1- What is “Symmetric encryption”: A form of cryptosystem in which encryption and decryption are performed using the same key
2-
In asymmetric key
cryptography, the private key is known by receiver
3-
…………………………………….. Illegal taking of another’s physical,
electronic, or intellectual property Theft
4-
an object, person,
or other entity that represents a constant danger to an asset Threat
5-
The type of threats on
the security of a computer system or network can be ,
Modification, Fabrication, and interception
6-
Nigerian letter is considered
as Social Engineering attack
7-
programs
can be used to accomplish functions indirectly that an unauthorized user could
not accomplish directly. None of these
8-
A modification attack is
an attack against the -------------------------service data
integrity
9-
MySQL uses security based
on ACL which stands for ______________ Access Control Lists
10-
In symmetric key
cryptography, the key is known by sender and receiver
11-
An attempt to make a
computer resource unavailable to its intended users is called denial-of-service
attack
12-
A ………….. is a program
that can infect other programs by modifying them, the modification includes a
copy of the virus program, which can go on to infect other programs. Virus
ليست هناك تعليقات:
إرسال تعليق