Computer network and security Quiz 1

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards
  1. ________ involves the passive capture of a data unit and its subsequent transmission to produce an unauthorized effect

  1. Disruption

  2. Replay

  3. Service denial

  4. Masquerade

Replay

2
New cards

 A ________ is a potential for violation of security which exists when there is a circumstance, capability, action or event that could breach security and cause harm


  1. Attack

  2. Risk

  3. Attack vector

  4. Threat

Threat

3
New cards

A loss of _______ is the unauthorized disclosure of information


  1. Authenticity

  2. Confidentiality

  3. Reliability

  4. Integrity

Confidentiality

4
New cards

Unsecured user accounts is _____


  1. Technology weakness

  2. Configuration weakness

  3. None of the above

  4. security policy weakness

Configuration weakness

5
New cards

The key used in symmetric encryption is referred to as a _______ key


  1. Private

  2. Decryption

  3. Session

  4. secret

Secret

6
New cards

A ________ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained


  1. Caesar attack 

  2. Ciphertext only

  3. Chosen plaintext

  4. brute force

Brute force

7
New cards

The vast majority of network based symmetric cryptographic applications make use of _______ ciphers


  1. Block

  2. Permutation

  3. Stream

  4. linear

Block

8
New cards

Asymmetric encryption can be used for _______


  1. Neither confidentiality and authentication

  2. Confidentiality

  3. Authentication

  4. both confidentiality and authentication

Both confidentiality and authentication

9
New cards

Security policy should be based on business needs: true or false

true

10
New cards

 Reconnaissance is an active attack: true or false

False

11
New cards

Phishing is an attack aimed at redirecting the traffic of a website to a fake website to collect your sensitive information: true or false

false

12
New cards

To protect against pharming, organizations implement “personalization” technologies, such as user chosen images on the login page: true or false

true

13
New cards

ARP resolve symbolic domain names to IP addresses: true or false

false

14
New cards

Ping of death is a DOS attack: true or false

true

15
New cards

Syn flood is a confidentiality attack: true or false

false

16
New cards

Smurf attack is an availability attack: true or false

true

17
New cards

 When using symmetric encryption, it is very important to keep the algorithm secret: true or false

false

18
New cards

A public key encryption scheme is not vulnerable to a brute force attack: true or false 

false