Deck 1: Computer and Network Security Concepts

ملء الشاشة (f)
exit full mode
سؤال
A loss of integrity is the unauthorized modification or destruction
of information.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .

A) integrity
B) encryption
C) analysis
D) masquerade
سؤال
Integrity can apply to a stream of messages, a single message, or
selected fields within a message.
سؤال
Information security and network security are subsets of
cybersecurity.
سؤال
Security services implement security policies and are
implemented by security mechanisms.
سؤال
An active attack attempts to alter system resources or affect their
operation.
سؤال
_________ is a branch of mathematics that deals with the transformation of dat A.

A) Cryptography
B) Modularity
C) Encapsulation
D) Encryption
سؤال
the emphasis in dealing with active attacks is on prevention
rather than detection.
سؤال
Security attacks are classified as either passive or aggressive.
سؤال
Passive attacks are very easy to detect because they involve
alteration of the dat
A.
سؤال
Data authenticity assures that private or confidential information is
not made available or disclosed to unauthorized individuals.
سؤال
_______ is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyberspace environment and organization and users' assets.

A) Access control
B) Data authenticity
C) Cybersecurity
D) Authentication
سؤال
the OSI security architecture focuses on security attacks,
mechanisms, and services.
سؤال
the OSI security architecture focuses on security attacks,
mechanisms, and services.
سؤال
the denial of service prevents or inhibits the normal use or
management of communication facilities.
سؤال
the connection-oriented integrity service addresses both
message stream modification and denial of service.
سؤال
Cybersecurity strives to ensure the attainment and maintenance of
the security properties of the organization and users' assets against relevant security risks in the cyberspace environment.
سؤال
Authentication exchange is the use of a trusted third party to
assure certain properties of a data exchange.
سؤال
__________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

A) Disruption
B) Replay
C) Service denial
D) Masquerade
سؤال
A loss of __________ is the unauthorized disclosure of information.

A) authenticity
B) confidentiality
C) reliability
D) integrity
سؤال
A __________ takes place when one entity pretends to be a different entity.

A) replay
B) masquerade
C) service denial
D) passive attack
سؤال
the emphasis in dealing with __________ attacks is on prevention rather than detection.
سؤال
Active attacks can be subdivided into four categories: replay, __________ , modification of messages, and denial of service.
سؤال
__________ is the property of a system, or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system.
سؤال
A __________ is a hardware and/or software capability that limits access between a network and device attached to the network, in accordance with a specific security policy.

A) trust model
B) cryptographic algorithm
C) firewall
D) router
سؤال
__________ prevents either sender or receiver from denying a transmitted message.
سؤال
A ______________ is a process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
سؤال
__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
سؤال
A __________ is any action that compromises the security of information owned by an organization.

A) security attack
B) security service
C) security alert
D) security mechanism
سؤال
Digital __________ is data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.
سؤال
the general security objectives of cybersecurity comprise the following: availability; integrity, which may include data authenticity and nonrepudiation; and __________ .
سؤال
Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________ .

A) security audit trail
B) digital signature
C) encipherment
D) authentication exchange
سؤال
__________ is the protection of transmitted data from passive attacks.

A) Access control
B) Data control
C) Nonrepudiation
D) Confidentiality
سؤال
A __________ attack attempts to learn or make use of information from the system but does not affect system resources.
سؤال
An ___________ is any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
سؤال
A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial-of-service attacks.

A) replay
B) availability
C) masquerade
D) integrity
سؤال
two types of __________ attacks are the release of message contents and traffic analysis.

A) information
B) eavesdropping
C) service
D) passive
سؤال
A(n) __________ is any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

A) threat
B) attack
C) risk
D) attack vector
سؤال
A _________ is a value computed with a cryptographic algorithm and associated with a data object in such a way that any recipient of the data can use the signature to verify the data's origin and integrity.

A) key exchange
B) digital signature
C) message authentication code
D) notarization
سؤال
Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________ .

A) authenticity
B) credibility
C) accountability
D) integrity
سؤال
__________ is a measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of 1) the adverse impacts that would arise if the circumstance or event occurs; and 2) the likelihood of occurrence.
سؤال
__________ is a characteristic of an entity that reflects the degree to which that entity is deserving of trust.
سؤال
A __________ number generator produces a deterministic sequence of numbers or bits that has the appearance of being a truly random sequence.
سؤال
Encryption algorithms that use a single key are referred to as ___________ encryption algorithms.
سؤال
Cryptographic algorithms can be divided into three categories: keyless, __________ , and two-key.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Computer and Network Security Concepts
1
A loss of integrity is the unauthorized modification or destruction
of information.
True
2
A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .

A) integrity
B) encryption
C) analysis
D) masquerade
B
3
Integrity can apply to a stream of messages, a single message, or
selected fields within a message.
True
4
Information security and network security are subsets of
cybersecurity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
Security services implement security policies and are
implemented by security mechanisms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
An active attack attempts to alter system resources or affect their
operation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
_________ is a branch of mathematics that deals with the transformation of dat A.

A) Cryptography
B) Modularity
C) Encapsulation
D) Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
the emphasis in dealing with active attacks is on prevention
rather than detection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
Security attacks are classified as either passive or aggressive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
Passive attacks are very easy to detect because they involve
alteration of the dat
A.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
Data authenticity assures that private or confidential information is
not made available or disclosed to unauthorized individuals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
_______ is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyberspace environment and organization and users' assets.

A) Access control
B) Data authenticity
C) Cybersecurity
D) Authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
the OSI security architecture focuses on security attacks,
mechanisms, and services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
the OSI security architecture focuses on security attacks,
mechanisms, and services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
the denial of service prevents or inhibits the normal use or
management of communication facilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
the connection-oriented integrity service addresses both
message stream modification and denial of service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
Cybersecurity strives to ensure the attainment and maintenance of
the security properties of the organization and users' assets against relevant security risks in the cyberspace environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
Authentication exchange is the use of a trusted third party to
assure certain properties of a data exchange.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
__________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

A) Disruption
B) Replay
C) Service denial
D) Masquerade
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
A loss of __________ is the unauthorized disclosure of information.

A) authenticity
B) confidentiality
C) reliability
D) integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
A __________ takes place when one entity pretends to be a different entity.

A) replay
B) masquerade
C) service denial
D) passive attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
the emphasis in dealing with __________ attacks is on prevention rather than detection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
Active attacks can be subdivided into four categories: replay, __________ , modification of messages, and denial of service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
__________ is the property of a system, or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
A __________ is a hardware and/or software capability that limits access between a network and device attached to the network, in accordance with a specific security policy.

A) trust model
B) cryptographic algorithm
C) firewall
D) router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
__________ prevents either sender or receiver from denying a transmitted message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
A ______________ is a process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
A __________ is any action that compromises the security of information owned by an organization.

A) security attack
B) security service
C) security alert
D) security mechanism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
Digital __________ is data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
the general security objectives of cybersecurity comprise the following: availability; integrity, which may include data authenticity and nonrepudiation; and __________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________ .

A) security audit trail
B) digital signature
C) encipherment
D) authentication exchange
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
__________ is the protection of transmitted data from passive attacks.

A) Access control
B) Data control
C) Nonrepudiation
D) Confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
A __________ attack attempts to learn or make use of information from the system but does not affect system resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
An ___________ is any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial-of-service attacks.

A) replay
B) availability
C) masquerade
D) integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
two types of __________ attacks are the release of message contents and traffic analysis.

A) information
B) eavesdropping
C) service
D) passive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
A(n) __________ is any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

A) threat
B) attack
C) risk
D) attack vector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
A _________ is a value computed with a cryptographic algorithm and associated with a data object in such a way that any recipient of the data can use the signature to verify the data's origin and integrity.

A) key exchange
B) digital signature
C) message authentication code
D) notarization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________ .

A) authenticity
B) credibility
C) accountability
D) integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
__________ is a measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of 1) the adverse impacts that would arise if the circumstance or event occurs; and 2) the likelihood of occurrence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
__________ is a characteristic of an entity that reflects the degree to which that entity is deserving of trust.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
A __________ number generator produces a deterministic sequence of numbers or bits that has the appearance of being a truly random sequence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
Encryption algorithms that use a single key are referred to as ___________ encryption algorithms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
Cryptographic algorithms can be divided into three categories: keyless, __________ , and two-key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.