You are on page 1of 21

All correct except ​Genuine

Correct

False

Correct

True
True

True

SYN spoofing attacks

False

True
Signature detection

Spidering

Keystream

SYN spoofing attacks


Intrusion detection

Digital signature

Randomness
Unpredictability
A signature-based countermeasure to malware:​ Antivirus​​ . 
A .............................. RBAC facility needs create and delete roles, define permissions for 


a role, assign and cancel assignment of users to roles.​ Consolidated 
 
 
 
Which of following are examples of symmetric block encryption standards?
● AES (Advanced Encryption Standard)
● DES

which of the following algorithms is less computation required during encryption?


Public key and symmetric key encryption

The following algorithms require the use of both digital signatures and encryption of their secret
keys?
RSA (everything except scream)

A .............................. RBAC facility needs create and delete roles, define permissions for a role,
assign and cancel assignment of users to roles. (consolidated)

A ______ ​specifies authorized objects and operations for a particular user​.


​capability ticket.

User authentication is the process of establishing ------------- in user


identities that are presented electronically to a computer system.
Validity

In a ...................... password checker, the user is allowed to select his or


her own password but at the time of selection, the system checks to see
if the password is allowable or not.
Proactive
The challenge-response protocol protects against which kinds of attack?
Replay attack
 
 

You might also like