أهلا وسهلا بكم في مدونة
منوعات فلسطينية

الأحد، 1 مايو 2022

Information Security 2

 



1-      What is “Symmetric encryption”: A form of cryptosystem in which encryption and decryption are performed using the same key

 

2-      In asymmetric key cryptography, the private key is known by receiver

 

 

3-      …………………………………….. Illegal taking of another’s physical, electronic, or intellectual property Theft

 

4-                                            an object, person, or other entity that represents a constant danger to an asset Threat

 

 

5-      The type of threats on the security of a computer system or network can be , Modification, Fabrication, and interception

 

6-      Nigerian letter is considered as Social Engineering attack

 

 

7-                                                      programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. None of these

 

8-      A modification attack is an attack against the -------------------------service data integrity

 

 

9-      MySQL uses security based on ACL which stands for ______________ Access Control Lists

 

10-   In symmetric key cryptography, the key is known by sender and receiver

 

 

11-   An attempt to make a computer resource unavailable to its intended users is called denial-of-service attack

 

12-   A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. Virus



ليست هناك تعليقات:

إرسال تعليق