Deck 1: Computer and Network Security Concepts

Full screen (f)
exit full mode
Question
A loss of integrity is the unauthorized modification or destruction
of information.
Use Space or
up arrow
down arrow
to flip the card.
Question
A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .

A) integrity
B) encryption
C) analysis
D) masquerade
Question
Integrity can apply to a stream of messages, a single message, or
selected fields within a message.
Question
Information security and network security are subsets of
cybersecurity.
Question
Security services implement security policies and are
implemented by security mechanisms.
Question
An active attack attempts to alter system resources or affect their
operation.
Question
_________ is a branch of mathematics that deals with the transformation of dat A.

A) Cryptography
B) Modularity
C) Encapsulation
D) Encryption
Question
the emphasis in dealing with active attacks is on prevention
rather than detection.
Question
Security attacks are classified as either passive or aggressive.
Question
Passive attacks are very easy to detect because they involve
alteration of the dat
A.
Question
Data authenticity assures that private or confidential information is
not made available or disclosed to unauthorized individuals.
Question
_______ is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyberspace environment and organization and users' assets.

A) Access control
B) Data authenticity
C) Cybersecurity
D) Authentication
Question
the OSI security architecture focuses on security attacks,
mechanisms, and services.
Question
the OSI security architecture focuses on security attacks,
mechanisms, and services.
Question
the denial of service prevents or inhibits the normal use or
management of communication facilities.
Question
the connection-oriented integrity service addresses both
message stream modification and denial of service.
Question
Cybersecurity strives to ensure the attainment and maintenance of
the security properties of the organization and users' assets against relevant security risks in the cyberspace environment.
Question
Authentication exchange is the use of a trusted third party to
assure certain properties of a data exchange.
Question
__________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

A) Disruption
B) Replay
C) Service denial
D) Masquerade
Question
A loss of __________ is the unauthorized disclosure of information.

A) authenticity
B) confidentiality
C) reliability
D) integrity
Question
A __________ takes place when one entity pretends to be a different entity.

A) replay
B) masquerade
C) service denial
D) passive attack
Question
the emphasis in dealing with __________ attacks is on prevention rather than detection.
Question
Active attacks can be subdivided into four categories: replay, __________ , modification of messages, and denial of service.
Question
__________ is the property of a system, or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system.
Question
A __________ is a hardware and/or software capability that limits access between a network and device attached to the network, in accordance with a specific security policy.

A) trust model
B) cryptographic algorithm
C) firewall
D) router
Question
__________ prevents either sender or receiver from denying a transmitted message.
Question
A ______________ is a process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
Question
__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
Question
A __________ is any action that compromises the security of information owned by an organization.

A) security attack
B) security service
C) security alert
D) security mechanism
Question
Digital __________ is data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.
Question
the general security objectives of cybersecurity comprise the following: availability; integrity, which may include data authenticity and nonrepudiation; and __________ .
Question
Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________ .

A) security audit trail
B) digital signature
C) encipherment
D) authentication exchange
Question
__________ is the protection of transmitted data from passive attacks.

A) Access control
B) Data control
C) Nonrepudiation
D) Confidentiality
Question
A __________ attack attempts to learn or make use of information from the system but does not affect system resources.
Question
An ___________ is any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
Question
A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial-of-service attacks.

A) replay
B) availability
C) masquerade
D) integrity
Question
two types of __________ attacks are the release of message contents and traffic analysis.

A) information
B) eavesdropping
C) service
D) passive
Question
A(n) __________ is any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

A) threat
B) attack
C) risk
D) attack vector
Question
A _________ is a value computed with a cryptographic algorithm and associated with a data object in such a way that any recipient of the data can use the signature to verify the data's origin and integrity.

A) key exchange
B) digital signature
C) message authentication code
D) notarization
Question
Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________ .

A) authenticity
B) credibility
C) accountability
D) integrity
Question
__________ is a measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of 1) the adverse impacts that would arise if the circumstance or event occurs; and 2) the likelihood of occurrence.
Question
__________ is a characteristic of an entity that reflects the degree to which that entity is deserving of trust.
Question
A __________ number generator produces a deterministic sequence of numbers or bits that has the appearance of being a truly random sequence.
Question
Encryption algorithms that use a single key are referred to as ___________ encryption algorithms.
Question
Cryptographic algorithms can be divided into three categories: keyless, __________ , and two-key.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Computer and Network Security Concepts
1
A loss of integrity is the unauthorized modification or destruction
of information.
True
2
A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .

A) integrity
B) encryption
C) analysis
D) masquerade
B
3
Integrity can apply to a stream of messages, a single message, or
selected fields within a message.
True
4
Information security and network security are subsets of
cybersecurity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Security services implement security policies and are
implemented by security mechanisms.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
An active attack attempts to alter system resources or affect their
operation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
_________ is a branch of mathematics that deals with the transformation of dat A.

A) Cryptography
B) Modularity
C) Encapsulation
D) Encryption
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
the emphasis in dealing with active attacks is on prevention
rather than detection.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Security attacks are classified as either passive or aggressive.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Passive attacks are very easy to detect because they involve
alteration of the dat
A.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Data authenticity assures that private or confidential information is
not made available or disclosed to unauthorized individuals.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
_______ is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyberspace environment and organization and users' assets.

A) Access control
B) Data authenticity
C) Cybersecurity
D) Authentication
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
the OSI security architecture focuses on security attacks,
mechanisms, and services.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
the OSI security architecture focuses on security attacks,
mechanisms, and services.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
the denial of service prevents or inhibits the normal use or
management of communication facilities.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
the connection-oriented integrity service addresses both
message stream modification and denial of service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Cybersecurity strives to ensure the attainment and maintenance of
the security properties of the organization and users' assets against relevant security risks in the cyberspace environment.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Authentication exchange is the use of a trusted third party to
assure certain properties of a data exchange.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
__________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

A) Disruption
B) Replay
C) Service denial
D) Masquerade
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
A loss of __________ is the unauthorized disclosure of information.

A) authenticity
B) confidentiality
C) reliability
D) integrity
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A __________ takes place when one entity pretends to be a different entity.

A) replay
B) masquerade
C) service denial
D) passive attack
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
the emphasis in dealing with __________ attacks is on prevention rather than detection.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
Active attacks can be subdivided into four categories: replay, __________ , modification of messages, and denial of service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
__________ is the property of a system, or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
A __________ is a hardware and/or software capability that limits access between a network and device attached to the network, in accordance with a specific security policy.

A) trust model
B) cryptographic algorithm
C) firewall
D) router
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
__________ prevents either sender or receiver from denying a transmitted message.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
A ______________ is a process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
A __________ is any action that compromises the security of information owned by an organization.

A) security attack
B) security service
C) security alert
D) security mechanism
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
Digital __________ is data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
the general security objectives of cybersecurity comprise the following: availability; integrity, which may include data authenticity and nonrepudiation; and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________ .

A) security audit trail
B) digital signature
C) encipherment
D) authentication exchange
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
__________ is the protection of transmitted data from passive attacks.

A) Access control
B) Data control
C) Nonrepudiation
D) Confidentiality
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
A __________ attack attempts to learn or make use of information from the system but does not affect system resources.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
An ___________ is any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial-of-service attacks.

A) replay
B) availability
C) masquerade
D) integrity
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
two types of __________ attacks are the release of message contents and traffic analysis.

A) information
B) eavesdropping
C) service
D) passive
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
A(n) __________ is any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

A) threat
B) attack
C) risk
D) attack vector
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
A _________ is a value computed with a cryptographic algorithm and associated with a data object in such a way that any recipient of the data can use the signature to verify the data's origin and integrity.

A) key exchange
B) digital signature
C) message authentication code
D) notarization
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________ .

A) authenticity
B) credibility
C) accountability
D) integrity
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
__________ is a measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of 1) the adverse impacts that would arise if the circumstance or event occurs; and 2) the likelihood of occurrence.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
__________ is a characteristic of an entity that reflects the degree to which that entity is deserving of trust.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
A __________ number generator produces a deterministic sequence of numbers or bits that has the appearance of being a truly random sequence.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Encryption algorithms that use a single key are referred to as ___________ encryption algorithms.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
Cryptographic algorithms can be divided into three categories: keyless, __________ , and two-key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.