Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Cryptography and Network Security
Quiz 1: Computer and Network Security Concepts
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
A __________ takes place when one entity pretends to be a different entity.
Question 22
Short Answer
the emphasis in dealing with __________ attacks is on prevention rather than detection.
Question 23
Short Answer
Active attacks can be subdivided into four categories: replay, __________ , modification of messages, and denial of service.
Question 24
Short Answer
__________ is the property of a system, or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system.
Question 25
Multiple Choice
A __________ is a hardware and/or software capability that limits access between a network and device attached to the network, in accordance with a specific security policy.
Question 26
Short Answer
__________ prevents either sender or receiver from denying a transmitted message.
Question 27
Short Answer
A ______________ is a process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
Question 28
Short Answer
__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
Question 29
Multiple Choice
A __________ is any action that compromises the security of information owned by an organization.
Question 30
Short Answer
Digital __________ is data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.
Question 31
Short Answer
the general security objectives of cybersecurity comprise the following: availability; integrity, which may include data authenticity and nonrepudiation; and __________ .
Question 32
Multiple Choice
Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________ .