Читайте также: |
|
A. Disclosure
B. Alteration
C. Destruction
D. Confidentiality
E. Availability
Set of hacker tools used after attacker has broken into a computer system and gained root-level access.
A. Rootkits
B. Root-level hack
C. Zombie
D. Virus
E. Assets
132. Which of the following statement(s) is(are) the Security Principles?
A. Defence in depth
B. Least privilege
C. Separation of privileges
D. Security through obscurity (the inadvisability thereof)
E. All of the statements
133. Which of the following statements are types of Firewalls?
A. Packet-Filtering
B. Application-level gateways
C. Circuit-level gateways
D. Internet-level gateways
E. Session-level gateways
Provides a user with protection against discovery and misuse of his or her identity by other users.
A. Privacy
B. Protection
C. Misuse
D. Identification
E. All of the statements
135. Using Feistel Cipher some information was encrypted, as the ciphertext scrambled message with the length 4n bits was outputted. What is the bit length of initial plaintext? 4N
136. Which of the following cipher(s) is(are) example of block cipher?
A. Fesitel Cipher
B. Caesar Cipher
C. Vigenere Cipher
D. Playfair Cipher
E. All of the statements
Дата добавления: 2015-08-18; просмотров: 85 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. | | | The quality or state of having ownership or control of some object or item. |