Assignment 1 - Short Answer Flashcards

1
Q

The general security objectives of cybersecurity comprise the following:
availability; integrity, which may include data authenticity and
non-repudiation, and _______________

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _____________ is a process (or a device incorporating such a process)
that is designed to detect, prevent, or recover from a security attack.

A

Security Mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An ___________ is any kind of malicious activity that attempts to collect, disrupt,
deny, degrade, or destroy information system resources or the information
itself.

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A __________ attack attempts to learn or make use of information from the
system but does not affect system resources.

A

passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The emphasis in dealing with __________ attacks is on prevention rather than
detection.

A

passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Active attacks can be subdivided into four categories: replay, _______________,
modification of messages, and denial of service

A

masquerade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_______________ prevents either sender or receiver from denying a
transmitted message.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_______________ is the property of a system, or a system resource being accessible
and usable upon demand by an authorized system entity, according to
performance specifications for the system.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____________ is the insertion of bits into gaps in a data stream to frustrate traffic
analysis attempts

A

Padding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital _______________ is data appended to, or a cryptographic transformation of, a
data unit that allows a recipient of the data unit to prove the source and
integrity of the data unit and protect against forgery.

A

Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptographic algorithms can be divided into three categories: keyless,
__________, and two-key

A

one-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A ___________ number generator produces a deterministic sequence of numbers
or bits that has the appearance of being a truly random sequence

A

hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption algorithms that use a single key are referred to as ______________
encryption algorithms.

A

one-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ is a measure of the extent to which an entity is threatened by a potential
circumstance or event, and typically a function of 1) the adverse impacts that
would arise if the circumstance or event occurs; and 2) the likelihood of
occurrence.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___________ is a characteristic of an entity that reflects the degree to which that
entity is deserving of trust

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly