أهلا وسهلا بكم في مدونة
منوعات فلسطينية

الأحد، 1 مايو 2022

Information Security 11

 

1-      The lack of electricity is an example availability is not satisfied 

 

2-      RSA is considered as an example of  Asymmetric ciphers

 

 

3-      RC4 is an example of Stream ciphers

 

4-      In symmetric key cryptography, the key is known by sender and receiver

 

 

5-      Primarily responsible for assessment, management, and implementation of IS in the organization Chief Information Security Officer (CISO)

 

6-      A modification attack is an attack against the -------------------------service Data integrity

 

 

7-      Public key is used for encryption in Asymmetric ciphers

 

8-      Primarily responsible for advising senior executives on strategic planning Chief Information Officer (CIO)

 

 

9-      Cryptographic algorithms means All the mentioned answers

used to achieve CIA

Hide messages

encrypt messages

sign messages

All the mentioned answers

 

 

10-   Which of the following is not a goals of information security?

a-      Confidentiality, integrity, and availability

b-      People controls, process controls, and technology controls

c-       Prevention ,detection ,and response
None of these



ليست هناك تعليقات:

إرسال تعليق