i._____________is an example of passive network security attack. a) denial of service b) replay c) modification of message d) traffic analysis ii. In _________attack, an entity deceives another by falsely denying responsibility for an act a) falsification b) repudiation c) corruption d) intrusion iii. Which one of these cryptographic techniques can be used for both confidentiality and authentication of message or data? a) MAC b) Hash Function c) Public Key encryption d) Symmetric key encryption
i._____________is an example of passive network security attack.
a) denial of service
b) replay
c) modification of message
d) traffic analysis
ii. In _________attack, an entity deceives another by falsely denying responsibility for an act
a) falsification
b) repudiation
c) corruption
d) intrusion
iii. Which one of these cryptographic techniques can be used for both confidentiality and
authentication of message or data?
a) MAC
b) Hash Function
c) Public Key encryption
d) Symmetric key encryption
iv. Message authentication protects against___________
a)passive attack
b) active attack
c) eavesdropping
d) none of the attacks
ii. Which one is not categorized as an asset of the computer system?
• a) Hardware
• b) Software
• c) Firmware
• d) System Operato
Step by step
Solved in 4 steps