Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

The process of verifying and identity claimed by or for a system entity.

You can use ____________ to protect your computer from outsiders. | A stateful firewall maintains a ______________, which is a list of active connections. | A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption. | An attacker alters his identity so that someone thinks he is someone else | Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. | The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams | A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. | According to DAD triad, ___________ attempts to defeat availability. | The quality or state of having ownership or control of some object or item. | Personal Firewall |


Читайте также:
  1. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
  2. An attacker alters his identity so that someone thinks he is someone else
  3. An extended model of the management process
  4. Aufgabe 2. Referieren des Textes „Das politische System der Bundesrepublik Deutschland“ auf Deutsch und auf Russisch (das Referat soll 25 % des Originaltextes umfassen).
  5. B) IDENTITY CARD
  6. Blood Diamonds - Conflict Diamonds What is the Kimberly Process?
  7. Checking Your Operating System Version

A. Authentication

B. Confirmation

C. Processing

D. Timestamping

E. Validation

 

One of the two keys used in an asymmetric encryption system. For secure communication, the private key should only be known to its creator.

One of the two keys used in an asymmetric encryption system. The public key is made public to be used in conjunction with a corresponding private key.

A public-key encryption algorithm based on exponentiation in modular arithmetic. It is the only algorithm generally accepted as practical and secure for public-key encryption

A. RSA

B. Hill Cipher

C. Caesar Cipher

D. Vigenere Cipher

E. Playfair Cipher

 

Code embedded within a program that causes a copy of itself to be inserted in one or more other programs. Usually performs some unwanted function.

A. Virus

B. Worm

C. Zombie

D. Firewall

E. All of the statements

 

A process of identifying, analyzing and controlling critical information.

A. DMZ

B. OPSEC

C. Scanning

D. Firewall

E. Anti-virus

 

Embedded in a computer program that checks for a certain set of conditions to be present on the system. When these conditions are met, it executes some function resulting in unauthorized actions.

A. OPSEC

B. Virus

C. Logic Bomb

D. Worm

E. Trojan Horse

 


Дата добавления: 2015-08-18; просмотров: 114 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
Match each term according to their meanings in Public-Key Cryptosystem| Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC

mybiblioteka.su - 2015-2024 год. (0.006 сек.)