CSIS-463 Exam 1| Chapter 1-4 Questions and Answers
| A+ rated Solutions
The denial of service prevents or inhibits the normal use or management of
communication facilities. - ANSW True
_____________ is the collection of tools, policies, security concepts, security
safeguards, guidelines, risk management approaches, actions, training, best
practices, assurance, and technologies that can be used to protect the cyberspace
environment and organization and users' assets. - ANSW Cybersecurity
Data authenticity assures that private or confidential information is not made
available or disclosed to unauthorized individuals. - ANSW False
A loss of integrity is the unauthorized modification or destruction of information. -
ANSW True
Data appended to, or a cryptographic transformation of, a data unit that allows a
recipient of the data unit to prove the source and integrity of the data unit and
protect against forgery is a(n) ___________ . - ANSW digital signature
Security attacks are classified as either passive or aggressive. - ANSW False
Information security and network security are subsets of cybersecurity. - ANSW
True
Cybersecurity strives to ensure the attainment and maintenance of the security
properties of the organization and users' assets against relevant security risks in the
cyberspace environment. - ANSW True
The emphasis in dealing with active attacks is on prevention rather than detection.
- ANSW False
, Integrity can apply to a stream of messages, a single message, or selected fields
within a message. - ANSW True
Two numbers are relatively prime if they have ________ prime factors in common.
- ANSW no
Discrete logarithms are fundamental to a number of public-key algorithms
including __________ key exchange and the DSA. - ANSW Diffie-Hellman
Prime numbers play a __________ role in number theory. - ANSW critical
One of the useful features of the Chinese remainder theorem is that it provides a
way to manipulate potentially very large numbers mod M in terms of tuples of
smaller numbers. - ANSW True
For many cryptographic algorithms, it is necessary to select one or more very large
prime numbers. - ANSW True
The procedure TEST takes a candidate integer n as input and returns the result
__________ if n is definitely not a prime. - ANSW composite
Two theorems that play important roles in public-key cryptography are Fermat's
theorem and Euler's theorem. - ANSW True
The primitive roots for the prime number 19 are 2, 3, 10, 13, 14 and 15. - ANSW
True
All integers have primitive roots. - ANSW False
As a _________ relation, mod expresses that two arguments have the same
remainder with respect to a given modulus. - ANSW congruence
If both sender and receiver use the same key, the system is referred to as: -
ANSW conventional encryption
A way to improve on the simple monoalphabetic technique is to use different
monoalphabetic substitutions as one proceeds through the plaintext message. The
general name for this approach is ___________ . - ANSW polyalphabetic
substitution cipher
| A+ rated Solutions
The denial of service prevents or inhibits the normal use or management of
communication facilities. - ANSW True
_____________ is the collection of tools, policies, security concepts, security
safeguards, guidelines, risk management approaches, actions, training, best
practices, assurance, and technologies that can be used to protect the cyberspace
environment and organization and users' assets. - ANSW Cybersecurity
Data authenticity assures that private or confidential information is not made
available or disclosed to unauthorized individuals. - ANSW False
A loss of integrity is the unauthorized modification or destruction of information. -
ANSW True
Data appended to, or a cryptographic transformation of, a data unit that allows a
recipient of the data unit to prove the source and integrity of the data unit and
protect against forgery is a(n) ___________ . - ANSW digital signature
Security attacks are classified as either passive or aggressive. - ANSW False
Information security and network security are subsets of cybersecurity. - ANSW
True
Cybersecurity strives to ensure the attainment and maintenance of the security
properties of the organization and users' assets against relevant security risks in the
cyberspace environment. - ANSW True
The emphasis in dealing with active attacks is on prevention rather than detection.
- ANSW False
, Integrity can apply to a stream of messages, a single message, or selected fields
within a message. - ANSW True
Two numbers are relatively prime if they have ________ prime factors in common.
- ANSW no
Discrete logarithms are fundamental to a number of public-key algorithms
including __________ key exchange and the DSA. - ANSW Diffie-Hellman
Prime numbers play a __________ role in number theory. - ANSW critical
One of the useful features of the Chinese remainder theorem is that it provides a
way to manipulate potentially very large numbers mod M in terms of tuples of
smaller numbers. - ANSW True
For many cryptographic algorithms, it is necessary to select one or more very large
prime numbers. - ANSW True
The procedure TEST takes a candidate integer n as input and returns the result
__________ if n is definitely not a prime. - ANSW composite
Two theorems that play important roles in public-key cryptography are Fermat's
theorem and Euler's theorem. - ANSW True
The primitive roots for the prime number 19 are 2, 3, 10, 13, 14 and 15. - ANSW
True
All integers have primitive roots. - ANSW False
As a _________ relation, mod expresses that two arguments have the same
remainder with respect to a given modulus. - ANSW congruence
If both sender and receiver use the same key, the system is referred to as: -
ANSW conventional encryption
A way to improve on the simple monoalphabetic technique is to use different
monoalphabetic substitutions as one proceeds through the plaintext message. The
general name for this approach is ___________ . - ANSW polyalphabetic
substitution cipher