Читайте также: |
|
A _______ cipher replaces one character with another character
A. Substitution
B. Transposition
C. Multiplication
D. Reversing
E. Cultivation
13. Which of the following is not a fundamental security goal?
A. Confidentiality
B. Integrity
C. Assurance
D. Availability
E. All of the statements are correct
Is the science and art of transforming messages to make them secure and immune to attacks.
A. Cryptography
B. Cryptoanalysis
C. Confidentiality
D. Cryptosystem
E. None of the statements
15. A combination of an encryption algorithm and decryption algorithm is called a _________?
A. Cipher
B. Secret
C. Key
D. Polyalphabetic cipher
E. Substitution
The _______________ is a number or a set of numbers on which the cipher operates.
A. Cipher
B. Secret
C. Plaintext
D. Key
E. Ciphertext
The Caesar cipher is a __________ cipher that has a key of 3.
A. Transposition
B. Additive
C. Shift
D. Subtractive
E. Multiplicative
18. Which of the following(s) is(are) form(s) of malware(malicious software)?
A. Viruses
B. Scripts
C. Rootkits
D. Worms
E. All of the statements are correct.
19. What does a firewall do?
A. Scans for viruses on your system
B. Checks floppy or CDs for corrupted files
C. Protects against power surges
D. Protects your computer from Internet intrusion
E. Restores lost data on your computer
You can use ____________ to protect your computer from outsiders.
A. Antivirus software and personal firewall programs
B. System restore and antivirus software
C. Personal firewall programs and system restore
D. Antivirus software and the Recycle Bin
E. Firewall programs and the Recycle Bin
Дата добавления: 2015-08-18; просмотров: 80 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
Prepare by | | | A stateful firewall maintains a ______________, which is a list of active connections. |