Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

According to DAD triad, ___ attempts to defeat availability.

You can use ____________ to protect your computer from outsiders. | A stateful firewall maintains a ______________, which is a list of active connections. | Match each term according to their meanings in Public-Key Cryptosystem | The process of verifying and identity claimed by or for a system entity. | Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC | A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption. | An attacker alters his identity so that someone thinks he is someone else | Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. | The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams | Personal Firewall |


Читайте также:
  1. 1 страница
  2. 1 страница
  3. 1 страница
  4. 1 страница
  5. 1 страница
  6. 1 страница
  7. 1 страница

A. Disclosure

B. Alteration

C. Destruction

 

 

D. Confidentiality

E. Availability

 

Set of hacker tools used after attacker has broken into a computer system and gained root-level access.

A. Rootkits

B. Root-level hack

C. Zombie

D. Virus

E. Assets

 

132. Which of the following statement(s) is(are) the Security Principles?

A. Defence in depth

B. Least privilege

C. Separation of privileges

D. Security through obscurity (the inadvisability thereof)

E. All of the statements

 

133. Which of the following statements are types of Firewalls?

A. Packet-Filtering

B. Application-level gateways

C. Circuit-level gateways

D. Internet-level gateways

E. Session-level gateways

 

Provides a user with protection against discovery and misuse of his or her identity by other users.

A. Privacy

B. Protection

C. Misuse

D. Identification

E. All of the statements

 

135. Using Feistel Cipher some information was encrypted, as the ciphertext scrambled message with the length 4n bits was outputted. What is the bit length of initial plaintext? 4N

136. Which of the following cipher(s) is(are) example of block cipher?

A. Fesitel Cipher

B. Caesar Cipher

C. Vigenere Cipher

D. Playfair Cipher

E. All of the statements

 


Дата добавления: 2015-08-18; просмотров: 85 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers.| The quality or state of having ownership or control of some object or item.

mybiblioteka.su - 2015-2024 год. (0.006 сек.)