The OSI security architecture provides a systematic framework for defining security attacks, mechanisms,and services... True/False. 2.Security attacks are classified as either passive or aggressive. True/False. 3.Authentication protocols and encryption algorithms are examples of security mechanisms. True/False. 4.The more critical a component or service, the higher the level of required availability. True/False. 5. The field of network and security consists of measures to deter, prevent, detect and correct security flaws and prevent all unauthorized actions. True/false 6. Patient allergy information is an example of an asset with high requirement for integrity. True/ False. 7. Data origin authentication does not provide protection against the modification of data units. True/ False. 8. Symmetric encryption is used to conceal the contents of blocks or streams of data of any size, including messages,files, encryption keys and passwords. True/ false. 9. The data integrity service inserts bits into gaps in a data stream to frustrate traffic analysis attempt. True/False.
1. The OSI security architecture provides a systematic framework for defining security attacks,
2.Security attacks are classified as either passive or aggressive. True/False.
3.Authentication protocols and encryption
4.The more critical a component or service, the higher the level of required availability. True/False.
5. The field of network and security consists of measures to deter, prevent, detect and correct security flaws and prevent all unauthorized actions. True/false
6. Patient allergy information is an example of an asset with high requirement for integrity. True/ False.
7. Data origin authentication does not provide protection against the modification of data units. True/ False.
8. Symmetric encryption is used to conceal the contents of blocks or streams of data of any size, including messages,files, encryption keys and passwords. True/ false.
9. The data integrity service inserts bits into gaps in a data stream to frustrate traffic analysis attempt. True/False.

Trending now
This is a popular solution!
Step by step
Solved in 4 steps









