Assignment 1 T/F Flashcards

1
Q

The OSI security architecture focuses on security attacks,
mechanisms, and services

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security attacks are classified as either passive or aggressive

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cybersecurity strives to ensure the attainment and maintenance of
the security properties of the organization and users’ assets
against relevant security risks in the cyberspace environment.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information security and network security are subsets of
cybersecurity.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data authenticity assures that private or confidential information is
not made available or disclosed to unauthorized individuals.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The OSI security architecture focuses on security attacks,
mechanisms, and services.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An active attack attempts to alter system resources or affect their
operation

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication exchange is the use of a trusted third party to assure certain properties of a data exchange

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A loss of integrity is the unauthorized modification or destruction
of information.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The emphasis in dealing with active attacks is on prevention rather than detection

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The connection-oriented integrity service addresses both
message stream modification and denial of service

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The denial of service prevents or inhibits the normal use or
management of communication facilities

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity can apply to a stream of messages, a single message, or
selected fields within a message.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Passive attacks are very easy to detect because they involve alteration of the data.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security services implement security policies and are implemented by security mechanisms.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly