Issc362 Quiz 1 Essay

Words: 912
Pages: 4

Question 1 of 20 | 5.0 Points |
Which of the following refers to a piece of code designed to cause harm that is intentionally inserted into a software system and will activate upon the occurrence of some predetermined data, time, or event? | | A.Logic bomb | | | B.Trojan horse | | | C.Cracker | | | D.Denial of service (DoS) attack | | Answer Key: A | | | Question 2 of 20 | 5.0 Points |
Denial of service (DoS) and distributed denial of service (DDoS) attacks have the same effect, however a distributed denial of service (DDos) attack: | | A.involves accessing a system of computers without authorization. | | | B.is launched from large numbers of hosts that have been compromised and act after receiving a
…show more content…
| | | B.a means to detect modification of information. | | | C.the ability to hack into systems and remain undetected. | | | D. the ability to have confidence as to the true origin of information through what is known as nonrepudiation. | | Answer Key: C | | | Question 12 of 20 | 5.0 Points |
Which of the following terms refers to the process of positively identifying a party as a user, computer, or service? | | A.Authentication | | | B.Hash | | | C.Cipher | | | D.Integrity | | Answer Key: A | | | Question 13 of 20 | 5.0 Points |
Which of the following terms refers to the ability to verify that information has not been altered and has remained in the form originally intended by the creator? | | A.Authentication | | | B.Hash | | | C.Cipher | | | D.Integrity | | Answer Key: D | | | Question 14 of 20 | 5.0 Points |
Which of the following terms refers to the ability to have definite proof that a message originated from a specific party? | | A.Nonrepudiation | | | B.Authentication | | | C.Integrity | | | D.Confidentiality | | Answer Key: A | | | Question 15 of 20 | 5.0 Points |
What type of encryption uses the same key to encrypt and to decrypt information? | | A.Symmetric encryption | | | B.Asymmetric encryption | | | C.Non-symmetric encryption | | | D. No type of encryption uses the same key to encrypt and to