SlideShare a Scribd company logo
Cryptography and Network Security Principles and
Practice 6th Edition William Stallings Test Bank
download pdf
https://testbankmall.com/product/cryptography-and-network-security-
principles-and-practice-6th-edition-william-stallings-test-bank/
Visit testbankmall.com today to download the complete set of
test banks or solution manuals!
Here are some recommended products for you. Click the link to
download, or explore more at testbankmall.com
Test Bank for Computer Security: Principles and Practice,
4th Edition, William Stallings, Lawrie Brown
https://testbankmall.com/product/test-bank-for-computer-security-
principles-and-practice-4th-edition-william-stallings-lawrie-brown/
Test Bank for Network Security Essentials Applications and
Standards, 5/E 5th Edition William Stallings
https://testbankmall.com/product/test-bank-for-network-security-
essentials-applications-and-standards-5-e-5th-edition-william-
stallings/
Test bank for Computer Security: Principles and Practice
3e by Stallings 9780133773927
https://testbankmall.com/product/test-bank-for-computer-security-
principles-and-practice-3e-by-stallings-9780133773927/
Test Bank for Marketing Real People Real Choices 4th
Canadian Edition by Solomon
https://testbankmall.com/product/test-bank-for-marketing-real-people-
real-choices-4th-canadian-edition-by-solomon/
Test Bank for Managerial Economics 6th Edition for Keat
https://testbankmall.com/product/test-bank-for-managerial-
economics-6th-edition-for-keat/
Wardlaw’s Contemporary Nutrition Smith 10th Edition Test
Bank
https://testbankmall.com/product/wardlaws-contemporary-nutrition-
smith-10th-edition-test-bank/
Test Bank for Biological Science Freeman 5th Edition
https://testbankmall.com/product/test-bank-for-biological-science-
freeman-5th-edition/
Test Bank for Developing Person Through Childhood and
Adolescence, 11th Edition Kathleen Stassen Berger
https://testbankmall.com/product/test-bank-for-developing-person-
through-childhood-and-adolescence-11th-edition-kathleen-stassen-
berger/
Corporate Finance Berk 3rd Edition Test Bank
https://testbankmall.com/product/corporate-finance-berk-3rd-edition-
test-bank/
Solution Manual for Mathematical Proofs: A Transition to
Advanced Mathematics, 3/E 3rd Edition Gary Chartrand,
Albert D. Polimeni, Ping Zhang
https://testbankmall.com/product/solution-manual-for-mathematical-
proofs-a-transition-to-advanced-mathematics-3-e-3rd-edition-gary-
chartrand-albert-d-polimeni-ping-zhang/
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
T F 11. The connection- oriented integrity service addresses both
message stream modification and denial of service.
T F 12. All the techniques for providing security have two components: a
security- related transformation on the information to be sent and
some secret information shared by the two principals.
T F 13. Information access threats intercept or modify data on behalf of
users who should not have access to that data.
T F 14. The data integrity service inserts bits into gaps in a data stream to
frustrate traffic analysis attempts.
T F 15. Symmetric encryption is used to conceal the contents of blocks or
streams of data of any size, including messages, files, encryption
keys, and passwords.
MULTIPLE CHOICE
1. __________ is the most common method used to conceal small blocks of data,
such as encryption keys and hash function values, which are used in digital
signatures.
A) Symmetric encryption B) Data integrity algorithms
C) Asymmetric encryption D) Authentication protocols
2. A common technique for masking contents of messages or other information
traffic so that opponents can not extract the information from the message is
__________ .
A) integrity B) encryption
C) analysis D) masquerade
3. __________ involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect.
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
A) Disruption B) Replay
C) Service denial D) Masquerade
4. The three concepts that form what is often referred to as the CIA triad are
________ . These three concepts embody the fundamental security objectives
for both data and for information and computing services.
A) confidentiality, integrity and availability
B) communication, integrity and authentication
C) confidentiality, integrity, access control
D) communication, information and authenticity
5. A loss of __________ is the unauthorized disclosure of information.
A) authenticity B) confidentiality
C) reliability D) integrity
6. Verifying that users are who they say they are and that each input arriving at
the system came from a trusted source is _________ .
A) authenticity B) credibility
C) accountability D) integrity
7. A _________ level breach of security could cause a significant degradation in
mission capability to an extent and duration that the organization is able to
perform its primary functions, but the effectiveness of the functions is
significantly reduced.
A) catastrophic B) moderate
C) low D) high
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
8. A __________ is any action that compromises the security of information owned
by an organization.
A) security attack B) security service
C) security alert D) security mechanism
9. A __________ takes place when one entity pretends to be a different entity.
A) replay B) masquerade
C) service denial D) passive attack
10. __________ is the protection of transmitted data from passive attacks.
A) Access control B) Data control
C) Nonrepudiation D) Confidentiality
11. A(n) __________ service is one that protects a system to ensure its availability
and addresses the security concerns raised by denial- of- service attacks.
A) replay B) availability
C) masquerade D) integrity
12. __________ threats exploit service flaws in computers to inhibit use by
legitimate users.
A) Information access B) Reliability
C) Passive D) Service
13. A(n) __________ is a potential for violation of security, which exists when there
is a circumstance, capability, action or event that could breach security and
cause harm.
A) threat B) attack
C) risk D) attack vector
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
14. The protection of the information that might be derived from observation of
traffic flows is _________ .
A) connectionless confidentiality B) connection confidentiality
C) traffic- flow confidentiality D) selective- field confidentiality
15. Data appended to, or a cryptographic transformation of, a data unit that
allows a recipient of the data unit to prove the source and integrity of the
data unit and protect against forgery is a(n) ___________ .
A) security audit trail B) digital signature
C) encipherment D) authentication exchange
SHORT ANSWER
1. A ___________ is any process, or a device incorporating such a process, that is
designed to detect, prevent, or recover from a security attack. Examples are
encryption algorithms, digital signatures and authentication protocols.
2. An __________ attack attempts to alter system resources or affect their operation.
3. "The protection afforded to an automated information system in order to attain
the applicable objectives of preserving the integrity, availability and confidentiality
of information system resources" is the definition of _________ .
4. A loss of __________ is the disruption of access to or use of information or an
information system.
5. Irreversible __________ mechanisms include hash algorithms and message
authentication codes, which are used in digital signature and message
authentication applications.
6. In the United States, the release of student grade information is regulated by the
__________ .
7. A loss of _________ is the unauthorized modification or destruction of information.
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
8. A _________ attack attempts to learn or make use of information from the system
but does not affect system resources.
9. The __________ service is concerned with assuring the recipient that the message is
from the source that it claims to be from. This service must also assure that the
connection is not interfered with in such a way that a third party can masquerade as
one of the two legitimate parties for the purposes of unauthorized transmission or
reception.
10. Two specific authentication services defined in X.800 are peer entity
authentication and _________ authentication.
11. In the context of network security, ___________ is the ability to limit and control the
access to host systems and applications via communications links.
12. __________ prevents either sender or receiver from denying a transmitted
message. Thus, when a message is sent, the receiver can prove that the alleged
sender in fact sent the message and when a message is received, the sender can
prove that the alleged receiver in fact received the message.
13. Viruses and worms are two examples of _________ attacks. Such attacks can be
introduced into a system by means of a disk that contains the unwanted logic
concealed in otherwise useful software. They can also be inserted into a system
across a network.
14. An __________ is an assault on system security that derives from an intelligent act
that is a deliberate attempt to evade security services and violate the security policy
of a system.
15. __________ is the use of a trusted third party to assure certain properties of a data
exchange.
Random documents with unrelated
content Scribd suggests to you:
with active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or providing
access to or distributing Project Gutenberg™ electronic works
provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™
electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for
the “Right of Replacement or Refund” described in paragraph 1.F.3,
the Project Gutenberg Literary Archive Foundation, the owner of the
Project Gutenberg™ trademark, and any other party distributing a
Project Gutenberg™ electronic work under this agreement, disclaim
all liability to you for damages, costs and expenses, including legal
fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR
NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR
BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK
OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL
NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF
YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of receiving
it, you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or
entity that provided you with the defective work may elect to provide
a replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,
the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.
Section 2. Information about the Mission
of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.
The Foundation’s business office is located at 809 North 1500 West,
Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws regulating
charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.
While we cannot and do not solicit contributions from states where
we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot make
any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Section 5. General Information About
Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
This website includes information about Project Gutenberg™,
including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.
back
back
back
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
testbankmall.com

More Related Content

PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
PDF
Download full ebook of n instant download pdf
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
PDF
Download the entire Cryptography and Network Security Principles and Practice...
Cryptography and Network Security Principles and Practice 6th Edition William...
Cryptography and Network Security Principles and Practice 6th Edition William...
Cryptography and Network Security Principles and Practice 6th Edition William...
Cryptography and Network Security Principles and Practice 6th Edition William...
Download full ebook of n instant download pdf
Cryptography and Network Security Principles and Practice 6th Edition William...
Cryptography and Network Security Principles and Practice 6th Edition William...
Download the entire Cryptography and Network Security Principles and Practice...

Similar to Cryptography and Network Security Principles and Practice 6th Edition William Stallings Test Bank (20)

PDF
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
PDF
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
PDF
Download all chapters of Test Bank for Network Security Essentials Applicatio...
PDF
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
PDF
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
PDF
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
PDF
Download full ebook of d instant download pdf
PDF
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
PDF
Test Bank for Computer Security: Principles and Practice, 4th Edition, Willia...
DOCX
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
PDF
Test Bank for Computer Security: Principles and Practice, 4th Edition, Willia...
PDF
Cryptography and Network Security ppt . pdf
PDF
The Road Network security
DOCX
CCS354-NETWORK SECURITY-network-security notes
PDF
Cyber Security
PPTX
Computer Security Chapter 1
PDF
Is4560
PDF
A Review on Various Methods of Cryptography for Cyber Security
PDF
Cyber Security Matters a book by Hama David Bundo
PPTX
Lecture1-InforSec-Computer and Internet security.pptx
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
Download all chapters of Test Bank for Network Security Essentials Applicatio...
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
Download full ebook of d instant download pdf
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
Test Bank for Computer Security: Principles and Practice, 4th Edition, Willia...
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
Test Bank for Computer Security: Principles and Practice, 4th Edition, Willia...
Cryptography and Network Security ppt . pdf
The Road Network security
CCS354-NETWORK SECURITY-network-security notes
Cyber Security
Computer Security Chapter 1
Is4560
A Review on Various Methods of Cryptography for Cyber Security
Cyber Security Matters a book by Hama David Bundo
Lecture1-InforSec-Computer and Internet security.pptx
Ad

Recently uploaded (20)

PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Lesson notes of climatology university.
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Basic Mud Logging Guide for educational purpose
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Classroom Observation Tools for Teachers
PPTX
Institutional Correction lecture only . . .
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
TR - Agricultural Crops Production NC III.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Anesthesia in Laparoscopic Surgery in India
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Renaissance Architecture: A Journey from Faith to Humanism
O7-L3 Supply Chain Operations - ICLT Program
Lesson notes of climatology university.
O5-L3 Freight Transport Ops (International) V1.pdf
PPH.pptx obstetrics and gynecology in nursing
Basic Mud Logging Guide for educational purpose
Abdominal Access Techniques with Prof. Dr. R K Mishra
Final Presentation General Medicine 03-08-2024.pptx
Classroom Observation Tools for Teachers
Institutional Correction lecture only . . .
STATICS OF THE RIGID BODIES Hibbelers.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Ad

Cryptography and Network Security Principles and Practice 6th Edition William Stallings Test Bank

  • 1. Cryptography and Network Security Principles and Practice 6th Edition William Stallings Test Bank download pdf https://testbankmall.com/product/cryptography-and-network-security- principles-and-practice-6th-edition-william-stallings-test-bank/ Visit testbankmall.com today to download the complete set of test banks or solution manuals!
  • 2. Here are some recommended products for you. Click the link to download, or explore more at testbankmall.com Test Bank for Computer Security: Principles and Practice, 4th Edition, William Stallings, Lawrie Brown https://testbankmall.com/product/test-bank-for-computer-security- principles-and-practice-4th-edition-william-stallings-lawrie-brown/ Test Bank for Network Security Essentials Applications and Standards, 5/E 5th Edition William Stallings https://testbankmall.com/product/test-bank-for-network-security- essentials-applications-and-standards-5-e-5th-edition-william- stallings/ Test bank for Computer Security: Principles and Practice 3e by Stallings 9780133773927 https://testbankmall.com/product/test-bank-for-computer-security- principles-and-practice-3e-by-stallings-9780133773927/ Test Bank for Marketing Real People Real Choices 4th Canadian Edition by Solomon https://testbankmall.com/product/test-bank-for-marketing-real-people- real-choices-4th-canadian-edition-by-solomon/
  • 3. Test Bank for Managerial Economics 6th Edition for Keat https://testbankmall.com/product/test-bank-for-managerial- economics-6th-edition-for-keat/ Wardlaw’s Contemporary Nutrition Smith 10th Edition Test Bank https://testbankmall.com/product/wardlaws-contemporary-nutrition- smith-10th-edition-test-bank/ Test Bank for Biological Science Freeman 5th Edition https://testbankmall.com/product/test-bank-for-biological-science- freeman-5th-edition/ Test Bank for Developing Person Through Childhood and Adolescence, 11th Edition Kathleen Stassen Berger https://testbankmall.com/product/test-bank-for-developing-person- through-childhood-and-adolescence-11th-edition-kathleen-stassen- berger/ Corporate Finance Berk 3rd Edition Test Bank https://testbankmall.com/product/corporate-finance-berk-3rd-edition- test-bank/
  • 4. Solution Manual for Mathematical Proofs: A Transition to Advanced Mathematics, 3/E 3rd Edition Gary Chartrand, Albert D. Polimeni, Ping Zhang https://testbankmall.com/product/solution-manual-for-mathematical- proofs-a-transition-to-advanced-mathematics-3-e-3rd-edition-gary- chartrand-albert-d-polimeni-ping-zhang/
  • 5. Cryptography and Network Security: Principles and Practice, 6th Edition, by William Stallings T F 11. The connection- oriented integrity service addresses both message stream modification and denial of service. T F 12. All the techniques for providing security have two components: a security- related transformation on the information to be sent and some secret information shared by the two principals. T F 13. Information access threats intercept or modify data on behalf of users who should not have access to that data. T F 14. The data integrity service inserts bits into gaps in a data stream to frustrate traffic analysis attempts. T F 15. Symmetric encryption is used to conceal the contents of blocks or streams of data of any size, including messages, files, encryption keys, and passwords. MULTIPLE CHOICE 1. __________ is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures. A) Symmetric encryption B) Data integrity algorithms C) Asymmetric encryption D) Authentication protocols 2. A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ . A) integrity B) encryption C) analysis D) masquerade 3. __________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.
  • 6. Cryptography and Network Security: Principles and Practice, 6th Edition, by William Stallings A) Disruption B) Replay C) Service denial D) Masquerade 4. The three concepts that form what is often referred to as the CIA triad are ________ . These three concepts embody the fundamental security objectives for both data and for information and computing services. A) confidentiality, integrity and availability B) communication, integrity and authentication C) confidentiality, integrity, access control D) communication, information and authenticity 5. A loss of __________ is the unauthorized disclosure of information. A) authenticity B) confidentiality C) reliability D) integrity 6. Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________ . A) authenticity B) credibility C) accountability D) integrity 7. A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. A) catastrophic B) moderate C) low D) high
  • 7. Cryptography and Network Security: Principles and Practice, 6th Edition, by William Stallings 8. A __________ is any action that compromises the security of information owned by an organization. A) security attack B) security service C) security alert D) security mechanism 9. A __________ takes place when one entity pretends to be a different entity. A) replay B) masquerade C) service denial D) passive attack 10. __________ is the protection of transmitted data from passive attacks. A) Access control B) Data control C) Nonrepudiation D) Confidentiality 11. A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial- of- service attacks. A) replay B) availability C) masquerade D) integrity 12. __________ threats exploit service flaws in computers to inhibit use by legitimate users. A) Information access B) Reliability C) Passive D) Service 13. A(n) __________ is a potential for violation of security, which exists when there is a circumstance, capability, action or event that could breach security and cause harm. A) threat B) attack C) risk D) attack vector
  • 8. Cryptography and Network Security: Principles and Practice, 6th Edition, by William Stallings 14. The protection of the information that might be derived from observation of traffic flows is _________ . A) connectionless confidentiality B) connection confidentiality C) traffic- flow confidentiality D) selective- field confidentiality 15. Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________ . A) security audit trail B) digital signature C) encipherment D) authentication exchange SHORT ANSWER 1. A ___________ is any process, or a device incorporating such a process, that is designed to detect, prevent, or recover from a security attack. Examples are encryption algorithms, digital signatures and authentication protocols. 2. An __________ attack attempts to alter system resources or affect their operation. 3. "The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources" is the definition of _________ . 4. A loss of __________ is the disruption of access to or use of information or an information system. 5. Irreversible __________ mechanisms include hash algorithms and message authentication codes, which are used in digital signature and message authentication applications. 6. In the United States, the release of student grade information is regulated by the __________ . 7. A loss of _________ is the unauthorized modification or destruction of information.
  • 9. Cryptography and Network Security: Principles and Practice, 6th Edition, by William Stallings 8. A _________ attack attempts to learn or make use of information from the system but does not affect system resources. 9. The __________ service is concerned with assuring the recipient that the message is from the source that it claims to be from. This service must also assure that the connection is not interfered with in such a way that a third party can masquerade as one of the two legitimate parties for the purposes of unauthorized transmission or reception. 10. Two specific authentication services defined in X.800 are peer entity authentication and _________ authentication. 11. In the context of network security, ___________ is the ability to limit and control the access to host systems and applications via communications links. 12. __________ prevents either sender or receiver from denying a transmitted message. Thus, when a message is sent, the receiver can prove that the alleged sender in fact sent the message and when a message is received, the sender can prove that the alleged receiver in fact received the message. 13. Viruses and worms are two examples of _________ attacks. Such attacks can be introduced into a system by means of a disk that contains the unwanted logic concealed in otherwise useful software. They can also be inserted into a system across a network. 14. An __________ is an assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system. 15. __________ is the use of a trusted third party to assure certain properties of a data exchange.
  • 10. Random documents with unrelated content Scribd suggests to you:
  • 11. with active links or immediate access to the full terms of the Project Gutenberg™ License. 1.E.6. You may convert to and distribute this work in any binary, compressed, marked up, nonproprietary or proprietary form, including any word processing or hypertext form. However, if you provide access to or distribute copies of a Project Gutenberg™ work in a format other than “Plain Vanilla ASCII” or other format used in the official version posted on the official Project Gutenberg™ website (www.gutenberg.org), you must, at no additional cost, fee or expense to the user, provide a copy, a means of exporting a copy, or a means of obtaining a copy upon request, of the work in its original “Plain Vanilla ASCII” or other form. Any alternate format must include the full Project Gutenberg™ License as specified in paragraph 1.E.1. 1.E.7. Do not charge a fee for access to, viewing, displaying, performing, copying or distributing any Project Gutenberg™ works unless you comply with paragraph 1.E.8 or 1.E.9. 1.E.8. You may charge a reasonable fee for copies of or providing access to or distributing Project Gutenberg™ electronic works provided that: • You pay a royalty fee of 20% of the gross profits you derive from the use of Project Gutenberg™ works calculated using the method you already use to calculate your applicable taxes. The fee is owed to the owner of the Project Gutenberg™ trademark, but he has agreed to donate royalties under this paragraph to the Project Gutenberg Literary Archive Foundation. Royalty payments must be paid within 60 days following each date on which you prepare (or are legally required to prepare) your periodic tax returns. Royalty payments should be clearly marked as such and sent to the Project Gutenberg Literary Archive Foundation at the address specified in Section 4, “Information
  • 12. about donations to the Project Gutenberg Literary Archive Foundation.” • You provide a full refund of any money paid by a user who notifies you in writing (or by e-mail) within 30 days of receipt that s/he does not agree to the terms of the full Project Gutenberg™ License. You must require such a user to return or destroy all copies of the works possessed in a physical medium and discontinue all use of and all access to other copies of Project Gutenberg™ works. • You provide, in accordance with paragraph 1.F.3, a full refund of any money paid for a work or a replacement copy, if a defect in the electronic work is discovered and reported to you within 90 days of receipt of the work. • You comply with all other terms of this agreement for free distribution of Project Gutenberg™ works. 1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™ electronic work or group of works on different terms than are set forth in this agreement, you must obtain permission in writing from the Project Gutenberg Literary Archive Foundation, the manager of the Project Gutenberg™ trademark. Contact the Foundation as set forth in Section 3 below. 1.F. 1.F.1. Project Gutenberg volunteers and employees expend considerable effort to identify, do copyright research on, transcribe and proofread works not protected by U.S. copyright law in creating the Project Gutenberg™ collection. Despite these efforts, Project Gutenberg™ electronic works, and the medium on which they may be stored, may contain “Defects,” such as, but not limited to, incomplete, inaccurate or corrupt data, transcription errors, a copyright or other intellectual property infringement, a defective or
  • 13. damaged disk or other medium, a computer virus, or computer codes that damage or cannot be read by your equipment. 1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for the “Right of Replacement or Refund” described in paragraph 1.F.3, the Project Gutenberg Literary Archive Foundation, the owner of the Project Gutenberg™ trademark, and any other party distributing a Project Gutenberg™ electronic work under this agreement, disclaim all liability to you for damages, costs and expenses, including legal fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE. 1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you discover a defect in this electronic work within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending a written explanation to the person you received the work from. If you received the work on a physical medium, you must return the medium with your written explanation. The person or entity that provided you with the defective work may elect to provide a replacement copy in lieu of a refund. If you received the work electronically, the person or entity providing it to you may choose to give you a second opportunity to receive the work electronically in lieu of a refund. If the second copy is also defective, you may demand a refund in writing without further opportunities to fix the problem. 1.F.4. Except for the limited right of replacement or refund set forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
  • 14. INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE. 1.F.5. Some states do not allow disclaimers of certain implied warranties or the exclusion or limitation of certain types of damages. If any disclaimer or limitation set forth in this agreement violates the law of the state applicable to this agreement, the agreement shall be interpreted to make the maximum disclaimer or limitation permitted by the applicable state law. The invalidity or unenforceability of any provision of this agreement shall not void the remaining provisions. 1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation, the trademark owner, any agent or employee of the Foundation, anyone providing copies of Project Gutenberg™ electronic works in accordance with this agreement, and any volunteers associated with the production, promotion and distribution of Project Gutenberg™ electronic works, harmless from all liability, costs and expenses, including legal fees, that arise directly or indirectly from any of the following which you do or cause to occur: (a) distribution of this or any Project Gutenberg™ work, (b) alteration, modification, or additions or deletions to any Project Gutenberg™ work, and (c) any Defect you cause. Section 2. Information about the Mission of Project Gutenberg™ Project Gutenberg™ is synonymous with the free distribution of electronic works in formats readable by the widest variety of computers including obsolete, old, middle-aged and new computers. It exists because of the efforts of hundreds of volunteers and donations from people in all walks of life. Volunteers and financial support to provide volunteers with the assistance they need are critical to reaching Project Gutenberg™’s goals and ensuring that the Project Gutenberg™ collection will
  • 15. remain freely available for generations to come. In 2001, the Project Gutenberg Literary Archive Foundation was created to provide a secure and permanent future for Project Gutenberg™ and future generations. To learn more about the Project Gutenberg Literary Archive Foundation and how your efforts and donations can help, see Sections 3 and 4 and the Foundation information page at www.gutenberg.org. Section 3. Information about the Project Gutenberg Literary Archive Foundation The Project Gutenberg Literary Archive Foundation is a non-profit 501(c)(3) educational corporation organized under the laws of the state of Mississippi and granted tax exempt status by the Internal Revenue Service. The Foundation’s EIN or federal tax identification number is 64-6221541. Contributions to the Project Gutenberg Literary Archive Foundation are tax deductible to the full extent permitted by U.S. federal laws and your state’s laws. The Foundation’s business office is located at 809 North 1500 West, Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up to date contact information can be found at the Foundation’s website and official page at www.gutenberg.org/contact Section 4. Information about Donations to the Project Gutenberg Literary Archive Foundation Project Gutenberg™ depends upon and cannot survive without widespread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine-readable form accessible by the widest array of equipment including outdated equipment. Many
  • 16. small donations ($1 to $5,000) are particularly important to maintaining tax exempt status with the IRS. The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States. Compliance requirements are not uniform and it takes a considerable effort, much paperwork and many fees to meet and keep up with these requirements. We do not solicit donations in locations where we have not received written confirmation of compliance. To SEND DONATIONS or determine the status of compliance for any particular state visit www.gutenberg.org/donate. While we cannot and do not solicit contributions from states where we have not met the solicitation requirements, we know of no prohibition against accepting unsolicited donations from donors in such states who approach us with offers to donate. International donations are gratefully accepted, but we cannot make any statements concerning tax treatment of donations received from outside the United States. U.S. laws alone swamp our small staff. Please check the Project Gutenberg web pages for current donation methods and addresses. Donations are accepted in a number of other ways including checks, online payments and credit card donations. To donate, please visit: www.gutenberg.org/donate. Section 5. General Information About Project Gutenberg™ electronic works Professor Michael S. Hart was the originator of the Project Gutenberg™ concept of a library of electronic works that could be freely shared with anyone. For forty years, he produced and distributed Project Gutenberg™ eBooks with only a loose network of volunteer support.
  • 17. Project Gutenberg™ eBooks are often created from several printed editions, all of which are confirmed as not protected by copyright in the U.S. unless a copyright notice is included. Thus, we do not necessarily keep eBooks in compliance with any particular paper edition. Most people start at our website which has the main PG search facility: www.gutenberg.org. This website includes information about Project Gutenberg™, including how to make donations to the Project Gutenberg Literary Archive Foundation, how to help produce our new eBooks, and how to subscribe to our email newsletter to hear about new eBooks.
  • 18. back
  • 19. back
  • 20. back
  • 21. Welcome to our website – the perfect destination for book lovers and knowledge seekers. We believe that every book holds a new world, offering opportunities for learning, discovery, and personal growth. That’s why we are dedicated to bringing you a diverse collection of books, ranging from classic literature and specialized publications to self-development guides and children's books. More than just a book-buying platform, we strive to be a bridge connecting you with timeless cultural and intellectual values. With an elegant, user-friendly interface and a smart search system, you can quickly find the books that best suit your interests. Additionally, our special promotions and home delivery services help you save time and fully enjoy the joy of reading. Join us on a journey of knowledge exploration, passion nurturing, and personal growth every day! testbankmall.com