Zusammenfassung der Ressource
Frage 1
Frage
Computer security is the generic name for the collection of tools designed to [blank_start]protect data[blank_end] and to thwart [blank_start]hackers[blank_end]
Frage 2
Frage
True or False? Computer security is about protecting data transmission whereas internet security is about protecting the data itself.
Frage 3
Frage
What are the components of the CIA triad?
Antworten
-
Confidentiality, internet, accessibility
-
Confidentiality, integrity, availability
-
Control, intercept, availability
-
Control, integrity, accessibility
-
Confidentiality, intercept, accessibility
Frage 4
Frage
Which of these is an example of a service that requires a HIGH level of availability?
Antworten
-
A public website made for a university
-
An online telephone directory lookup application
-
Employees relying on a company's internal computing system
Frage 5
Frage
Which of the following are computer security challenges? (hint: there are 3)
Antworten
-
Computer security is an too often an afterthought, and not an integral part of the process of design
-
Waiting for a security failure to occur. Only then is it worth investing in security
-
Requires regular (or even constant) monitoring in this short-term, overloaded environment
-
Security is straightforward to implement, and thus ignored
-
Security services feel counter-intuitive, and elaborate
-
Security services cannot withstand the power of a security "nuke"
Frage 6
Frage
A [blank_start]security attack[blank_end] is an action compromises the security of information owned by an organisation.
A [blank_start]security mechanism[blank_end] is a process that is designed to detect, prevent, or recover from a security attack
A [blank_start]security service[blank_end] is a processing or communicating service that enhances the security of the data processing systems and the information transfers of an organisation. They are intended to counter security attacks using security mechanisms.
Antworten
-
security attack
-
security service
-
security threat
-
security mechanism
-
security breach
-
security attack
-
security service
-
security mechanism
-
security process
-
security counter-attack
-
security attack
-
security service
-
security mechanism
-
security counter attack
-
security failsafe
Frage 7
Frage
True or False? According to RFC 4949...
An attack is a possible danger that might exploit a vulnerability.
A threat is an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system
Frage 8
Frage
[blank_start]Passive[blank_end] attacks are in the nature of eavesdropping on, or monitoring on, of transmissions
[blank_start]Active[blank_end] attacks involve some modification of the data stream or the creation of a false stream
Frage 9
Frage
Types of Active Attacks:
Antworten
-
masquerade
-
replay
-
modification of messages
-
denial of service
-
traffic analysis
-
message content release