A _________ prevents or inhibits the normal use or management of system facilities.
Respuesta
masquerade attack
denial of service attack
traffic encryption attack
passive attack
Pregunta 2
Pregunta
An one-time-use authentication token need only be protected from access by unauthorised users until it has been used by the authorised party. This is an example of the ___________.
Respuesta
Effectiveness Principle
Timeliness Principle
Weakest Link Principle
Energy Principle
Pregunta 3
Pregunta
A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) _________
Respuesta
countermeasure
adversary
vulnerability
risk
Pregunta 4
Pregunta
Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences
Respuesta
unauthorized disclosure
disruption
deception
usurpation
Pregunta 5
Pregunta
A loss of _________ is the unauthorised disclosure of information.
Respuesta
confidentiality
availability
authenticity
integrity
Pregunta 6
Pregunta
The assurance that data received are exactly as sent by an authorised entity is __________.
Respuesta
availibility
confidentiality
authenticity
integrity
Pregunta 7
Pregunta
A __________ is any action that compromises the security of information owned by an organization.
Respuesta
security mechanism
security policy
security attack
security service
Pregunta 8
Pregunta
________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorised manipulation of the system.