100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

INF4831 Information Security Study guide

Puntuación
-
Vendido
-
Páginas
3
Grado
A+
Subido en
21-11-2024
Escrito en
2024/2025

INF4831 Information Security Well illustrated

Institución
INF4831 Information Security
Grado
INF4831 Information Security








Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
INF4831 Information Security
Grado
INF4831 Information Security

Información del documento

Subido en
21 de noviembre de 2024
Número de páginas
3
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

INF4831 Information Security

A denial of service attack launched against a network is an interruption attack.
True
Privileges in an access control matrix are associated with groups and roles.
False
An asymmetric encryption method has precisely matched pairs of keys that are
produced together, or of which one key is derived mathematically from the other.
True
A cryptographic checksum can be used as code-tamper protection and to ensure
message integrity in transit.
True
Consider the scenario in which Mandy wishes to provide evidence via a digital signature
that a message she sends to Kate is in fact from her. She also wants to ensure that only
Kate can open the message. The therefore signs the message with: Mandy's public key
and Kate's private key.
Fale
Ensuring that an authorized user in the exams department has access to capture exam
marks on the system is called ...
Access Control
The Advanced Encryption Standard (AES) is regarded as a stringer/stronger encryption
algorithm than triple Des and is known as Rijndael.
True
A program can be validated in several different ways such as cross-checking each
system requirement with the system's source code or execution-time behavior. The goal
is to demonstrate that the system does each thing listed in the functional requirements.
True
Procedure-oriented access control access to objects is defined based on privileges
associated with groups, such as students, lecturers and exam department staff.
True
Protecting objects involves several complementary goals such as to ensure that each
subject should have access to the smallest number of objects necessary to perform
some tasks. This is called verify acceptable usage.
False
PKIs use symmetric encryption algorithms to digitally sign certificates.
False
An attacker needs three things: method, opportunity and money to for a successful
attack.
False
A power failure can been seen as a ... that could cause harm.
nonhuman treat
A virus executes in a particular way, using certain methods to spread. Each of these
characteristics yields a tell-tale pattern, called an address that can be found by a
program that looks for it.
False
Installing system patches is an example of ... an attack.
$9.48
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
spikerocky

Conoce al vendedor

Seller avatar
spikerocky Rhodes university
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
1 año
Número de seguidores
1
Documentos
29
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes