Deck 10: Information Security and Network Protocols
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/23
Play
Full screen (f)
Deck 10: Information Security and Network Protocols
1
Transport layer Protocol consists of ______________ main components
A)2
B)1
C)3
D)4
A)2
B)1
C)3
D)4
2
2
IPSec provides ______________protocols for network layer
A)7
B)3
C)1
D)4
A)7
B)3
C)1
D)4
7
3
CIA triad is also known as ______________
A)nic (non-repudiation, integrity, confidentiality)
B)aic (availability, integrity, confidentiality)
C)ain (availability, integrity, non-repudiation)
D)aic (authenticity, integrity, confidentiality)
A)nic (non-repudiation, integrity, confidentiality)
B)aic (availability, integrity, confidentiality)
C)ain (availability, integrity, non-repudiation)
D)aic (authenticity, integrity, confidentiality)
aic (availability, integrity, confidentiality)
4
______________of information means, only authorised users are capable of accessing the information.
A)confidentiality
B)integrity
C)non-repudiation
D)availability
A)confidentiality
B)integrity
C)non-repudiation
D)availability
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
5
______________means the protection of data from modification by unknown users.
A)confidentiality
B)integrity
C)authentication
D)non-repudiation
A)confidentiality
B)integrity
C)authentication
D)non-repudiation
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
6
When you use the word it means you are protecting your data from getting disclosed.
A)confidentiality
B)integrity
C)authentication
D)availability
A)confidentiality
B)integrity
C)authentication
D)availability
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
7
When integrity is lacking in a security system, ______________ occurs.
A)database hacking
B)data deletion
C)data tampering
D)data leakage
A)database hacking
B)data deletion
C)data tampering
D)data leakage
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
8
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
A)they help understanding hacking better
B)they are key elements to a security breach
C)they help understands security and its components better
D)they help to understand the cyber-crime better
A)they help understanding hacking better
B)they are key elements to a security breach
C)they help understands security and its components better
D)they help to understand the cyber-crime better
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
9
This helps in identifying the origin of information and authentic user. This referred to here as ______________
A)confidentiality
B)integrity
C)authenticity
D)availability
A)confidentiality
B)integrity
C)authenticity
D)availability
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
10
Data is used to ensure confidentiality.
A)encryption
B)locking
C)deleting
D)backup
A)encryption
B)locking
C)deleting
D)backup
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
11
Data integrity gets compromised when and are taken control off.
A)access control, file deletion
B)network, file permission
C)access control, file permission
D)network, system
A)access control, file deletion
B)network, file permission
C)access control, file permission
D)network, system
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
12
______________is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
A)network security
B)database security
C)information security
D)physical security
A)network security
B)database security
C)information security
D)physical security
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
13
From the options below, which of them is not a threat to information security?
A)disaster
B)eavesdropping
C)information leakage
D)unchanged default password
A)disaster
B)eavesdropping
C)information leakage
D)unchanged default password
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
14
Compromising confidential information comes under ______________
A)bug
B)threat
C)vulnerability
D)attack
A)bug
B)threat
C)vulnerability
D)attack
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
15
The full form of OSI is OSI model is ____________________________
A)open systems interconnection
B)open software interconnection
C)open systems internet
D)open software internet
A)open systems interconnection
B)open software interconnection
C)open systems internet
D)open software internet
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
16
In layer, vulnerabilities are directly associated with physical access to networks and hardware.
A)physical
B)data-link
C)network
D)application
A)physical
B)data-link
C)network
D)application
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
17
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:
A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
18
If communication between 2 people is overheard by a third person without extraction of any data, it is called as:
A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
A)release of message content-passive attack
B)traffic analysis -passive attacks
C)release of message content- active attacks
D)traffic analysis -active attacks
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
19
The information that gets transformed in encryption is
A)plain text
B)parallel text
C)encrypted text
D)decrypted text
A)plain text
B)parallel text
C)encrypted text
D)decrypted text
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
20
A unique piece of information that is used in encryption.
A)cipher
B)plain text
C)key
D)cipher.
A)cipher
B)plain text
C)key
D)cipher.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
21
Study of creating a d using encryption and decryption techniques.
A)cipher
B)cryptography
C)encryption
D)decryption
A)cipher
B)cryptography
C)encryption
D)decryption
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
22
An attack in which the user receives unwanted amount of e- mails.
A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
A)smurfing
B)denial of service
C)e-mail bombing
D)ping storm
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
23
In same keys are implemented for encrypting as well as decrypting the information.
A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
A)symmetric key encryption
B)asymmetric key encryption
C)asymmetric key decryption
D)hash-based key encryption
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck