Midterm Test Questions Flashcards

1
Q

This is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures.

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is
A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

involves the passive capture of a data unit and its subsequent re-transmission to produce an unauthorized effect

A

Replay Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. The three concepts that form what is often referred to as the CIA triad are ________ . These three concepts embody the fundamental security objectives for both data and for information and computing services.
A

confidentiality, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A loss of __________ is the unauthorized disclosure of information

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced.

A

Moderate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A __________ is any action that compromises the security of information owned by an organization.

A

Security Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A __________ takes place when one entity pretends to be a different entity.

A

Masquerade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__________ is the protection of transmitted data from passive attacks

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial- of- service attacks

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__________ threats exploit service flaws in computers to inhibit use by legitimate users.

A

Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A(n) __________ is a potential for violation of security, which exists when there is a circumstance, capability, action or event that could breach security and cause harm.

A

A Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The protection of the information that might be derived from observation of traffic flows is _________ .

A

traffic- flow confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________
A

Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly