1-
The lack of electricity
is an example availability is not satisfied
2-
RSA is considered as an
example of Asymmetric ciphers
3-
RC4 is an example of Stream
ciphers
4-
In symmetric key
cryptography, the key is known by sender and receiver
5-
Primarily responsible for
assessment, management, and implementation of IS in the organization Chief
Information Security Officer (CISO)
6-
A modification attack is
an attack against the -------------------------service Data
integrity
7-
Public key is used for
encryption in Asymmetric ciphers
8-
Primarily responsible for
advising senior executives on strategic planning Chief Information
Officer (CIO)
9-
Cryptographic algorithms
means All the mentioned answers
used to achieve CIA
Hide”
messages
encrypt messages
sign messages
All the mentioned
answers
10-
Which of the following is
not a goals of information security?
a-
Confidentiality, integrity,
and availability
b-
People controls, process
controls, and technology controls
c-
Prevention ,detection ,and
response
None
of these
ليست هناك تعليقات:
إرسال تعليق