A _________ prevents or inhibits the normal use or management of system facilities.
Responda
masquerade attack
denial of service attack
traffic encryption attack
passive attack
Questão 2
Questão
An one-time-use authentication token need only be protected from access by unauthorised users until it has been used by the authorised party. This is an example of the ___________.
Responda
Effectiveness Principle
Timeliness Principle
Weakest Link Principle
Energy Principle
Questão 3
Questão
A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) _________
Responda
countermeasure
adversary
vulnerability
risk
Questão 4
Questão
Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences
Responda
unauthorized disclosure
disruption
deception
usurpation
Questão 5
Questão
A loss of _________ is the unauthorised disclosure of information.
Responda
confidentiality
availability
authenticity
integrity
Questão 6
Questão
The assurance that data received are exactly as sent by an authorised entity is __________.
Responda
availibility
confidentiality
authenticity
integrity
Questão 7
Questão
A __________ is any action that compromises the security of information owned by an organization.
Responda
security mechanism
security policy
security attack
security service
Questão 8
Questão
________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorised manipulation of the system.
Responda
system integrity
data integrity
confidentiality
availability
Quer criar seus próprios Quizzesgratuitos com a GoConqr? Saiba mais.