Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Q16: Cryptographic algorithms are based on mathematical algorithms where these algorithms use for a secure transformation of data. a) secret key b) external programs c)
Q16: Cryptographic algorithms are based on mathematical algorithms where these algorithms use for a secure transformation of data. a) secret key b) external programs c) add-ons d) secondary key Explain: Q17: An attacker, who is an employee of your firm may to know your system password. a) do peeping b) perform network jamming c) do shoulder surfing d) steal your laptop Explain: Q18: An attacker may use automatic brute forcing tool to compromise your a) username b) employee ID c) system / PC name d) password Explain: Q19: The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is a) Distributed Denial-of-Service (DDoS) b) Permanent Denial-of-Service (PDoS) c) Denial-of-Service (DoS) d) Controlled Denial-of-Service (CDoS) Q12: Which of the following terms best describes the chances that a threat to an information system will materialize? a) Threat b) Vulnerability c) Weakest link d) Risk Explain: Q13: Which of the following terms best describes the weakness in a system that may possibly be exploited? a) Threat b) Vulnerability c) Weakest link d) Risk Explain: Q14: Which of the following best describe the term 'asset' in the context of information security. a) Anything that an organization buys b) Anything that an organization sells c) Anything that has a value to the organization d) Anything that is situated within an organization's premises Explain: Q15: Data which is easily readable \& understandable without any special algorithm or method is called a) cipher-text b) plain text c) raw text d) encrypted text
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started