Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

You can use ____ to protect your computer from outsiders.

Match each term according to their meanings in Public-Key Cryptosystem | The process of verifying and identity claimed by or for a system entity. | Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC | A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption. | An attacker alters his identity so that someone thinks he is someone else | Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. | The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams | A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. | According to DAD triad, ___________ attempts to defeat availability. | The quality or state of having ownership or control of some object or item. |


Читайте также:
  1. 10 страница
  2. 10 страница
  3. 10 страница
  4. 10 страница
  5. 10 страница
  6. 10 страница
  7. 10 страница

A _______ cipher replaces one character with another character

A. Substitution

B. Transposition

C. Multiplication

D. Reversing

 

 

E. Cultivation

 

13. Which of the following is not a fundamental security goal?

A. Confidentiality

B. Integrity

C. Assurance

D. Availability

E. All of the statements are correct

 

Is the science and art of transforming messages to make them secure and immune to attacks.

A. Cryptography

B. Cryptoanalysis

C. Confidentiality

D. Cryptosystem

E. None of the statements

 

15. A combination of an encryption algorithm and decryption algorithm is called a _________?

A. Cipher

B. Secret

C. Key

D. Polyalphabetic cipher

E. Substitution

 

The _______________ is a number or a set of numbers on which the cipher operates.

A. Cipher

B. Secret

C. Plaintext

D. Key

E. Ciphertext

 

The Caesar cipher is a __________ cipher that has a key of 3.

A. Transposition

B. Additive

C. Shift

D. Subtractive

E. Multiplicative

 

18. Which of the following(s) is(are) form(s) of malware(malicious software)?

A. Viruses

B. Scripts

C. Rootkits

D. Worms

E. All of the statements are correct.

 

19. What does a firewall do?

A. Scans for viruses on your system

B. Checks floppy or CDs for corrupted files

C. Protects against power surges

D. Protects your computer from Internet intrusion

E. Restores lost data on your computer

 

You can use ____________ to protect your computer from outsiders.

A. Antivirus software and personal firewall programs

B. System restore and antivirus software

C. Personal firewall programs and system restore

D. Antivirus software and the Recycle Bin

E. Firewall programs and the Recycle Bin

 


Дата добавления: 2015-08-18; просмотров: 80 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
Prepare by| A stateful firewall maintains a ______________, which is a list of active connections.

mybiblioteka.su - 2015-2024 год. (0.006 сек.)