Читайте также: |
|
A. Bigram
B. Twogram
C. Pair
D. Digram
E. None of the statements
Consists of a set of computers that interconnect by means of a relatively unsecure network and that make use of encryption and special protocols to provide security.
A. Demilitarized Zone
B. Network Address Translation
C. Anti-Spoofing
D. Virtual Private Network
E. Firewalls
Weaknesses of a system that could be accidentally or intentionally exploited to damage assets.
A. Vulnerabilities
B. Risk
C. Treats
D. Assets
E. DMZ
A secret data value, usually a character string, that is used as authentication information.
A. Key
B. Secret key
C. OPSEC
D. DMZ
E. Password
126. Which of these is possibly the worst password that user can choose?
A. k@zaKh
B. Nursultan1612
C. a$tana8567
D. aLm4tyc?TY
E. None of the statements
Base elements of information, such as numbers, letters, symbols, and so on, which are processed or carried out by human or computer (or by some machine).
A. Bits
B. Bytes
C. Information
D. Data
E. Context
According to DAD triad, ___________ attempts to defeat confidentiality.
A. Disclosure
B. Alteration
C. Destruction
D. Confidentiality
E. Availability
According to DAD triad, ___________ attempts to defeat integrity.
A. Disclosure
B. Alteration
C. Destruction
D. Confidentiality
E. Availability
Дата добавления: 2015-08-18; просмотров: 198 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams | | | According to DAD triad, ___________ attempts to defeat availability. |