UPDATED Exam Questions and
CORRECT Answers
2 basic functions used in encryption algorithms? - CORRECT ANSWER - substitution
transposition
access control - CORRECT ANSWER - prevention of unauthorized use of resources.
accountability - CORRECT ANSWER - security goal that generates the requirements for
actions of an entity to be traced uniquely to that entity (to trace securiy attack to a responsible
party)
active attacks - CORRECT ANSWER - modification of data stream or creation of false
stream and is divided into Masquerad, Reply, Modification of messages, Denial of service
Attacks Types (not active and passive) - CORRECT ANSWER - cryptanalysis
brute-force attack
authentication - CORRECT ANSWER - the assurance that the communicating entity is the
one that it claims to be
authentication protocols - CORRECT ANSWER - uses cryptographic algorithms to
authenticate the idnetity of entities (sender and receiver)
authenticity - CORRECT ANSWER - the ability of being verified and trusted source.
autokey vigenere cipher - CORRECT ANSWER - write the key then the same plaintext
along the plaintext then do the equation (p+k)mod26 and - for decryption
, availability - CORRECT ANSWER - assures that systems work promptly and services are
not denied.
CIA triad - CORRECT ANSWER - confidentiality, integrity and availabilty
Computer security - CORRECT ANSWER - is the protection provided (afforded) to
automated info. systems to achive (attain) the aplicable objectives of preserving the integrity,
availabily and confidentiality of system resources.
confidentiality - CORRECT ANSWER - protection of data from an unathuraized
disclosure.
connection confidentiality - CORRECT ANSWER - protection of user data on a
connection
connection integrity with recovery - CORRECT ANSWER - provide integriy to user data
on a connection, and detects and modification.., with recovery attempted.
connection integrity without recovery - CORRECT ANSWER - provide integrity to user
data on a connection, and detects modification, without providing recovery.
connectionless confidentialiy - CORRECT ANSWER - protection of user data in a single
data block
connectionless integrity - CORRECT ANSWER - integrity of a single data block, and
detects for data modification.
cryptanalysis - CORRECT ANSWER - is based on the cryptanalyst known info. about the
pt/ct/ algorithms used or key.