100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

INF4831 Information Security Study guide

Rating
-
Sold
-
Pages
3
Grade
A+
Uploaded on
21-11-2024
Written in
2024/2025

INF4831 Information Security Well illustrated

Institution
INF4831 Information Security
Course
INF4831 Information Security








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
INF4831 Information Security
Course
INF4831 Information Security

Document information

Uploaded on
November 21, 2024
Number of pages
3
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

INF4831 Information Security

A denial of service attack launched against a network is an interruption attack.
True
Privileges in an access control matrix are associated with groups and roles.
False
An asymmetric encryption method has precisely matched pairs of keys that are
produced together, or of which one key is derived mathematically from the other.
True
A cryptographic checksum can be used as code-tamper protection and to ensure
message integrity in transit.
True
Consider the scenario in which Mandy wishes to provide evidence via a digital signature
that a message she sends to Kate is in fact from her. She also wants to ensure that only
Kate can open the message. The therefore signs the message with: Mandy's public key
and Kate's private key.
Fale
Ensuring that an authorized user in the exams department has access to capture exam
marks on the system is called ...
Access Control
The Advanced Encryption Standard (AES) is regarded as a stringer/stronger encryption
algorithm than triple Des and is known as Rijndael.
True
A program can be validated in several different ways such as cross-checking each
system requirement with the system's source code or execution-time behavior. The goal
is to demonstrate that the system does each thing listed in the functional requirements.
True
Procedure-oriented access control access to objects is defined based on privileges
associated with groups, such as students, lecturers and exam department staff.
True
Protecting objects involves several complementary goals such as to ensure that each
subject should have access to the smallest number of objects necessary to perform
some tasks. This is called verify acceptable usage.
False
PKIs use symmetric encryption algorithms to digitally sign certificates.
False
An attacker needs three things: method, opportunity and money to for a successful
attack.
False
A power failure can been seen as a ... that could cause harm.
nonhuman treat
A virus executes in a particular way, using certain methods to spread. Each of these
characteristics yields a tell-tale pattern, called an address that can be found by a
program that looks for it.
False
Installing system patches is an example of ... an attack.
R148,32
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
spikerocky

Get to know the seller

Seller avatar
spikerocky Rhodes university
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
1
Documents
29
Last sold
-

0,0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions