Question: Question 1 3 pts (TCO 1) Verifying that users are who they say they are and that each input arriving at the system came from
Question 1 3 pts
(TCO 1) Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _____ .
| authenticity |
| credibility |
| accountability |
| integrity |
Flag this Question
Question 2 3 pts
(TCO 1) A _____ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions but the effectiveness of the functions is significantly reduced.
| catastrophic |
| moderate |
| low |
| high |
Flag this Question
Question 3 3 pts
(TCO 1) A(n) _____ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial-of-service attacks.
| replay |
| availability |
| masquerade |
| integrity |
Flag this Question
Question 4 3 pts
(TCO 3) The _____ algorithm will work against any block encryption cipher and does not depend on any particular property of DES.
| cipher block chaining |
| meet-in-the-middle attack |
| counter mode attack |
| ciphertext stealing |
Flag this Question
Question 5 3 pts
(TCO 1) A _____ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.
| brute-force |
| Caesar attack |
| ciphertext only |
| chosen plaintext |
Flag this Question
Question 6 3 pts
(TCO 3) The _____ and _____ block cipher modes of operation are used for authentication.
| OFB, CTR |
| ECB, CBC |
| CFB, OFB |
| CBC, CFB |
Flag this Question
Question 7 3 pts
(TCO 1) The methods of _____ conceal the existence of the message in a graphic image.
| steganography |
| decryptology |
| cryptology |
| cryptography |
Flag this Question
Question 8 3 pts
(TCO 4) A _____ cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length.
| bit |
| product |
| stream |
| block |
Flag this Question
Question 9 3 pts
(TCO 4) The criteria used in the design of the _____ focused on the design of the S-boxes and on the P function that takes the output of the S-boxes.
| Avalanche Attack |
| Data Encryption Standard |
| Product Cipher |
| Substitution Key |
Flag this Question
Question 10 3 pts
(TCO 4) Allowing for the maximum number of possible encryption mappings from the plaintext block is referred to by Feistel as the _____.
| ideal substitution cipher |
| round function |
| ideal block cipher |
| diffusion cipher |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
