Question: 25 22 Task 7. In IT-Security the acronym ClA stands for: Task 3. To provide integrity and authentication digital signatures use public-key Confidentiality, Integrity, Availability

 25 22 Task 7. In IT-Security the acronym ClA stands for:

25 22 Task 7. In IT-Security the acronym ClA stands for: Task 3. To provide integrity and authentication digital signatures use public-key Confidentiality, Integrity, Availability cryptography. Confidentiality, Integrity, Access Control Correct I Confidentiality, Identity. Access Control Wrong Control, Identity, Access Control Task 4. One limitation of one-time pads is the key distribution. Correct Task 11. Where is it recommended to place private web servers? Wrong Intranet Extranet Task 8. A bank card uses a five-digit PIN. You have 4 attempts to find the right PIN VLAN before being blocked. What is the probability to find the right PIN? DMZ 1 4/8 3 4/100000 8/100000 Task 9. IP spoofing - which statement fits best? Capturing network traffic Password guessing Brute force attack Task 12. Main limitation of symmetric encryption systems is: Pretending to be someone else Key distribution Key size Task 10. Which mode should be used when implementing the IPSec protocol for Processing capabilities secure end-to-end communication to remote access clients? Vulnerability to attacks Tunnel mode Encryption mode Task 13. Social engineering is an attack where victims are fooled to perform insecure Transport mode actions. Tunnel mode and Encryption mode Correct Wrong Task 14. Symmetric key encryption uses: Task 18. What is not included in a block (blockchain)? the same key for encryption and decryption Transaction data a pair of keys, one for encryption and the other for decryption Hash point Timestamp Task 15. Which one refers to the term "ciphertext"? Heap segment unencrypted text encrypted text Task 19. What would the following IP tables command do? plaintext Iptables -I INPUT -s 193.93.80.15/32 -j DROP hash text Drop all packets from the destination address Task 16. Steganography follows the concept of security through obscurity. Drop all packets from the source address Correct Drop all packets to the specified address Wrong Task 20. IPSec defines two protocols: Task 17. ICMP flooding is a Layer 2 attack. AH; SSL Correct PGP; ESP Wrong AH; ESP none of the above

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!