__________ is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures.
__________ is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures.
A) Symmetric encryption B) Data integrity
C) Asymmetric encryption D) Authentication protocols
A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .
A) integrity B) encryption
C) analysis D) masquerade
__________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.
A) Disruption B) Replay
C) Service denial D) Masquerade
_________ refers to the use of multiple, overlapping protection approaches addressing the people, technology, and operational aspects of information systems.
A) Layering B) Modularity
C) Encapsulation D) Open design
A loss of __________ is the unauthorized disclosure of information.
A) authenticity B) confidentiality
C) reliability D) integrity
Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________ .
A) authenticity B) credibility
C) accountability D) integrity
A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced.
A) catastrophic B) moderate
C) low D) high
A __________ is any action that compromises the security of information owned by an organization.
A) security attack B) security service
C) security alert D) security
A __________ takes place when one entity pretends to be a different entity.
A) replay B) masquerade
C) service denial D) passive attack
__________ is the protection of transmitted data from passive attacks.
A) Access control B) Data control
C) Nonrepudiation D) Confidentiality
A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial- of- service attacks.
A) replay B) availability
C) masquerade D) integrity
__________ threats exploit service flaws in computers to inhibit use by legitimate users.
A) Information access B) Reliability
C) Passive D) Service
A(n) __________ is a potential for violation of security, which exists when there is a circumstance, capability, action or event that could breach security and cause harm.
A) threat B) attack
C) risk D) attack vector
The protection of the information that might be derived from observation of traffic flows is _________ .
A) connectionless confidentiality B) connection confidentiality
C) traffic- flow confidentiality D) selective- field confidentiality
Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________ .
A) security audit trail B) digital signature
C) encipherment D) authentication exchange
SHORT ANSWER
1. A ___________ is any process, or a device incorporating such a process, that is designed to detect, prevent, or recover from a security attack. Examples are encryption algorithms, digital signatures and authentication protocols.
2. An __________ attack attempts to alter system resources or affect their operation.
3. "The protection afforded to an automated
4. A loss of __________ is the disruption of access to or use of information or an information system.
5. Irreversible __________ mechanisms include hash algorithms and message authentication codes, which are used in digital signature and message authentication applications.
6. In the United States, the release of student grade information is regulated by the
__________ .
7. A loss of _________ is the unauthorized modification or destruction of information.
8. A _________ attack attempts to learn or make use of information from the system but does not affect system resources.
9. An _________ is a branching, hierarchical data structure that represents a set of potential techniques for exploiting security vulnerabilities.
10. Two specific authentication services defined in X.800 are peer entity authentication and _________ authentication.
11. In the context of network security, ___________ is the ability to limit and control the access to host systems and applications via communications links.
12. __________ prevents either sender or receiver from denying a transmitted message. Thus, when a message is sent, the receiver can prove that the alleged sender in fact sent the message and when a message is received, the sender can prove that the alleged receiver in fact received the message.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps