100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CYBR 7400 Midterm Exam Questions with Answers $8.99   Add to cart

Exam (elaborations)

CYBR 7400 Midterm Exam Questions with Answers

 14 views  0 purchase
  • Course
  • CYBR 7400
  • Institution
  • CYBR 7400

CYBR 7400 Midterm Exam Questions with Answers Security attacks are classified as either passive or aggressive - Answer-False - passive or active Authentication protocols and encryption algorithms are examples of security mechanisms - Answer-True Symmetric encryption is used to conceal the c...

[Show more]

Preview 2 out of 6  pages

  • February 12, 2024
  • 6
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • CYBR 7400
  • CYBR 7400
avatar-seller
ApassExams
CYBR 7400 Midterm Exam Questions with Answers Security attacks are classified as either passive or aggressive - Answer -False - passive or active Authentication protocols and encryption algorithms are examples of security mechanisms - Answer -True Symmetric encryption is used to conceal the contents of blocks or streams of data of any size, including messages, files, encryption keys, and passwords - Answer -True The data integrity service inserts bits into gaps in a data stream to frustrate traffic analysis attempts - Answer -False - traffic padding Data origin authentication does not provide protection against the modification of data units - Answer -True ____ is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures - Answer -
asymmetric encryption A common technique for masking contents of messages or other information traffic so that opponents cannot extract the information from the message is ____ - Answer -
encryption A loss of ____ is the unauthorized disclosure of information - Answer -confidentiality Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is ____ - Answer -authenticity A ____ is a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm - Answer -threat A ____ attack attempts to alter system resources or affect their operation - Answer -
active A loss of ____ is the unauthorized modification of information - Answer -integrity An attack tree is a branching, hierarchical data structure that represents a set of potential techniques for exploiting security vulnerabilities - Answer -true In the context of network security, access control is the ability to limit and control the access to host systems and applications via communication links - Answer -true Encryption prevents either sender or receiver from denying a transmitted message. Thus, when a message is sent, the receiver can prove that the alleged sender in fact sent the message and when a message is received, the sender can prove that the alleged re ceiver in fact received the message - Answer -false - nonrepudiation Symmetric encryption is a form of cryptosystem in which encryption and decryption are performed using different keys. It is also known as non -conventional encryption - Answer -false - asymmetric With the use of symmetric encryption, the principal security problem is maintaining the secrecy of the key - Answer -true The algorithm will produce a different output depending on the specific secret key being used at the time. The exact substitutions and transformations performed by the algorithm depend on the key - Answer -true A scheme known as a one -time pad is unbreakable because it produces random output that bears no statistical relationship to the plaintext - Answer -true ____ techniques map plaintext elements (characters, bits) into ciphertext elements - Answer -substitution ____ attacks exploit the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used - Answer -cryptanalytic The ____ attack is the easiest to defend against because the opponent has the least amount of information to work with - Answer -ciphertext only A technique referred to as a ____ is a mapping achieved by performing some sort of permutation on the plaintext letters - Answer -transposition cipher Cryptographic systems are characterized along three independent dimensions: the type of operations used for transforming plaintext to ciphertext, the way in which the plaintext is processed, and the number of keys used. - Answer -true DES uses a 56 -bit block and a 64 -bit key - Answer -false - 64-bit block and 56 -bit key A problem with the ideal block cipher using a small block size is that it is vulnerable to a statistical analysis of the plaintext - Answer -true

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ApassExams. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80202 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.99
  • (0)
  Add to cart