i._____________is an example of passive network security attack. a) denial of service b) replay  c) modification of message d) traffic analysis ii. In _________attack, an entity deceives another by falsely denying responsibility for an act  a) falsification  b) repudiation c) corruption  d) intrusion iii. Which one of these cryptographic techniques can be used for both confidentiality and  authentication of message or data? a) MAC b) Hash Function  c) Public Key encryption d) Symmetric key encryption

Fundamentals of Information Systems
9th Edition
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter9: Cybercrime And Information System Security
Section: Chapter Questions
Problem 2CE
icon
Related questions
Question

i._____________is an example of passive network security attack.
a) denial of service
b) replay 
c) modification of message
d) traffic analysis
ii. In _________attack, an entity deceives another by falsely denying responsibility for an act 
a) falsification 
b) repudiation
c) corruption 
d) intrusion
iii. Which one of these cryptographic techniques can be used for both confidentiality and 
authentication of message or data?
a) MAC
b) Hash Function 
c) Public Key encryption
d) Symmetric key encryption
iv. Message authentication protects against___________
a)passive attack 
b) active attack 
c) eavesdropping 
d) none of the attacks
ii. Which one is not categorized as an asset of the computer system?
• a) Hardware 
• b) Software 
• c) Firmware
• d) System Operato

Expert Solution
steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Network Security
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning