,Network Security Essentials Applications and Standards, 5th Edition, by William
Stallings
CHAPTER 1: INTRODUCTION
TRUE OR FALSE
1. T
2. T
3. F
4. T
5. T
6. F
7. F
8. T
9. F
10. T
11. F
12. F
13. T
14. F
15. T
MULTIPLE CHOICE
1. B
2. A
3. B
4. C
5. A
6. A
7. B
8. D
9. D
10. C
11. B
12. A
13. C
14. D
15. A
,Network Security Essentials Applications and Standards, 5th Edition, by William
Stallings
SHORT ANSWER
1. Computer Security
2. integrity
3. attack
4. availability
5. Encipherment
6. Family Educational Rights and Privacy Act (FERPA)
7. threat
8. passive
9. encryption
10. masquerade
11. data confidentiality
12. access control
13. International Organization for Standardization (ISO)
14. Nonrepudiation
15. digital signature
, Network Security Essentials Applications and Standards, 5th Edition, by William
Stallings
CHAPTER 1: INTRODUCTION
TRUE OR FALSE
T F 1. With the introduction of the computer the need for automated
tools for protecting files and other information stored on the
computer became evident.
T F 2. There is a natural tendency on the part of users and system
managers to perceive little benefit from security investment until a
security failure occurs.
T F 3. There are clear boundaries between network security and internet
security.
T F 4. The CIA triad embodies the fundamental security objectives for
both data and for information and computing services.
T F 5. In developing a particular security mechanism or algorithm one
must always consider potential attacks on those security features.
T F 6. A loss of confidentiality is the unauthorized modification or
destruction of information.
T F 7. Patient allergy information is an example of an asset with a
moderate requirement for integrity.
T F 8. The more critical a component or service, the higher the level of
availability required.
T F 9. Data origin authentication provides protection against the
duplication or modification of data units.
T F 10. The emphasis in dealing with passive attacks is on prevention
rather than detection.
T F 11. Data integrity is the protection of data from unauthorized
disclosure.
T F 12. Information access threats exploit service flaws in computers to
inhibit use by legitimate users.
Stallings
CHAPTER 1: INTRODUCTION
TRUE OR FALSE
1. T
2. T
3. F
4. T
5. T
6. F
7. F
8. T
9. F
10. T
11. F
12. F
13. T
14. F
15. T
MULTIPLE CHOICE
1. B
2. A
3. B
4. C
5. A
6. A
7. B
8. D
9. D
10. C
11. B
12. A
13. C
14. D
15. A
,Network Security Essentials Applications and Standards, 5th Edition, by William
Stallings
SHORT ANSWER
1. Computer Security
2. integrity
3. attack
4. availability
5. Encipherment
6. Family Educational Rights and Privacy Act (FERPA)
7. threat
8. passive
9. encryption
10. masquerade
11. data confidentiality
12. access control
13. International Organization for Standardization (ISO)
14. Nonrepudiation
15. digital signature
, Network Security Essentials Applications and Standards, 5th Edition, by William
Stallings
CHAPTER 1: INTRODUCTION
TRUE OR FALSE
T F 1. With the introduction of the computer the need for automated
tools for protecting files and other information stored on the
computer became evident.
T F 2. There is a natural tendency on the part of users and system
managers to perceive little benefit from security investment until a
security failure occurs.
T F 3. There are clear boundaries between network security and internet
security.
T F 4. The CIA triad embodies the fundamental security objectives for
both data and for information and computing services.
T F 5. In developing a particular security mechanism or algorithm one
must always consider potential attacks on those security features.
T F 6. A loss of confidentiality is the unauthorized modification or
destruction of information.
T F 7. Patient allergy information is an example of an asset with a
moderate requirement for integrity.
T F 8. The more critical a component or service, the higher the level of
availability required.
T F 9. Data origin authentication provides protection against the
duplication or modification of data units.
T F 10. The emphasis in dealing with passive attacks is on prevention
rather than detection.
T F 11. Data integrity is the protection of data from unauthorized
disclosure.
T F 12. Information access threats exploit service flaws in computers to
inhibit use by legitimate users.