Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien
logo-home
Introduction to Computer Networks and Cybersecurity €17,02   Ajouter au panier

Examen

Introduction to Computer Networks and Cybersecurity

 3 vues  0 fois vendu
  • Cours
  • Établissement
  • Book

Introduction to Computer Networks and Cybersecurity

Aperçu 2 sur 9  pages

  • 3 septembre 2024
  • 9
  • 2024/2025
  • Examen
  • Questions et réponses
avatar-seller
Solutions Manual For Introduction to Computer Networks and
Cybersecurity 1st Edition By Chwan-Hwa (John) Wu; J. David
Irwin 9781138071896 ALL Chapters .
If a website requires you to log in with a password to change your address, this is an
example of that website observing what principles of information security? -
ANSWER: Availability, Integrity, and Confidentiality

_____ refers to the process of making sure only those who are entitled to
information can access it? - ANSWER: Information security.

_____ is anything that can negatively affect information. - ANSWER: An information
security threat.

What is a one-way function in cryptography? - ANSWER: A mathematical
combination of keys that is easy to create, but difficult to und

What was the name of the cryptographic rotor machine used by the Germans in
World War II? - ANSWER: The Enigma machine

Annabelle, the CEO of Kumquat Computing, Inc., emails her vice president, Roland,
to discuss an upcoming merger. Evelyn intercepts the email and changes the content
of the message, altering the proposed terms of the merger, before Roland sees it. -
ANSWER: This describes a Man-in-the-Middle attack. Roland will probably NOT
realize that the email was tampered with.

A _____ attack is a cyber attack where the attacker tries guessing system access
credentials like passwords by trying different character combinations until a correct
combination is identified. - ANSWER: Brute force

On the staff of Kumquat Computing, Inc. -
Jared's main task is to protect the confidentiality of a customer database that's kept
on a LAN in the lobby and waiting rooms.
Tyrone's main task is to protect the confidentiality of client files that are stored in
the cloud.
Which is true of Jared's and Tyrone's main tasks? - ANSWER: Jared is doing
information security. Tyrone is doing both information security and cybersecurity

Information security must _____, and protect against, all threats. - ANSWER:
Recognize.

The _____ ensures that people only have access to the information they need to do
their jobs. - ANSWER: Principle of least privilege

, If your employer could view your medical records without your permission, what
principle of information security would be violated? - ANSWER: Confidentiality

What are the four principles of information security? - ANSWER: Availability,
Integrity, Confidentiality, Non-Repudiation

he CIA model of information security contains what three principles? - ANSWER:
Integrity, Confidentiality, and Availability

Ransomware is a malicious program that can encrypt intercepted data. The attacker
controlling the software can demand a ransom before allowing the data to be
decrypted, rendering it useless until the price is paid. Which of the following is TRUE
about ransomware? - ANSWER: Ransomware is a type of malware.

In securing information and information systems, an organization can implement an
SMS-based password authentication protocol in an addition to the
username/password combination requirement for system access.
Which aspect of information security is addressed by the additional layer of security?
- ANSWER: Confidentiality

What would be an example of a violation of the principle of confidentiality? -
ANSWER: An employee accessing a payroll database to find out how much others are
paid

What is the main idea behind the principle of availability in information security? -
ANSWER: People who are authorized to view data can do so when they need access

What is NOT an example of physical security? - ANSWER: Encrypting email messages

Which of the following best describes confidentiality as it relates to information
security? - ANSWER: Preventing unauthorized users from accessing information

Which of the following would you NOT consider to be information? - ANSWER: A
valuable wall painting

What are the three principles of the information security CIA triad? - ANSWER:
Confidentiality, Integrity, Availability

Encrypt the following message using a Caesar cipher with a shift of 7: ET TU BRUTE -
ANSWER: LA AB IYBAL

What is the 'key exchange' problem in modern information security? - ANSWER: Two
parties need to privately share the secret encryption key before communicating.

You have just intercepted the following message from Caesar: L ORYH FOHRSDWUD.
Can you guess what shift was used to encode the message? - ANSWER: 3

Les avantages d'acheter des résumés chez Stuvia:

Qualité garantie par les avis des clients

Qualité garantie par les avis des clients

Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.

L’achat facile et rapide

L’achat facile et rapide

Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.

Focus sur l’essentiel

Focus sur l’essentiel

Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.

Foire aux questions

Qu'est-ce que j'obtiens en achetant ce document ?

Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.

Garantie de remboursement : comment ça marche ?

Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.

Auprès de qui est-ce que j'achète ce résumé ?

Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur kushboopatel6867. Stuvia facilite les paiements au vendeur.

Est-ce que j'aurai un abonnement?

Non, vous n'achetez ce résumé que pour €17,02. Vous n'êtes lié à rien après votre achat.

Peut-on faire confiance à Stuvia ?

4.6 étoiles sur Google & Trustpilot (+1000 avis)

85443 résumés ont été vendus ces 30 derniers jours

Fondée en 2010, la référence pour acheter des résumés depuis déjà 14 ans

Commencez à vendre!

Récemment vu par vous


€17,02
  • (0)
  Ajouter