with correct answers
__________ assures that individuals control or influence what information related
to them may be collected and stored and by whom and to whom that information
may be disclosed. - correct answer ✔✔Privacy
________ assures that a system performs its intended function in an unimpaired
manner, free from deliberate or inadvertent unauthorized manipulation of the
system. - correct answer ✔✔System Integrity
A loss of _________ is the unauthorized disclosure of information. - correct
answer ✔✔Confidentiality
A flaw or weakness in a system's design, implementation, or operation and
management that could be exploited to violate the system's security policy is a(n)
__________. - correct answer ✔✔Vulnerability
An assault on system security that derives from an intelligent act that is a
deliberate attempt to evade security services and violate the security policy of a
system is a(n) __________. - correct answer ✔✔Attack
A(n) __________ is an action, device, procedure, or technique that reduces a
threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing
the harm it can cause, or by discovering and reporting it so that correct action can
be taken. - correct answer ✔✔Countermeasure
, A(n) _________ is an attempt to learn or make use of information from the system
that does not affect system resources. - correct answer ✔✔Passive Attack
Masquerade, falsification, and repudiation are threat actions that cause
__________ threat consequences. - correct answer ✔✔deception
A threat action in which sensitive data are directly released to an unauthorized
entity is __________. - correct answer ✔✔Exposure
The _________ prevents or inhibits the normal use or management of
communications facilities - correct answer ✔✔Denial of Service
The original message or data that is fed into the algorithm is __________. -
correct answer ✔✔Plaintext
The __________ is the encryption algorithm run in reverse. - correct answer
✔✔Decryption Algorithm
__________ is the scrambled message produced as output. - correct answer
✔✔Ciphertext
On average, __________ of all possible keys must be tried to achieve success with
a brute-force attack. - correct answer ✔✔Half