Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CSIS-463 Exam 1| Chapter 1-4 Questions and Answers | A+ rated Solutions

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
01-02-2024
Written in
2023/2024

CSIS-463 Exam 1| Chapter 1-4 Questions and Answers | A+ rated Solutions The denial of service prevents or inhibits the normal use or management of communication facilities. - ANSW True _____________ is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyberspace environment and organization and users' assets.

Show more Read less
Institution
Course

Content preview

CSIS-463 Exam 1| Chapter 1-4 Questions and Answers
| A+ rated Solutions


The denial of service prevents or inhibits the normal use or management of
communication facilities. - ANSW True
_____________ is the collection of tools, policies, security concepts, security
safeguards, guidelines, risk management approaches, actions, training, best
practices, assurance, and technologies that can be used to protect the cyberspace
environment and organization and users' assets. - ANSW Cybersecurity
Data authenticity assures that private or confidential information is not made
available or disclosed to unauthorized individuals. - ANSW False
A loss of integrity is the unauthorized modification or destruction of information. -
ANSW True
Data appended to, or a cryptographic transformation of, a data unit that allows a
recipient of the data unit to prove the source and integrity of the data unit and
protect against forgery is a(n) ___________ . - ANSW digital signature
Security attacks are classified as either passive or aggressive. - ANSW False
Information security and network security are subsets of cybersecurity. - ANSW
True
Cybersecurity strives to ensure the attainment and maintenance of the security
properties of the organization and users' assets against relevant security risks in the
cyberspace environment. - ANSW True
The emphasis in dealing with active attacks is on prevention rather than detection.
- ANSW False

, Integrity can apply to a stream of messages, a single message, or selected fields
within a message. - ANSW True
Two numbers are relatively prime if they have ________ prime factors in common.
- ANSW no
Discrete logarithms are fundamental to a number of public-key algorithms
including __________ key exchange and the DSA. - ANSW Diffie-Hellman
Prime numbers play a __________ role in number theory. - ANSW critical
One of the useful features of the Chinese remainder theorem is that it provides a
way to manipulate potentially very large numbers mod M in terms of tuples of
smaller numbers. - ANSW True
For many cryptographic algorithms, it is necessary to select one or more very large
prime numbers. - ANSW True
The procedure TEST takes a candidate integer n as input and returns the result
__________ if n is definitely not a prime. - ANSW composite
Two theorems that play important roles in public-key cryptography are Fermat's
theorem and Euler's theorem. - ANSW True
The primitive roots for the prime number 19 are 2, 3, 10, 13, 14 and 15. - ANSW
True
All integers have primitive roots. - ANSW False
As a _________ relation, mod expresses that two arguments have the same
remainder with respect to a given modulus. - ANSW congruence
If both sender and receiver use the same key, the system is referred to as: -
ANSW conventional encryption
A way to improve on the simple monoalphabetic technique is to use different
monoalphabetic substitutions as one proceeds through the plaintext message. The
general name for this approach is ___________ . - ANSW polyalphabetic
substitution cipher

Written for

Course

Document information

Uploaded on
February 1, 2024
Number of pages
8
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.19
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
smartchoices Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
36
Member since
5 year
Number of followers
5
Documents
4499
Last sold
1 month ago

4.8

9 reviews

5
7
4
2
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions