Question: Question 6 5 pts A client-server architecture is different from a peer-to-peer (P2P) architecture in the following manner, except: A client-server architecture removes a single





Question 6 5 pts A client-server architecture is different from a peer-to-peer (P2P) architecture in the following manner, except: A client-server architecture removes a single point of failure that is present in a P2P architecture O A client-server architecture is more efficient than a P2P architecture in information verification A client-server architecture requires trust in a single server, while a P2P architecture distributes trust among all peers A client-server architecture is easier and less costly to secure compared to a P2P architecture Question 7 5 pts Which of the following statement is true about confidentiality"? 1. It includes the protection of user and data confidentiality. II. It prevents a user from revealing his/her password through social engineering. III. It can be achieved using only encryption. IV. It provides for the protection of data based on user's access rights. II and III O Tand III II and IV and IV Question 8 5 pts Which of the following is true about active and passive attacks? O Active attacks are easier to defend compared to passive attacks. Both attacks can be mitigated through encryption. Both attacks can be performed offline. Active attacks are easier to detect compared to passive attacks. Question 9 5 pts The act of logging in to a system using biometric information (such as fingerprint or facial recognition) is a form of: O Integrity protection Data authentication User accountability O User authentication Question 10 5 pts Which of the following is a test of randomness? 1. Frequency test II. Runs test III. Maurer's universal statistical test I and III II and III I and II O I, II, and
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
