Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Part A: Multiple Choice 1. A loss of is the unauthorized disclosure of information. a. A. confidentiality b. B. authenticity C. integrity D. availability 2.

image text in transcribed
Part A: Multiple Choice 1. A loss of is the unauthorized disclosure of information. a. A. confidentiality b. B. authenticity C. integrity D. availability 2. A(n) is an attempt to learn or make use of information from the not affect system resources. a. A. passive attack b. B. outside attack C. inside attack D. active attack 3. A threat action in which sensitive data are directly released to an unauthori a. A. corruption b. B. intrusion C. disruption D. exposure is any action that compromises the security of information 4. A organization a. A. security mechanism C. security attack b. B. security policy security service 5. The assurance that data received are exactly as sent by an authorized entity a. A. authentication b. B. access control C. data confidentiality D. data integrity 6. Recognition by fingerprint, retina, and face are examples of- A. face recognition B. static biometrics C. dynamic biometrics D. token authentication 7. On average, a brute-force attack. of all possible keys must be tried in order to achiev A. one-fourth C. two-thirds B. half D. three-fourths 8. If the only form of attack that could be made on an encryption algorithr force, then the way to counter such attacks would be to . A. use longer keys C. use more keys B. use shorter keys D. use less keys 9. The most common means of human-to-human identification are A. facial characteristics B. retinal patterns C. signatures D. fingerprints 10. The first rule of computer security is to check_ A. Patches B. Policies C. Ports D. None of the above 11. An institution that issues debit cards to cardholders and is responsible for the account and authorizing transactions is the_ A. cardholder -B. issuer C. auditor

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Fundamentals Of Database Management Systems

Authors: Mark L. Gillenson

2nd Edition

0470624701, 978-0470624708

More Books

Students also viewed these Databases questions

Question

2/15 + 8/15 Perform the indicated operation by hand.

Answered: 1 week ago

Question

8. Explain the difference between translation and interpretation.

Answered: 1 week ago

Question

6. Explain the power of labels.

Answered: 1 week ago