What does CIA stand for? - ANSWERS-confidentiality, Integrity,
availibity
What is an example of reasoned paranoia? - ANSWERS-locking your
car door
What is a security architecture study? - ANSWERS-a security plan that
focuses on security requirements and implimentaion
What is an example of a rule-based decision? - ANSWERS-car ignition
locks
What are threat agents - ANSWERS-method used to breach the system
An algorithm is a - ANSWERS-procedure
Gilbert vernam's bit combination operation for encrypting digital
teletype transfer is now referred to as - ANSWERS-exclusive or XOR
What is a ceaser cipher - ANSWERS-earliest know substitution cipher
END OF
PAGE 1
, ITN 262 MIDTERM LATEST
While no encrypting or decrypting, the processing state operates only on
- ANSWERS-plaintext
Polish cryptanalyst developed strategies to attack the rotor machine
ciphers in the 1930's William Friedman and his colleagues improved on
these techniques - ANSWERS-Blechley UK
DES was unveiled in what year - ANSWERS-1975
What is a cryptonet - ANSWERS-two or more people that share an
encryption key
A fully punctuated passphrase should have a minimum of _____
characters - ANSWERS-20
NIST recommends rekeying how often - ANSWERS-every two years or
less
What is a worm - ANSWERS-Malware
An attempt by a threat agent to exploit assets without permission is
referred to as - ANSWERS-an attack
END OF
PAGE 2