100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Bank for Cryptography and Network Security Principles and Practice 8th Edition by William Stallings, All Chapters 1-23

Rating
-
Sold
-
Pages
181
Grade
A+
Uploaded on
24-11-2025
Written in
2025/2026

Test Bank for Cryptography and Network Security Principles and Practice 8th Edition by William Stallings, All Chapters 1-23. Full Chapters Include:..1. Computer and Network Security Concepts 2. Introduction to Number Theory 3. Classical Encryption Techniques 4. Block Ciphers and the Data Encryption Standard 5. Finite Fields 6. Advanced Encryption Standard 7. Block Cipher Operation 8. Random Bit Generation and Stream Ciphers 9. Public-Key Cryptography and RSA 10. Other Public-Key Cryptosystems 11. Cryptographic Hash Functions 12. Message Authentication Codes 13. Digital Signatures 14. Lightweight Cryptography and Post-Quantum Cryptography 15. Key Management and Distribution 16. User Authentication Protocols 17. Transport-Level Security 18. Wireless Network Security 19. Electronic Mail Security 20. IP Security 21. Network Endpoint Security 22. Cloud Security 23. Internet of Things (IoT) Security

Show more Read less
Institution
Cryptography And Network Security
Module
Cryptography and Network Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cryptography and Network Security
Module
Cryptography and Network Security

Document information

Uploaded on
November 24, 2025
Number of pages
181
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Cryptography and Network Security
Principles and Practice
UV

– 8th Edition
IA

TEST BANK
_A
PP

William Stallings
RO

Comprehensive Test Bank for Instructors and
VE

Students
D?
© William Stallings
??
All rights reserved. Reproduction or distribution without permission is prohibited.
??

©Medexcellence ✅��

, Cryptography and Network Security: Principles and Practice, 8 th Edition, by William
Stallings


CHAPTER 1: COMPUTER AND NETWORK SECURITY CONCEPTS


TRUE OR FALSE
UV

T F 1. The OSI security architecture focuses on security attacks,
mechanisms, and services.
IA
T F 2. Security attacks are classified as either passive or aggressive.

T F 3. Cybersecurity strives to ensure the attainment and maintenance of
the security properties of the organization and users’ assets against
_A
relevant security risks in the cyberspace environment.

T F 4. Information security and network security are subsets of
cybersecurity.
PP
T F 5. Data authenticity assures that private or confidential information is
not made available or disclosed to unauthorized individuals.

T F 6. The OSI security architecture focuses on security attacks,
mechanisms, and services.
RO
T F 7. An active attack attempts to alter system resources or affect their
operation.

T F 8. Authentication exchange is the use of a trusted third party to
assure certain properties of a data exchange.
VE
T F 9. A loss of integrity is the unauthorized modification or destruction
of information.
D?
T F 10. The emphasis in dealing with active attacks is on prevention
rather than detection.

T F 11. The connection-oriented integrity service addresses both
message stream modification and denial of service.
??
T F 12. The denial of service prevents or inhibits the normal use or
management of communication facilities.

T F 13. Integrity can apply to a stream of messages, a single message, or
??
© 2020 Pearson Education, Inc., Hoboken, NJ. All rights reserved. This material is protected
under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission
in writing from the publisher.

, Cryptography and Network Security: Principles and Practice, 8 th Edition, by William
Stallings
selected fields within a message.


T F 14. Passive attacks are very easy to detect because they involve
alteration of the data.
UV
T F 15. Security services implement security policies and are
implemented by security mechanisms.
IA
MULTIPLE CHOICE


1. _____________ is the collection of tools, policies, security concepts, security
_A
safeguards, guidelines, risk management approaches, actions, training, best
practices, assurance, and technologies that can be used to protect the
cyberspace environment and organization and users’ assets.

A) Access control B) Data authenticity
PP
C) Cybersecurity D) Authentication


2. A common technique for masking contents of messages or other information
RO
traffic so that opponents can not extract the information from the message is
__________ .

A) integrity B) encryption

C) analysis D) masquerade
VE

3. __________ involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect.
D?
A) Disruption B) Replay

C) Service denial D) Masquerade
??
4. _________ is a branch of mathematics that deals with the transformation of data.

A) Cryptography B) Modularity
??
© 2020 Pearson Education, Inc., Hoboken, NJ. All rights reserved. This material is protected
under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission
in writing from the publisher.

, Cryptography and Network Security: Principles and Practice, 8 th Edition, by William
Stallings
C) Encapsulation D) Encryption


5. A loss of __________ is the unauthorized disclosure of information.
UV
A) authenticity B) confidentiality

C) reliability D) integrity
IA
6. Verifying that users are who they say they are and that each input arriving at
the system came from a trusted source is _________ .

A) authenticity B) credibility
_A
C) accountability D) integrity


7. A _________ is a value computed with a cryptographic algorithm and associated
PP
with a data object in such a way that any recipient of the data can use the
signature to verify the data’s origin and integrity.

A) key exchange B) digital signature
RO
C) message authentication code D) notarization


8. A __________ is any action that compromises the security of information owned
by an organization.
VE
A) security attack B) security service

C) security alert D) security mechanism
D?
9. A __________ takes place when one entity pretends to be a different entity.

A) replay B) masquerade
??
C) service denial D) passive attack


10. __________ is the protection of transmitted data from passive attacks.
??
© 2020 Pearson Education, Inc., Hoboken, NJ. All rights reserved. This material is protected
under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission
in writing from the publisher.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MedExcellence Western Governors University
Follow You need to be logged in order to follow users or courses
Sold
217
Member since
1 year
Number of followers
90
Documents
951
Last sold
3 weeks ago
MedExcellence: - Verified Solutions, Test Banks & Guides for Medical, Nursing, Business, Engineering, Accounting, Chemistry, Biology & Other Subjects

MedExcellence – Study Smarter with Expert-Curated Guides for Online Learners Are you a busy online student juggling work, life, and school? At MedExcellence, we specialize in providing A+ graded study guides, exam notes, and course summaries that help Western Governors University, SNHU, and ASU Online students master their coursework efficiently. Our materials are created by experienced professionals and top-performing students to help you: - Understand complex concepts quickly - Prepare confidently for assessments - Download instantly—no delays, no fluff - Perfect for competency-based learning - Covers business, healthcare, education, IT, and more - 100% digital and mobile-friendly for online learners Whether you're prepping for performance assessments, final exams, or weekly tasks—MedExcellence is your trusted study companion. Share with fellow online learners and boost your entire cohort's performance. Ace your courses with MedExcellence—optimized for the online student lifestyle.

Read more Read less
3.3

22 reviews

5
10
4
2
3
2
2
1
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions