INF4831 Information Security
A denial of service attack launched against a network is an interruption attack.
True
Privileges in an access control matrix are associated with groups and roles.
False
An asymmetric encryption method has precisely matched pairs of keys that are
produced together, or of which one key is derived mathematically from the other.
True
A cryptographic checksum can be used as code-tamper protection and to ensure
message integrity in transit.
True
Consider the scenario in which Mandy wishes to provide evidence via a digital signature
that a message she sends to Kate is in fact from her. She also wants to ensure that only
Kate can open the message. The therefore signs the message with: Mandy's public key
and Kate's private key.
Fale
Ensuring that an authorized user in the exams department has access to capture exam
marks on the system is called ...
Access Control
The Advanced Encryption Standard (AES) is regarded as a stringer/stronger encryption
algorithm than triple Des and is known as Rijndael.
True
A program can be validated in several different ways such as cross-checking each
system requirement with the system's source code or execution-time behavior. The goal
is to demonstrate that the system does each thing listed in the functional requirements.
True
Procedure-oriented access control access to objects is defined based on privileges
associated with groups, such as students, lecturers and exam department staff.
True
Protecting objects involves several complementary goals such as to ensure that each
subject should have access to the smallest number of objects necessary to perform
some tasks. This is called verify acceptable usage.
False
PKIs use symmetric encryption algorithms to digitally sign certificates.
False
An attacker needs three things: method, opportunity and money to for a successful
attack.
False
A power failure can been seen as a ... that could cause harm.
nonhuman treat
A virus executes in a particular way, using certain methods to spread. Each of these
characteristics yields a tell-tale pattern, called an address that can be found by a
program that looks for it.
False
Installing system patches is an example of ... an attack.
A denial of service attack launched against a network is an interruption attack.
True
Privileges in an access control matrix are associated with groups and roles.
False
An asymmetric encryption method has precisely matched pairs of keys that are
produced together, or of which one key is derived mathematically from the other.
True
A cryptographic checksum can be used as code-tamper protection and to ensure
message integrity in transit.
True
Consider the scenario in which Mandy wishes to provide evidence via a digital signature
that a message she sends to Kate is in fact from her. She also wants to ensure that only
Kate can open the message. The therefore signs the message with: Mandy's public key
and Kate's private key.
Fale
Ensuring that an authorized user in the exams department has access to capture exam
marks on the system is called ...
Access Control
The Advanced Encryption Standard (AES) is regarded as a stringer/stronger encryption
algorithm than triple Des and is known as Rijndael.
True
A program can be validated in several different ways such as cross-checking each
system requirement with the system's source code or execution-time behavior. The goal
is to demonstrate that the system does each thing listed in the functional requirements.
True
Procedure-oriented access control access to objects is defined based on privileges
associated with groups, such as students, lecturers and exam department staff.
True
Protecting objects involves several complementary goals such as to ensure that each
subject should have access to the smallest number of objects necessary to perform
some tasks. This is called verify acceptable usage.
False
PKIs use symmetric encryption algorithms to digitally sign certificates.
False
An attacker needs three things: method, opportunity and money to for a successful
attack.
False
A power failure can been seen as a ... that could cause harm.
nonhuman treat
A virus executes in a particular way, using certain methods to spread. Each of these
characteristics yields a tell-tale pattern, called an address that can be found by a
program that looks for it.
False
Installing system patches is an example of ... an attack.