A(n) _________ is any circumstance or event with the potential to adversely impact
organizational operations (including mission, functions, image, or reputation),
organizational assets, individuals, other organizations, or the Nation through an
information system via unauthorized access, destruction, disclosure, modification of
information, and/or denial of service. - ANSW Threat
The OSI security architecture focuses on security attacks, mechanisms, and services -
ANSW True
Cybersecurity strives to ensure the attainment and maintenance of the security
properties of the organization and user's assets against relevant security risks in the
cyberspace environment - ANSW True
A _________________ takes place when one entity pretends to be a different entity. -
ANSW masquerade
An active attack attempts to alter system resources or affect their operation - ANSW
True
Security services implement security policies and are implemented by security
mechanisms - ANSW True
A loss of integrity is the unauthorized modification or destruction of information - ANSW
True
Integrity can apply to a stream of messages, a single message, or selected fields within
a message - ANSW True
The denial of service prevents or inhibits the normal use or management of
communication facilities - ANSW True
A common technique for masking the contents of messages or other information traffic
so that opponents cannot extract the information from the message is ____________ -
ANSW Encryption
Passive attacks are very easy to detect because they involve alteration of the data. -
ANSW False
______________________ is a branch of mathematics that deals with the
transformation of data. - ANSW Cryptography