,
, selected fields within a message.
T F 14. Passive attacks are very easy to detect because they involve
alteration of the data.
T F 15. Security services implement security policies and are
implemented by security mechanisms.
MULTIPLE CHOICE
1. _____________ is the collection of tools, policies, security concepts, security
safeguards, guidelines, risk management approaches, actions, training, best
practices, assurance, and technologies that can be used to protect the
cyberspace environment and organization and users’ assets.
A) Access control B) Data authenticity
C) Cybersecurity D) Authentication
2. A common technique for masking contents of messages or other information
traffic so that opponents can not extract the information from the message is
__________ .
A) integrity B) encryption
C) analysis D) masquerade
3. __________ involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect.
A) Disruption B) Replay
C) Service denial D) Masquerade
4. _________ is a branch of mathematics that deals with the transformation of data.
A) Cryptography B) Modularity
Cryptography and Network Security Principles and Practice 8th