A _________ prevents or inhibits the normal use or management of system facilities.
Answer
masquerade attack
denial of service attack
traffic encryption attack
passive attack
Question 2
Question
An one-time-use authentication token need only be protected from access by unauthorised users until it has been used by the authorised party. This is an example of the ___________.
Answer
Effectiveness Principle
Timeliness Principle
Weakest Link Principle
Energy Principle
Question 3
Question
A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) _________
Answer
countermeasure
adversary
vulnerability
risk
Question 4
Question
Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences
Answer
unauthorized disclosure
disruption
deception
usurpation
Question 5
Question
A loss of _________ is the unauthorised disclosure of information.
Answer
confidentiality
availability
authenticity
integrity
Question 6
Question
The assurance that data received are exactly as sent by an authorised entity is __________.
Answer
availibility
confidentiality
authenticity
integrity
Question 7
Question
A __________ is any action that compromises the security of information owned by an organization.
Answer
security mechanism
security policy
security attack
security service
Question 8
Question
________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorised manipulation of the system.