100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Bank - Cryptography and Network Security: Principles and Practice, 8th edition by William Stallings, All Chapters

Rating
-
Sold
1
Pages
181
Grade
A+
Uploaded on
03-03-2025
Written in
2024/2025

Test Bank - Cryptography and Network Security: Principles and Practice, 8th edition by William Stallings, All Chapters

Institution
Cryptography And Network Security, 8e
Course
Cryptography and Network Security, 8e











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cryptography and Network Security, 8e
Course
Cryptography and Network Security, 8e

Document information

Uploaded on
March 3, 2025
Number of pages
181
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

kjhgfdsa




Test Bank for Cryptography and Network
Security: Principles and Practice, 8th edition
byWilliam Stallings
N

All Chapters (1-10)
U
R
SE

♦️♦️♦️INSTANT DOWNLOAD
D
♦️♦️♦️COMPLETE CHAPTERS
O

♦️♦️♦️COMPLETE ANSWERS
C
S


kjhgfds

, kjhgfdsa



CHAPTER 1: COMPUTER AND NETWORK SECURITY CONCEPTS


TRUE OR FALSE


T F 1. The OSI security architecture focuses on security attacks,
mechanisms, and services.

T F 2. Security attacks are classified as either passive or aggressive.
N
T F 3. Cybersecurity strives to ensure the attainment and maintenance of
the security properties of the organization and users’ assets against
U
relevant security risks in the cyberspace environment.

T F 4. Information security and network security are subsets of
cybersecurity.
R
T F 5. Data authenticity assures that private or confidential information is
not made available or disclosed to unauthorized individuals.
SE
T F 6. The OSI security architecture focuses on security attacks,
mechanisms, and services.

T F 7. An active attack attempts to alter system resources or affect their
operation.
D
T F 8. Authentication exchange is the use of a trusted third party to
assure certain properties of a data exchange.
O
T F 9. A loss of integrity is the unauthorized modification or destruction
of information.
C
T F 10. The emphasis in dealing with active attacks is on prevention
rather than detection.
S
T F 11. The connection-oriented integrity service addresses both
message stream modification and denial of service.

T F 12. The denial of service prevents or inhibits the normal use or
management of communication facilities.

T F 13. Integrity can apply to a stream of messages, a single message, or



kjhgfds

, kjhgfdsa


selected fields within a message.


T F 14. Passive attacks are very easy to detect because they involve
alteration of the data.

T F 15. Security services implement security policies and are
implemented by security mechanisms.


MULTIPLE CHOICE
N

1. is the collection of tools, policies, security concepts, security
U
safeguards, guidelines, risk management approaches, actions, training, best
practices, assurance, and technologies that can be used to protect the
cyberspace environment and organization and users’ assets.
R
A) Access control B) Data authenticity

C) Cybersecurity D) Authentication
SE

2. A common technique for masking contents of messages or other information
traffic so that opponents can not extract the information from the message is
.
D
A) integrity B) encryption

C) analysis D) masquerade
O

3. involves the passive capture of a data unit and its subsequent
C
retransmission to produce an unauthorized effect.

A) Disruption B) Replay
S
C) Service denial D) Masquerade


4. is a branch of mathematics that deals with the transformation of data.

A) Cryptography B) Modularity




kjhgfds

, kjhgfdsa


C) Encapsulation D) Encryption


5. A loss of is the unauthorized disclosure of information.

A) authenticity B) confidentiality

C) reliability D) integrity


6. Verifying that users are who they say they are and that each input arriving at
N
the system came from a trusted source is .

A) authenticity B) credibility
U
C) accountability D) integrity
R
7. A is a value computed with a cryptographic algorithm and associated
with a data object in such a way that any recipient of the data can use the
signature to verify the data’s origin and integrity.
SE
A) key exchange B) digital signature

C) message authentication code D) notarization
D
8. A is any action that compromises the security of information owned
by an organization.
O
A) security attack B) security service

C) security alert D) security mechanism
C
9. A takes place when one entity pretends to be a different entity.
S
A) replay B) masquerade

C) service denial D) passive attack


10. is the protection of transmitted data from passive attacks.




kjhgfds

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ScoreGuides Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
1331
Member since
2 year
Number of followers
776
Documents
2290
Last sold
10 hours ago
ScoreGuides – Study Smarter, Score Higher

ScoreGuides provides high-quality study guides, test banks, and solutions manuals across a wide range of subjects. Each document is carefully created and structured to help students master key concepts, practice effectively, and excel in exams. Trusted by thousands of learners worldwide — study smarter, score higher!

4.1

119 reviews

5
69
4
21
3
10
2
8
1
11

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions