Assignment 1 MultiChoice Flashcards
____________ is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyberspace environment and organization and users’ assets.
C) Cybersecurity
A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________
B) encryption
_________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect
B) Replay
________ is a branch of mathematics that deals with the transformation of data.
A) Cryptography
A loss of __________ is the unauthorized disclosure of information
B) confidentiality
Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________
A) authenticity
_________ is a value computed with a cryptographic algorithm and associated with a data object in such a way that any recipient of the data can use the signature to verify the data’s origin and integrity.
B) digital signature
__________ is any action that compromises the security of information owned by an organization.
A) security attack
A __________ takes place when one entity pretends to be a different entity.
B) masquerade
__________ is the protection of transmitted data from passive attacks.
D) Confidentiality
A/an __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial-of-service attacks.
B) availability
Two types of __________ attacks are the release of message contents and traffic analysis.
D) passive
A/an __________ is any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
A) threat
A __________ is a hardware and/or software capability that limits access between a network and device attached to the network, in accordance with a specific security policy.
C) firewall
Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________
B) digital signature