1. __________ is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures. A) Symmetric encryption B. Data integrity algorithms C) Asymmetric encryption D)Authentication protocols  2. A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ . A) integrity B) encryption C) analysis D) masquerade 3. __________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect. A) Disruption B) Replay C) Service denial D) Masquerade 4. _________ refers to the use of multiple, overlapping protection approaches addressing the people, technology, and operational aspects of information systems. A) Layering B) Modularity C) Encapsulation D) Open design 5. A loss of __________ is the unauthorized disclosure of information. A) authenticity B) confidentiality C) reliability D) integrity 6. Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________ . A) authenticity B) credibility C) accountability D) integrity

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

 


1. __________ is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures.

A) Symmetric encryption

B. Data integrity algorithms

C) Asymmetric encryption D)Authentication protocols

 2. A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .

A) integrity B) encryption

C) analysis D) masquerade

3. __________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

A) Disruption B) Replay

C) Service denial D) Masquerade


4. _________ refers to the use of multiple, overlapping protection approaches addressing the people, technology, and operational aspects of information systems.

A) Layering B) Modularity

C) Encapsulation D) Open design


5. A loss of __________ is the unauthorized disclosure of information.

A) authenticity B) confidentiality

C) reliability D) integrity


6. Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________ .

A) authenticity B) credibility

C) accountability D) integrity

7. A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced.

A) catastrophic B) moderate

C) low D) high


8. A __________ is any action that compromises the security of information owned by an organization.

A) security attack B) security service

C) security alert D) security mechanism

 

 

9. A __________ takes place when one entity pretends to be a different entity.

A) replay B) masquerade

C) service denial D) passive attack

10. __________ is the protection of transmitted data from passive attacks.

A) Access control B) Data control

C) Nonrepudiation D) Confidentiality

11. A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial- of- service attacks.

A) replay B) availability

C) masquerade D) integrity

12. __________ threats exploit service flaws in computers to inhibit use by legitimate users.

A) Information access B) Reliability

C) Passive D) Service

13. A(n) __________ is a potential for violation of security, which exists when there is a circumstance, capability, action or event that could breach security and cause harm.

A) threat B) attack

C) risk D) attack vector

14. The protection of the information that might be derived from observation of traffic flows is _________ .

A) connectionless confidentiality B) connection confidentiality

C) traffic- flow confidentiality D) selective- field confidentiality


15. Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________ .

A) security audit trail B) digital signature

C) encipherment D) authentication exchange

 

 

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Risks related to security
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education