ITN 266 Midterm Questions and Answers 100% Verified
The three common core goals of security are - Confidentiality, Integrity, Availability When a threat succeeds in causing harm to a business, this is called a ________. - breach compromise incident Another name for safeguard is - countermeasure Employees are very dangerous because they - Both often have access to sensitive parts of the system and are trusted by companies _____ Consists of activities that violate a company's IT use policies or ethics policies - Abuse _______ are programs that attach themselves to legitimate programs - Viruses The fastest propagation occurs with some types of - worms In a virus the code that does damage is called the - payload A program that gives the attacker remote access control of your computer is - RAT A _____ is a small program that, after installed, downloads a larger attack program - Downloader A _______ is a random string of 40 to 4,0000 bits (ones and zeros) used to encrypt messages - Key _____ ciphers move letters around within a message but characters are not substituted - Transposition_______ ciphers leave letters in their original positions - Substitution When two parties communicate with each other using symmetric key encryption, how many keys are used in total to encrypt and decrypt - 1 The best way to thwart exhaustive searches by cryptanlysts is - to make the key very long ____ occurs when companies believe they have good security because the are using prorietary ciphers that hackers do not know - security through obscurity Providing your identity to a communication partner is - authentication ______ are proofs of identity - credential
Written for
- Institution
- ITN 266
- Course
- ITN 266
Document information
- Uploaded on
- September 18, 2023
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
Also available in package deal