Assignment 1 MultiChoice Flashcards

1
Q

____________ is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyberspace environment and organization and users’ assets.

A

C) Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________

A

B) encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect

A

B) Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

________ is a branch of mathematics that deals with the transformation of data.

A

A) Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A loss of __________ is the unauthorized disclosure of information

A

B) confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________

A

A) authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________ is a value computed with a cryptographic algorithm and associated with a data object in such a way that any recipient of the data can use the signature to verify the data’s origin and integrity.

A

B) digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

__________ is any action that compromises the security of information owned by an organization.

A

A) security attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A __________ takes place when one entity pretends to be a different entity.

A

B) masquerade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__________ is the protection of transmitted data from passive attacks.

A

D) Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A/an __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial-of-service attacks.

A

B) availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two types of __________ attacks are the release of message contents and traffic analysis.

A

D) passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A/an __________ is any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

A

A) threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A __________ is a hardware and/or software capability that limits access between a network and device attached to the network, in accordance with a specific security policy.

A

C) firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________

A

B) digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly