Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
information_security_test_questions_1.docx
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
49.23 Кб
Скачать

Vulnerability

177. a means to bind information to an entity. .

Signature

178. You should ______ your computer when not in use

Shutdown.

179. Corroborating thesource of information; also known as data origin authentication

Message authentication

180. You should never open a  ______ without being sure of what it is / does first

Executable File.

181. If you must execute a file you don't know about, it is best to ______ first

Scan It For Malicious Code.

182. endorsement of information by a trusted entity.

Certification:

183. A  ______ application monitors all incoming and outgoing network traffic and blocks unauthorized packets from getting through

Personal Firewall

184. ______ software blocks known viruses, worms, Trojans and other malicious code by comparing it with signatures of known malware

Antivirus

185. The Digital Signature Standard specifies all of the following as valid algorithms for creating digital signatures except:

MAC

186. Preventing the denial of previous commitments or actions.

Non-repudiation

187. Acknowledgement thatservices have been provided.

Confirmation

188. Verifying the creationor existence of information by an entity other than the creator.

Witnessing

189. _____ This is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.

VPN

190. conveyance, to anotherentity, of official sanction to do or be something.

Authorisation

191. recording the time ofcreation or existence of information.

Timestamping:

192. Which term relates specifically to the art and science of code breaking?

Cryptology

193. The Digital Signature Algorithm implements a modified version of which algorithm that is based on discrete logarithms in a finite field?

elliptic curve discrete logarithm problem" or ECDLP.

194. Which of the following is a disadvantage of asymmetric cryptology?

Slower than symmetric cryptology.

Long key slow speed

195. Which of the following One Time Pad?

Is a system in which a private key generated randomly is used only once to encrypt a message that is then decrypted by the receiver using a matching one-time pad and key.