|\ |\ |\ |\ |\
QUESTIONS WITH ANSWERS |\ |\
Elements of information security - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\
✔✔Confidentiality
Integrity
Availability
Authenticity
Non-repudiation
Confidentiality - CORRECT ANSWERS ✔✔information that is
|\ |\ |\ |\ |\ |\ |\
accessible only to those authorized to have access
|\ |\ |\ |\ |\ |\ |\
Integrity - CORRECT ANSWERS ✔✔The trustworthiness of data or
|\ |\ |\ |\ |\ |\ |\ |\ |\
resources
Availability - CORRECT ANSWERS ✔✔Systems responsible for
|\ |\ |\ |\ |\ |\ |\
delivering, storing, and processing information are accessible
|\ |\ |\ |\ |\ |\ |\
when required by the authorized users.
|\ |\ |\ |\ |\
Authenticity - CORRECT ANSWERS ✔✔Any data characteristics
|\ |\ |\ |\ |\ |\ |\
that ensures the quality of being genuine.
|\ |\ |\ |\ |\ |\
, Non-repudiation - CORRECT ANSWERS ✔✔Guarantee that the |\ |\ |\ |\ |\ |\ |\
sender of a message cannot later deny having sent the message
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
and that the recipient cannot deny having received the message
|\ |\ |\ |\ |\ |\ |\ |\ |\
Level of security define by: - CORRECT ANSWERS ✔✔Functionality
|\ |\ |\ |\ |\ |\ |\ |\
(Features)
|\
Security (Restrictions) |\
Usability (GUI) |\
Attacks = - CORRECT ANSWERS ✔✔Motive (Goal) + Method +
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
Vulnerability
Attackers try various tools and attack techniques - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔to exploit vulnerabilities |\ |\ |\
Classification of attacks - CORRECT ANSWERS ✔✔Passive Attacks |\ |\ |\ |\ |\ |\ |\
Active Attacks |\
Close-In Attacks |\
Insider Attacks |\
Distribution Attacks |\
Passive Attack - CORRECT ANSWERS ✔✔Attack where the
|\ |\ |\ |\ |\ |\ |\ |\
attacker does not interact with processing or communication
|\ |\ |\ |\ |\ |\ |\ |\
activities, but only carries out observation and data collection, as
|\ |\ |\ |\ |\ |\ |\ |\ |\
in network sniffing.
|\ |\ |\