28 questions
___________________ is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
Computer security
Network security
Cyber Forensics
Network Forensics
Message ________ means that the sender and the receiver expect privacy.
confidentiality
integrity
authentication
none of the above
Message_____ means that the data must arrive at the receiver exactly as sent.
confidentiality
integrity
authentication
none of the above
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
confidentiality
integrity
authentication
none of the above
_________ means that a sender must not be able to deny sending a message that he sent.
confidentiality
integrity
authentication
Non repudiation
Confidentiality, Integrity, and Availability are the three main things used to evaluate information security.
CIA Triad
Baiting
Security Triad
none of the above
A loss of _____________ is the unauthorized disclosure of information.
confidentiality
Integrity
Authentication
Nonrepudiation
A loss of _____________ is the unauthorized modification or destruction of information.
confidentiality
Integrity
Authentication
Non repudiation
A loss of _____________ is the disruption of access to or use of information or an information system.
Availability
Integrity
Authentication
Non repudiation
Which of the following represents the three goals of information security?
Prevention, detection, and response
People controls, process controls, and technology controls
Confidentiality, integrity, and availability
Network security, PC security, and mainframe security
Any action that compromises the security of information owned by an organization.
Security Attack
Security Mechanism
Security Algorithm
Security service
A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
Security Attack
Security Mechanism
Security Algorithm
Security service
A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.
Security Attack
Security Mechanism
Security Algorithm
Security service
Which of these best describes a passive attack?
Someone attacks a network with malware.
Someone from inside an organisation uses the network to steal information.
Someone monitors data travelling on the network to steal information.
Which of these best describes an active attack?
Someone attacks a network with malware.
Someone from inside an organisation uses the network to steal information.
Someone monitors data travelling on the network to steal information.
Which of these best describes a brute force attack?
A hacker tries to stop people from accessing a network by flooding it with traffic.
Someone tries to get information by cracking password through trial and error.
Someone from inside an organisation tries to steal information.
Which of these best describes a denial of service attack?
A hacker tries to stop people from accessing a network by flooding it with traffic.
Someone tries to get information by cracking password through trial and error.
Someone from inside an organisation tries to steal information.
------------- takes place when one entity pretends to be a different entity
------------ involves the passive capture of data unit and its subsequent retransmission to produce an unauthorized effect
------------- means that some portion of the message is altered or the messages are delayed or reordered to produce an unauthorized effect
---------------- attack do not involve any alteration of data
--------------prevents the normal use or management of communication facilities
Name the elements or goals of information security. (CLO1, C1)
Vulnerability, integrity and availability
Confidentiality, integrity and availability
Confidentiality, usability and integrity
Reliability, integrity and accountability