Читайте также: |
|
176. A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability.
Security service
Security mechanism
Security threat
All of the statements
Security attack
178. Using the RSA algorithm find d where p = 17, q = 31, e = 7 and M = 2.
179. Encrypt the message CVKKT W'YVT using the Caesar Cipher with the key 73
180. What would firewall need to protect?
Specific services
Specific machines or networks????
Users
Information - private or public
All of the statements
181. Which of the following statement is NOT TRUE?
Asymmetric cryptography is also known as public key cryptography
The public key and private key are mathematically related
Asymmetric cryptography is a form of cryptography in which a user has a pair of cryptographic keys
The public key is kept secret while the private key may be widely distributed
The private key cannot be practically derived from the public key
182. Perform decryption using the Playfair Cipher where the message is "FCHLNSGD" and the key is "FINAL EXAM".
183. _____________ - normally running on a dedicated network device or computer positioned on the boundary of two or more networks.
Software Firewall
Дата добавления: 2015-08-18; просмотров: 58 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
I and II only | | | Question 1 |