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
____________________________ means when an attacker pretends to be authentic user
A)masquerade
B)replay
C)modification
D)traffic analysis
A)masquerade
B)replay
C)modification
D)traffic analysis
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
______________ attack is when original data is modified and malicious data is inserted
A)masquerade
B)replay(rewrite)
C)modification
D)traffic analysis
A)masquerade
B)replay(rewrite)
C)modification
D)traffic analysis
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
When original data is changed to make it non-meaningful by attacker it is known as
A)masquerade
B)replay
C)modification of messages
D)traffic analysis
A)masquerade
B)replay
C)modification of messages
D)traffic analysis
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
Which is the type of attack when Network is made unavailable for user
A)masquerade
B)replay
C)modification
D)denial of service
A)masquerade
B)replay
C)modification
D)denial of service
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
Modification of Data is done in:
A)both active and passive attacks
B)neither active and passive attacks
C)active attacks
D)passive attacks
A)both active and passive attacks
B)neither active and passive attacks
C)active attacks
D)passive attacks
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
The information that gets transformed in encryption is
A)plain text
B)parallel text
C)encrypted text
D)decrypted text
A)plain text
B)parallel text
C)encrypted text
D)decrypted text
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
A process of making the encrypted text readable again.
A)decryption
B)encryption
C)network security
D)information hiding
A)decryption
B)encryption
C)network security
D)information hiding
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
A unique piece of information that is used in encryption.
A)cipher
B)plain text
C)key
D)cipher.
A)cipher
B)plain text
C)key
D)cipher.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
Assurance that authentic user is taking part in communication is:
A)authentication
B)authorization
C)access control
D)auditing
A)authentication
B)authorization
C)access control
D)auditing
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
ATM pin while withdrawing money is an example of using:
A)authentication
B)authorization
C)access control
D)auditing
A)authentication
B)authorization
C)access control
D)auditing
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
Study of creating a d using encryption and decryption techniques.
A)cipher
B)cryptography
C)encryption
D)decryption
A)cipher
B)cryptography
C)encryption
D)decryption
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck