Cryptography and Network Security

Computing

Quiz 1 :

Computer and Network Security Concepts

Quiz 1 :

Computer and Network Security Concepts

Question Type
search
arrow
A loss of integrity is the unauthorized modification or destruction of information.
Free
True False
Answer:

Answer:

True

Tags
Choose question tag
close menu
arrow
A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .
Free
Multiple Choice
Answer:

Answer:

B

Tags
Choose question tag
close menu
arrow
Integrity can apply to a stream of messages, a single message, or selected fields within a message.
Free
True False
Answer:

Answer:

True

Tags
Choose question tag
close menu
arrow
Information security and network security are subsets of cybersecurity.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Security services implement security policies and are implemented by security mechanisms.
True False
Answer:
Tags
Choose question tag
close menu
arrow
An active attack attempts to alter system resources or affect their operation.
True False
Answer:
Tags
Choose question tag
close menu
arrow
_________ is a branch of mathematics that deals with the transformation of dat A.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
the emphasis in dealing with active attacks is on prevention rather than detection.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Security attacks are classified as either passive or aggressive.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Passive attacks are very easy to detect because they involve alteration of the dat A.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Data authenticity assures that private or confidential information is not made available or disclosed to unauthorized individuals.
True False
Answer:
Tags
Choose question tag
close menu
arrow
_______ is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyberspace environment and organization and users' assets.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
the OSI security architecture focuses on security attacks, mechanisms, and services.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the OSI security architecture focuses on security attacks, mechanisms, and services.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the denial of service prevents or inhibits the normal use or management of communication facilities.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the connection-oriented integrity service addresses both message stream modification and denial of service.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and users' assets against relevant security risks in the cyberspace environment.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Authentication exchange is the use of a trusted third party to assure certain properties of a data exchange.
True False
Answer:
Tags
Choose question tag
close menu
arrow
__________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A loss of __________ is the unauthorized disclosure of information.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 45