Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Cryptography and Network Security
Quiz 1: Overview
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
Data appended to,or a cryptographic transformation of,a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is an___________ .
Question 22
Essay
The __________ service is concerned with assuring the recipient that the message is from the source that it claims to be from.This service must also assure that the connection is not interfered with in such a way that a third party can masquerade as one of the two legitimate parties for the purposes of unauthorized transmission or reception.
Question 23
Essay
"The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity,availability and confidentiality of information system resources" is the definition of _________ .
Question 24
Essay
A loss of _________ is the unauthorized modification or destruction of information.
Question 25
Multiple Choice
A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions,but the effectiveness of the functions is significantly reduced.