Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

A two-letter sequence. In English and other languages, the relative frequency of various _____ in plaintext can be used in the cryptanalysis of some ciphers.

You can use ____________ to protect your computer from outsiders. | A stateful firewall maintains a ______________, which is a list of active connections. | Match each term according to their meanings in Public-Key Cryptosystem | The process of verifying and identity claimed by or for a system entity. | Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC | A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption. | An attacker alters his identity so that someone thinks he is someone else | Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. | The quality or state of having ownership or control of some object or item. | Personal Firewall |


Читайте также:
  1. 1 страница
  2. 1 страница
  3. 1 страница
  4. 1 страница
  5. 1 страница
  6. 1 страница
  7. 1 страница

A. Bigram

B. Twogram

C. Pair

D. Digram

E. None of the statements

 

Consists of a set of computers that interconnect by means of a relatively unsecure network and that make use of encryption and special protocols to provide security.

A. Demilitarized Zone

B. Network Address Translation

C. Anti-Spoofing

D. Virtual Private Network

E. Firewalls

 

Weaknesses of a system that could be accidentally or intentionally exploited to damage assets.

A. Vulnerabilities

B. Risk

C. Treats

D. Assets

E. DMZ

 

A secret data value, usually a character string, that is used as authentication information.

A. Key

B. Secret key

C. OPSEC

D. DMZ

E. Password

 

126. Which of these is possibly the worst password that user can choose?

A. k@zaKh

B. Nursultan1612

C. a$tana8567

D. aLm4tyc?TY

E. None of the statements

 

Base elements of information, such as numbers, letters, symbols, and so on, which are processed or carried out by human or computer (or by some machine).

A. Bits

B. Bytes

C. Information

D. Data

E. Context

 

According to DAD triad, ___________ attempts to defeat confidentiality.

A. Disclosure

B. Alteration

C. Destruction

D. Confidentiality

E. Availability

 

According to DAD triad, ___________ attempts to defeat integrity.

A. Disclosure

B. Alteration

C. Destruction

D. Confidentiality

E. Availability

 


Дата добавления: 2015-08-18; просмотров: 198 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams| According to DAD triad, ___________ attempts to defeat availability.

mybiblioteka.su - 2015-2024 год. (0.006 сек.)