Midterm Test Questions Flashcards
This is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures.
Asymmetric encryption
- A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is
Encryption
involves the passive capture of a data unit and its subsequent re-transmission to produce an unauthorized effect
Replay Attack
- The three concepts that form what is often referred to as the CIA triad are ________ . These three concepts embody the fundamental security objectives for both data and for information and computing services.
confidentiality, integrity and availability
A loss of __________ is the unauthorized disclosure of information
Confidentiality
Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________
Authenticity
A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced.
Moderate
A __________ is any action that compromises the security of information owned by an organization.
Security Attack
A __________ takes place when one entity pretends to be a different entity.
Masquerade
__________ is the protection of transmitted data from passive attacks
Confidentiality
A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial- of- service attacks
Availability
__________ threats exploit service flaws in computers to inhibit use by legitimate users.
Service
A(n) __________ is a potential for violation of security, which exists when there is a circumstance, capability, action or event that could breach security and cause harm.
A Threat
The protection of the information that might be derived from observation of traffic flows is _________ .
traffic- flow confidentiality
- Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________
Digital Signature