MPCS 92571

subject Type Homework Help
subject Pages 6
subject Words 461
subject Authors Lawrie Brown, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Stream ciphers are far more common than block ciphers.
A good technique for choosing a password is to use the first letter of each word of a
phrase.
The three most important symmetric block ciphers are: 3DES, AES, and _____.
The advantage of a stream cipher is that you can reuse keys.
page-pf2
The evaluation criteria for the new hash function are: security, _______, and algorithm
and implementation characteristics.
Low-intensity devices such as cellular telephones do not interfere with electronic
equipment.
AES uses a Feistel structure.
A __________ processes the plaintext input in fixed-size blocks and produces a block
of ciphertext of equal size for each plaintext block.
page-pf3
A brute-force approach involves trying every possible key until an intelligible
translation of the ciphertext into plaintext is obtained.
A __________ attack attempts to disable a user authentication service by flooding the
service with numerous authentication attempts.
__________ are alarming for two reasons: they come from a completely unexpected
direction and they are a ciphertext-only attack.
page-pf4
__________ is a security service that monitors and analyzes system events for the
purpose of finding, and providing real-time warning of attempts to access system
resources in an unauthorized manner.
The default set of rights should always follow the rule of least privilege or read-only
access
"No read up" is also referred to as the _________ property.
CRC is an error detecting code.
page-pf5
Once in place controls cannot be adjusted, regardless of the results of risk assessment of
systems in the organization.
To prevent XSS attacks any user supplied input should be examined and any dangerous
code removed or escaped to block its execution.
In general, a(n) ________ program seeks to inform and focus an employee's attention
on issues related to security within the organization.
page-pf6
Security education is most often taught by outside sources.
Physical security must prevent misuse of the physical infrastructure that leads to the
misuse or damage of the protected information.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.