
Chapter 16
Authored by Nguyễn Q Long
Computers
University
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describe being secure, information needs to be hidden from unauthorized access?
Confidentiality
Integrity
Availability
Non-repudiation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes protecting data information needs to be protected from unauthorized change?
Confidentiality
Availability
Integrity
Deniel of Service
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following attacks is threatening integrity?
Snooping
Traffic Analysis
Denial of service
Modification
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following attacks is threatening confidentiality?
Snooping
Repudiation
Denial of service
Modification
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_______ can be threatened by security attacks.
confidentiality, cryptography, and non-repudiation
confidentiality, encryption, and decryption
confidentiality, denial of service, and masquerading
confidentiality, integrity, and availability
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In attacks threatening integrity, ______ happens when the attacker impersonates somebody else
Snooping
Modification
Masquerading
Denial of service
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_____________ means concealing the contents of a message by enciphering.
Steganography
Cryptography
Compressing
Authentication
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?