You are on page 1of 2

age 1

1 Informat|on Secur|ty 1echno|og|es


Assessment uest|on Set
art I Mu|t|p|e Cho|ces
M1 After an attacker probed a computer or network for |nformat|on what he]she
wou|d do next?

8) peneLraLe any defenses

M2 An organ|zat|on that purchased secur|ty products from d|fferent vendors |n case
an attacker c|rcumvented the 8rand A dev|ce yet wou|d have more d|ff|cu|ty try|ng to
break through a 8rand 8 dev|ce because they are d|fferent |s an examp|es of

D) dlverslLy

M3 An examp|e of wou|d be not revea||ng the type of computer operat|ng system
software and network connect|on a computer uses

C) obscurlLy

M rov|ng that a user sent an ema|| message |s known as

A) nonrepudlaLlon

MS Wh|ch of the fo||ow|ng |s a protect|on prov|ded by hash|ng?

8) lnLegrlLy



age 2


art II Ca|cu|at|on
C1 Autokey c|pher G|ven key 'try' decrypt the fo||ow|ng c|pher

MC V1 IMG VID CVk LC UnS II 1LU
1k 1k 1k 1k 1k 1k 1k 1k 1k

Answer 1PL Cl PL8 ClM AC? CvL LMC l1C CSS

C2 1ry to decrypt the fo||ow|ng message encrypted by Caesar C|pher

P 8ZLu P 8Zv P 8nM1uCuC

Answer l CAML l SAW l CCnCuL8Lu

You might also like