Deck 10: Information Security and Network Protocols

Full screen (f)
exit full mode
Question
Transport layer Protocol consists of ______________ main components

A)2
B)1
C)3
D)4
Use Space or
up arrow
down arrow
to flip the card.
Question
IPSec provides ______________protocols for network layer

A)7
B)3
C)1
D)4
Question
CIA triad is also known as ______________  

A)nic (non-repudiation, integrity, confidentiality)
B)aic (availability, integrity, confidentiality)
C)ain (availability, integrity, non-repudiation)
D)aic (authenticity, integrity, confidentiality)
Question
______________of information means, only authorised users are capable of accessing the information.

A)confidentiality
B)integrity
C)non-repudiation
D)availability
Question
______________means the protection of data from modification by unknown users.

A)confidentiality
B)integrity
C)authentication
D)non-repudiation
Question
When you use the word it means you are protecting your data from getting disclosed.

A)confidentiality
B)integrity
C)authentication
D)availability
Question
When integrity is lacking in a security system, ______________     occurs.

A)database hacking
B)data deletion
C)data tampering
D)data leakage
Question
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

A)they help understanding hacking better
B)they are key elements to a security breach
C)they help understands security and its components better
D)they help to understand the cyber-crime better
Question
This helps in identifying the origin of information and authentic user. This referred to here as ______________      

A)confidentiality
B)integrity
C)authenticity
D)availability
Question
Data is used to ensure confidentiality.

A)encryption
B)locking
C)deleting
D)backup
Question
Data integrity gets compromised when and are taken control off.

A)access control, file deletion
B)network, file permission
C)access control, file permission
D)network, system
Question
______________is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

A)network security
B)database security
C)information security
D)physical security
Question
From the options below, which of them is not a threat to information security?

A)disaster
B)eavesdropping
C)information leakage
D)unchanged default password
Question
Compromising confidential information comes under ______________    

A)bug
B)threat
C)vulnerability
D)attack
Question
The full form of OSI is OSI model is ____________________________ 

A)open systems interconnection
B)open software interconnection
C)open systems internet
D)open software internet
Question
In layer, vulnerabilities are directly associated with physical access to networks and hardware.

A)physical
B)data-link
C)network
D)application
Question
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
Question
If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
Question
The information that gets transformed in encryption is

A)plain text
B)parallel text
C)encrypted text
D)decrypted text
Question
A unique piece of information that is used in encryption.

A)cipher
B)plain text
C)key
D)cipher.
Question
Study of creating a d using encryption and decryption techniques.

A)cipher
B)cryptography
C)encryption
D)decryption
Question
An attack in which the user receives unwanted amount of e- mails.

A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
Question
In same keys are implemented for encrypting as well as decrypting the information.

A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/23
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Information Security and Network Protocols
1
Transport layer Protocol consists of ______________ main components

A)2
B)1
C)3
D)4
2
2
IPSec provides ______________protocols for network layer

A)7
B)3
C)1
D)4
7
3
CIA triad is also known as ______________  

A)nic (non-repudiation, integrity, confidentiality)
B)aic (availability, integrity, confidentiality)
C)ain (availability, integrity, non-repudiation)
D)aic (authenticity, integrity, confidentiality)
aic (availability, integrity, confidentiality)
4
______________of information means, only authorised users are capable of accessing the information.

A)confidentiality
B)integrity
C)non-repudiation
D)availability
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
5
______________means the protection of data from modification by unknown users.

A)confidentiality
B)integrity
C)authentication
D)non-repudiation
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
6
When you use the word it means you are protecting your data from getting disclosed.

A)confidentiality
B)integrity
C)authentication
D)availability
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
7
When integrity is lacking in a security system, ______________     occurs.

A)database hacking
B)data deletion
C)data tampering
D)data leakage
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
8
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

A)they help understanding hacking better
B)they are key elements to a security breach
C)they help understands security and its components better
D)they help to understand the cyber-crime better
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
9
This helps in identifying the origin of information and authentic user. This referred to here as ______________      

A)confidentiality
B)integrity
C)authenticity
D)availability
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
10
Data is used to ensure confidentiality.

A)encryption
B)locking
C)deleting
D)backup
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
11
Data integrity gets compromised when and are taken control off.

A)access control, file deletion
B)network, file permission
C)access control, file permission
D)network, system
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
12
______________is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

A)network security
B)database security
C)information security
D)physical security
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
13
From the options below, which of them is not a threat to information security?

A)disaster
B)eavesdropping
C)information leakage
D)unchanged default password
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
14
Compromising confidential information comes under ______________    

A)bug
B)threat
C)vulnerability
D)attack
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
15
The full form of OSI is OSI model is ____________________________ 

A)open systems interconnection
B)open software interconnection
C)open systems internet
D)open software internet
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
16
In layer, vulnerabilities are directly associated with physical access to networks and hardware.

A)physical
B)data-link
C)network
D)application
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
17
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
18
If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
19
The information that gets transformed in encryption is

A)plain text
B)parallel text
C)encrypted text
D)decrypted text
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
20
A unique piece of information that is used in encryption.

A)cipher
B)plain text
C)key
D)cipher.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
21
Study of creating a d using encryption and decryption techniques.

A)cipher
B)cryptography
C)encryption
D)decryption
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
22
An attack in which the user receives unwanted amount of e- mails.

A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
23
In same keys are implemented for encrypting as well as decrypting the information.

A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 23 flashcards in this deck.