SlideShare a Scribd company logo
Get Full Test Bank Downloads on testbankbell.com
Cryptography and Network Security Principles and
Practice 6th Edition William Stallings Test Bank
http://testbankbell.com/product/cryptography-and-network-
security-principles-and-practice-6th-edition-william-
stallings-test-bank/
OR CLICK BUTTON
DOWLOAD EBOOK
Download more test bank from https://testbankbell.com
More products digital (pdf, epub, mobi) instant
download maybe you interests ...
Test Bank for Computer Security: Principles and
Practice, 4th Edition, William Stallings, Lawrie Brown
https://testbankbell.com/product/test-bank-for-computer-security-
principles-and-practice-4th-edition-william-stallings-lawrie-
brown/
Test Bank for Network Security Essentials Applications
and Standards, 5/E 5th Edition William Stallings
https://testbankbell.com/product/test-bank-for-network-security-
essentials-applications-and-standards-5-e-5th-edition-william-
stallings/
Test bank for Computer Security: Principles and
Practice 3e by Stallings 9780133773927
https://testbankbell.com/product/test-bank-for-computer-security-
principles-and-practice-3e-by-stallings-9780133773927/
Test Bank for Operating Systems: Internals and Design
Principles, 7th Edition: William Stallings
https://testbankbell.com/product/test-bank-for-operating-systems-
internals-and-design-principles-7th-edition-william-stallings/
Test Bank for Business Data Communications-
Infrastructure, Networking and Security, 7/E 7th
Edition William Stallings, Tom Case
https://testbankbell.com/product/test-bank-for-business-data-
communications-infrastructure-networking-and-security-7-e-7th-
edition-william-stallings-tom-case/
Solution manual for Business Data Communications-
Infrastructure, Networking and Security, 7/E 7th
Edition William Stallings, Tom Case
https://testbankbell.com/product/solution-manual-for-business-
data-communications-infrastructure-networking-and-
security-7-e-7th-edition-william-stallings-tom-case/
Solution Manual for CompTIA Security+ Guide to Network
Security Fundamentals, 6th Edition, Mark Ciampa
https://testbankbell.com/product/solution-manual-for-comptia-
security-guide-to-network-security-fundamentals-6th-edition-mark-
ciampa/
Solution Manual for Network Defense and
Countermeasures: Principles and Practices, 3rd Edition
William (Chuck) Easttom II
https://testbankbell.com/product/solution-manual-for-network-
defense-and-countermeasures-principles-and-practices-3rd-edition-
william-chuck-easttom-ii/
Test Bank for CompTIA Security+ Guide to Network
Security Fundamentals – Standalone6th Edition
https://testbankbell.com/product/test-bank-for-comptia-security-
guide-to-network-security-fundamentals-standalone-book-6th-
edition/
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
Cryptography and Network Security Principles
and Practice 6th
Full chapter at: https://testbankbell.com/product/cryptography-and-network-
security-principles-and-practice-6th-edition-william-stallings-test-bank/
CHAPTER 1: OVERVIEW
TRUE OR FALSE
T F 1. The OSI security architecture provides a systematic framework for
defining security attacks, mechanisms, and services.
T F 2. Security attacks are classified as either passive or aggressive.
T F 3. Authentication protocols and encryption algorithms are examples
of security mechanisms.
T F 4. The more critical a component or service, the higher the level of
required availability.
T F 5. Security services include access control, data confidentiality and
data integrity, but do not include authentication.
T F 6. The field of network and Internet security consists of measures to
deter, prevent, detect and correct security violations that involve
the transmission of information.
T F 7. Patient allergy information is an example of an asset with a high
requirement for integrity.
T F 8. The OSI security architecture was not developed as an
international standard, therefore causing an obstacle for computer
and communication vendors when developing security features.
T F 9. Data origin authentication does not provide protection against the
modification of data units.
T F 10. The emphasis in dealing with active attacks is on prevention
rather than detection.
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
T F 11. The connection- oriented integrity service addresses both
message stream modification and denial of service.
T F 12. All the techniques for providing security have two components: a
security- related transformation on the information to be sent and
some secret information shared by the two principals.
T F 13. Information access threats intercept or modify data on behalf of
users who should not have access to that data.
T F 14. The data integrity service inserts bits into gaps in a data stream to
frustrate traffic analysis attempts.
T F 15. Symmetric encryption is used to conceal the contents of blocks or
streams of data of any size, including messages, files, encryption
keys, and passwords.
MULTIPLE CHOICE
1. __________ is the most common method used to conceal small blocks of data,
such as encryption keys and hash function values, which are used in digital
signatures.
A) Symmetric encryption B) Data integrity algorithms
C) Asymmetric encryption D) Authentication protocols
2. A common technique for masking contents of messages or other information
traffic so that opponents can not extract the information from the message is
__________ .
A) integrity B) encryption
C) analysis D) masquerade
3. __________ involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect.
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
A) Disruption B) Replay
C) Service denial D) Masquerade
4. The three concepts that form what is often referred to as the CIA triad are
________ . These three concepts embody the fundamental security objectives
for both data and for information and computing services.
A) confidentiality, integrity and availability
B) communication, integrity and authentication
C) confidentiality, integrity, access control
D) communication, information and authenticity
5. A loss of __________ is the unauthorized disclosure of information.
A) authenticity B) confidentiality
C) reliability D) integrity
6. Verifying that users are who they say they are and that each input arriving at
the system came from a trusted source is _________ .
A) authenticity B) credibility
C) accountability D) integrity
7. A _________ level breach of security could cause a significant degradation in
mission capability to an extent and duration that the organization is able to
perform its primary functions, but the effectiveness of the functions is
significantly reduced.
A) catastrophic B) moderate
C) low D) high
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
8. A __________ is any action that compromises the security of information owned
by an organization.
A) security attack B) security service
C) security alert D) security mechanism
9. A __________ takes place when one entity pretends to be a different entity.
A) replay B) masquerade
C) service denial D) passive attack
10. __________ is the protection of transmitted data from passive attacks.
A) Access control B) Data control
C) Nonrepudiation D) Confidentiality
11. A(n) __________ service is one that protects a system to ensure its availability
and addresses the security concerns raised by denial- of- service attacks.
A) replay B) availability
C) masquerade D) integrity
12. __________ threats exploit service flaws in computers to inhibit use by
legitimate users.
A) Information access B) Reliability
C) Passive D) Service
13. A(n) __________ is a potential for violation of security, which exists when there
is a circumstance, capability, action or event that could breach security and
cause harm.
A) threat B) attack
C) risk D) attack vector
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
14. The protection of the information that might be derived from observation of
traffic flows is _________ .
A) connectionless confidentiality B) connection confidentiality
C) traffic- flow confidentiality D) selective- field confidentiality
15. Data appended to, or a cryptographic transformation of, a data unit that
allows a recipient of the data unit to prove the source and integrity of the
data unit and protect against forgery is a(n) ___________ .
A) security audit trail B) digital signature
C) encipherment D) authentication exchange
SHORT ANSWER
1. A ___________ is any process, or a device incorporating such a process, that is
designed to detect, prevent, or recover from a security attack. Examples are
encryption algorithms, digital signatures and authentication protocols.
2. An __________ attack attempts to alter system resources or affect their operation.
3. "The protection afforded to an automated information system in order to attain
the applicable objectives of preserving the integrity, availability and confidentiality
of information system resources" is the definition of _________ .
4. A loss of __________ is the disruption of access to or use of information or an
information system.
5. Irreversible __________ mechanisms include hash algorithms and message
authentication codes, which are used in digital signature and message
authentication applications.
6. In the United States, the release of student grade information is regulated by the
__________ .
7. A loss of _________ is the unauthorized modification or destruction of information.
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
8. A _________ attack attempts to learn or make use of information from the system
but does not affect system resources.
9. The __________ service is concerned with assuring the recipient that the message is
from the source that it claims to be from. This service must also assure that the
connection is not interfered with in such a way that a third party can masquerade as
one of the two legitimate parties for the purposes of unauthorized transmission or
reception.
10. Two specific authentication services defined in X.800 are peer entity
authentication and _________ authentication.
11. In the context of network security, ___________ is the ability to limit and control the
access to host systems and applications via communications links.
12. __________ prevents either sender or receiver from denying a transmitted
message. Thus, when a message is sent, the receiver can prove that the alleged
sender in fact sent the message and when a message is received, the sender can
prove that the alleged receiver in fact received the message.
13. Viruses and worms are two examples of _________ attacks. Such attacks can be
introduced into a system by means of a disk that contains the unwanted logic
concealed in otherwise useful software. They can also be inserted into a system
across a network.
14. An __________ is an assault on system security that derives from an intelligent act
that is a deliberate attempt to evade security services and violate the security policy
of a system.
15. __________ is the use of a trusted third party to assure certain properties of a data
exchange.
Another random document with
no related content on Scribd:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.
1.E.2. If an individual Project Gutenberg™ electronic work is derived
from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.
1.E.3. If an individual Project Gutenberg™ electronic work is posted
with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning
of this work.
1.E.4. Do not unlink or detach or remove the full Project
Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute this
electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or providing
access to or distributing Project Gutenberg™ electronic works
provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™
electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for
the “Right of Replacement or Refund” described in paragraph 1.F.3,
the Project Gutenberg Literary Archive Foundation, the owner of the
Project Gutenberg™ trademark, and any other party distributing a
Project Gutenberg™ electronic work under this agreement, disclaim
all liability to you for damages, costs and expenses, including legal
fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR
NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR
BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK
OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL
NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF
YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of receiving
it, you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or
entity that provided you with the defective work may elect to provide
a replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,
the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.
Section 2. Information about the Mission
of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.
The Foundation’s business office is located at 809 North 1500 West,
Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws regulating
charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.
While we cannot and do not solicit contributions from states where
we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot make
any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Section 5. General Information About
Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
This website includes information about Project Gutenberg™,
including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.

More Related Content

PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
jiuweimurth12
 
PDF
Download the entire Cryptography and Network Security Principles and Practice...
kakdecerf
 
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
dangajviire
 
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
agardhhinov
 
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
yydcosbxz206
 
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
famdiepiotr
 
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
mendewmcfana2
 
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
gimmagarere
 
Cryptography and Network Security Principles and Practice 6th Edition William...
jiuweimurth12
 
Download the entire Cryptography and Network Security Principles and Practice...
kakdecerf
 
Cryptography and Network Security Principles and Practice 6th Edition William...
dangajviire
 
Cryptography and Network Security Principles and Practice 6th Edition William...
agardhhinov
 
Cryptography and Network Security Principles and Practice 6th Edition William...
yydcosbxz206
 
Cryptography and Network Security Principles and Practice 6th Edition William...
famdiepiotr
 
Cryptography and Network Security Principles and Practice 6th Edition William...
mendewmcfana2
 
Cryptography and Network Security Principles and Practice 6th Edition William...
gimmagarere
 

Similar to Download full ebook of n instant download pdf (20)

PDF
Download full ebook of d instant download pdf
aminosedades60
 
PDF
Test Bank for Computer Security: Principles and Practice, 4th Edition, Willia...
grymyrzcn
 
PDF
Download all chapters of Test Bank for Network Security Essentials Applicatio...
delaeyhikida89
 
PDF
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
ppdewgfich245
 
PDF
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
abunekling
 
PDF
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
zabunrhyz
 
PDF
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
nipperaricia
 
PDF
Test Bank for Computer Security: Principles and Practice, 4th Edition, Willia...
jkbsbhrjp9728
 
PDF
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
paviaarjesxp
 
PDF
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
gaellanirjor
 
PPTX
cyber security.pptx
karthikaparthasarath
 
PPTX
Cyber Security Unit I Part -I.pptx
karthikaparthasarath
 
PPTX
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
asjadzaki2021
 
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
uleryrekaut
 
PPT
engineering cryptography 21ECE73 Module-3 (2).pptx
shaziasulthana2
 
PDF
Cryptography and Network Security Principles and Practice 6th Edition William...
fitjarroshon
 
PPTX
Foundation of the information securiety
ALIZAIB KHAN
 
PDF
Solution Manual for CompTIA Security+ Guide to Network Security Fundamentals,...
udsenstenis
 
PDF
Solution Manual for CompTIA Security+ Guide to Network Security Fundamentals,...
skamazivcic
 
DOCX
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
ams1ams11
 
Download full ebook of d instant download pdf
aminosedades60
 
Test Bank for Computer Security: Principles and Practice, 4th Edition, Willia...
grymyrzcn
 
Download all chapters of Test Bank for Network Security Essentials Applicatio...
delaeyhikida89
 
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
ppdewgfich245
 
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
abunekling
 
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
zabunrhyz
 
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
nipperaricia
 
Test Bank for Computer Security: Principles and Practice, 4th Edition, Willia...
jkbsbhrjp9728
 
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
paviaarjesxp
 
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th...
gaellanirjor
 
cyber security.pptx
karthikaparthasarath
 
Cyber Security Unit I Part -I.pptx
karthikaparthasarath
 
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
asjadzaki2021
 
Cryptography and Network Security Principles and Practice 6th Edition William...
uleryrekaut
 
engineering cryptography 21ECE73 Module-3 (2).pptx
shaziasulthana2
 
Cryptography and Network Security Principles and Practice 6th Edition William...
fitjarroshon
 
Foundation of the information securiety
ALIZAIB KHAN
 
Solution Manual for CompTIA Security+ Guide to Network Security Fundamentals,...
udsenstenis
 
Solution Manual for CompTIA Security+ Guide to Network Security Fundamentals,...
skamazivcic
 
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
ams1ams11
 
Ad

Recently uploaded (20)

PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PDF
Sunset Boulevard Student Revision Booklet
jpinnuck
 
PDF
1.Natural-Resources-and-Their-Use.ppt pdf /8th class social science Exploring...
Sandeep Swamy
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
PREVENTIVE PEDIATRIC. pptx
AneetaSharma15
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
PPTX
Trends in pediatric nursing .pptx
AneetaSharma15
 
PDF
The Picture of Dorian Gray summary and depiction
opaliyahemel
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PDF
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PPTX
FSSAI (Food Safety and Standards Authority of India) & FDA (Food and Drug Adm...
Dr. Paindla Jyothirmai
 
PDF
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
Sunset Boulevard Student Revision Booklet
jpinnuck
 
1.Natural-Resources-and-Their-Use.ppt pdf /8th class social science Exploring...
Sandeep Swamy
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PREVENTIVE PEDIATRIC. pptx
AneetaSharma15
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
Trends in pediatric nursing .pptx
AneetaSharma15
 
The Picture of Dorian Gray summary and depiction
opaliyahemel
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
FSSAI (Food Safety and Standards Authority of India) & FDA (Food and Drug Adm...
Dr. Paindla Jyothirmai
 
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
Ad

Download full ebook of n instant download pdf

  • 1. Get Full Test Bank Downloads on testbankbell.com Cryptography and Network Security Principles and Practice 6th Edition William Stallings Test Bank http://testbankbell.com/product/cryptography-and-network- security-principles-and-practice-6th-edition-william- stallings-test-bank/ OR CLICK BUTTON DOWLOAD EBOOK Download more test bank from https://testbankbell.com
  • 2. More products digital (pdf, epub, mobi) instant download maybe you interests ... Test Bank for Computer Security: Principles and Practice, 4th Edition, William Stallings, Lawrie Brown https://testbankbell.com/product/test-bank-for-computer-security- principles-and-practice-4th-edition-william-stallings-lawrie- brown/ Test Bank for Network Security Essentials Applications and Standards, 5/E 5th Edition William Stallings https://testbankbell.com/product/test-bank-for-network-security- essentials-applications-and-standards-5-e-5th-edition-william- stallings/ Test bank for Computer Security: Principles and Practice 3e by Stallings 9780133773927 https://testbankbell.com/product/test-bank-for-computer-security- principles-and-practice-3e-by-stallings-9780133773927/ Test Bank for Operating Systems: Internals and Design Principles, 7th Edition: William Stallings https://testbankbell.com/product/test-bank-for-operating-systems- internals-and-design-principles-7th-edition-william-stallings/
  • 3. Test Bank for Business Data Communications- Infrastructure, Networking and Security, 7/E 7th Edition William Stallings, Tom Case https://testbankbell.com/product/test-bank-for-business-data- communications-infrastructure-networking-and-security-7-e-7th- edition-william-stallings-tom-case/ Solution manual for Business Data Communications- Infrastructure, Networking and Security, 7/E 7th Edition William Stallings, Tom Case https://testbankbell.com/product/solution-manual-for-business- data-communications-infrastructure-networking-and- security-7-e-7th-edition-william-stallings-tom-case/ Solution Manual for CompTIA Security+ Guide to Network Security Fundamentals, 6th Edition, Mark Ciampa https://testbankbell.com/product/solution-manual-for-comptia- security-guide-to-network-security-fundamentals-6th-edition-mark- ciampa/ Solution Manual for Network Defense and Countermeasures: Principles and Practices, 3rd Edition William (Chuck) Easttom II https://testbankbell.com/product/solution-manual-for-network- defense-and-countermeasures-principles-and-practices-3rd-edition- william-chuck-easttom-ii/ Test Bank for CompTIA Security+ Guide to Network Security Fundamentals – Standalone6th Edition https://testbankbell.com/product/test-bank-for-comptia-security- guide-to-network-security-fundamentals-standalone-book-6th- edition/
  • 4. Cryptography and Network Security: Principles and Practice, 6th Edition, by William Stallings Cryptography and Network Security Principles and Practice 6th Full chapter at: https://testbankbell.com/product/cryptography-and-network- security-principles-and-practice-6th-edition-william-stallings-test-bank/ CHAPTER 1: OVERVIEW TRUE OR FALSE T F 1. The OSI security architecture provides a systematic framework for defining security attacks, mechanisms, and services. T F 2. Security attacks are classified as either passive or aggressive. T F 3. Authentication protocols and encryption algorithms are examples of security mechanisms. T F 4. The more critical a component or service, the higher the level of required availability. T F 5. Security services include access control, data confidentiality and data integrity, but do not include authentication. T F 6. The field of network and Internet security consists of measures to deter, prevent, detect and correct security violations that involve the transmission of information. T F 7. Patient allergy information is an example of an asset with a high requirement for integrity. T F 8. The OSI security architecture was not developed as an international standard, therefore causing an obstacle for computer and communication vendors when developing security features. T F 9. Data origin authentication does not provide protection against the modification of data units. T F 10. The emphasis in dealing with active attacks is on prevention rather than detection.
  • 5. Cryptography and Network Security: Principles and Practice, 6th Edition, by William Stallings T F 11. The connection- oriented integrity service addresses both message stream modification and denial of service. T F 12. All the techniques for providing security have two components: a security- related transformation on the information to be sent and some secret information shared by the two principals. T F 13. Information access threats intercept or modify data on behalf of users who should not have access to that data. T F 14. The data integrity service inserts bits into gaps in a data stream to frustrate traffic analysis attempts. T F 15. Symmetric encryption is used to conceal the contents of blocks or streams of data of any size, including messages, files, encryption keys, and passwords. MULTIPLE CHOICE 1. __________ is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures. A) Symmetric encryption B) Data integrity algorithms C) Asymmetric encryption D) Authentication protocols 2. A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ . A) integrity B) encryption C) analysis D) masquerade 3. __________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.
  • 6. Cryptography and Network Security: Principles and Practice, 6th Edition, by William Stallings A) Disruption B) Replay C) Service denial D) Masquerade 4. The three concepts that form what is often referred to as the CIA triad are ________ . These three concepts embody the fundamental security objectives for both data and for information and computing services. A) confidentiality, integrity and availability B) communication, integrity and authentication C) confidentiality, integrity, access control D) communication, information and authenticity 5. A loss of __________ is the unauthorized disclosure of information. A) authenticity B) confidentiality C) reliability D) integrity 6. Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________ . A) authenticity B) credibility C) accountability D) integrity 7. A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. A) catastrophic B) moderate C) low D) high
  • 7. Cryptography and Network Security: Principles and Practice, 6th Edition, by William Stallings 8. A __________ is any action that compromises the security of information owned by an organization. A) security attack B) security service C) security alert D) security mechanism 9. A __________ takes place when one entity pretends to be a different entity. A) replay B) masquerade C) service denial D) passive attack 10. __________ is the protection of transmitted data from passive attacks. A) Access control B) Data control C) Nonrepudiation D) Confidentiality 11. A(n) __________ service is one that protects a system to ensure its availability and addresses the security concerns raised by denial- of- service attacks. A) replay B) availability C) masquerade D) integrity 12. __________ threats exploit service flaws in computers to inhibit use by legitimate users. A) Information access B) Reliability C) Passive D) Service 13. A(n) __________ is a potential for violation of security, which exists when there is a circumstance, capability, action or event that could breach security and cause harm. A) threat B) attack C) risk D) attack vector
  • 8. Cryptography and Network Security: Principles and Practice, 6th Edition, by William Stallings 14. The protection of the information that might be derived from observation of traffic flows is _________ . A) connectionless confidentiality B) connection confidentiality C) traffic- flow confidentiality D) selective- field confidentiality 15. Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________ . A) security audit trail B) digital signature C) encipherment D) authentication exchange SHORT ANSWER 1. A ___________ is any process, or a device incorporating such a process, that is designed to detect, prevent, or recover from a security attack. Examples are encryption algorithms, digital signatures and authentication protocols. 2. An __________ attack attempts to alter system resources or affect their operation. 3. "The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources" is the definition of _________ . 4. A loss of __________ is the disruption of access to or use of information or an information system. 5. Irreversible __________ mechanisms include hash algorithms and message authentication codes, which are used in digital signature and message authentication applications. 6. In the United States, the release of student grade information is regulated by the __________ . 7. A loss of _________ is the unauthorized modification or destruction of information.
  • 9. Cryptography and Network Security: Principles and Practice, 6th Edition, by William Stallings 8. A _________ attack attempts to learn or make use of information from the system but does not affect system resources. 9. The __________ service is concerned with assuring the recipient that the message is from the source that it claims to be from. This service must also assure that the connection is not interfered with in such a way that a third party can masquerade as one of the two legitimate parties for the purposes of unauthorized transmission or reception. 10. Two specific authentication services defined in X.800 are peer entity authentication and _________ authentication. 11. In the context of network security, ___________ is the ability to limit and control the access to host systems and applications via communications links. 12. __________ prevents either sender or receiver from denying a transmitted message. Thus, when a message is sent, the receiver can prove that the alleged sender in fact sent the message and when a message is received, the sender can prove that the alleged receiver in fact received the message. 13. Viruses and worms are two examples of _________ attacks. Such attacks can be introduced into a system by means of a disk that contains the unwanted logic concealed in otherwise useful software. They can also be inserted into a system across a network. 14. An __________ is an assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system. 15. __________ is the use of a trusted third party to assure certain properties of a data exchange.
  • 10. Another random document with no related content on Scribd:
  • 11. This eBook is for the use of anyone anywhere in the United States and most other parts of the world at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.org. If you are not located in the United States, you will have to check the laws of the country where you are located before using this eBook. 1.E.2. If an individual Project Gutenberg™ electronic work is derived from texts not protected by U.S. copyright law (does not contain a notice indicating that it is posted with permission of the copyright holder), the work can be copied and distributed to anyone in the United States without paying any fees or charges. If you are redistributing or providing access to a work with the phrase “Project Gutenberg” associated with or appearing on the work, you must comply either with the requirements of paragraphs 1.E.1 through 1.E.7 or obtain permission for the use of the work and the Project Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9. 1.E.3. If an individual Project Gutenberg™ electronic work is posted with the permission of the copyright holder, your use and distribution must comply with both paragraphs 1.E.1 through 1.E.7 and any additional terms imposed by the copyright holder. Additional terms will be linked to the Project Gutenberg™ License for all works posted with the permission of the copyright holder found at the beginning of this work. 1.E.4. Do not unlink or detach or remove the full Project Gutenberg™ License terms from this work, or any files containing a part of this work or any other work associated with Project Gutenberg™. 1.E.5. Do not copy, display, perform, distribute or redistribute this electronic work, or any part of this electronic work, without prominently displaying the sentence set forth in paragraph 1.E.1
  • 12. with active links or immediate access to the full terms of the Project Gutenberg™ License. 1.E.6. You may convert to and distribute this work in any binary, compressed, marked up, nonproprietary or proprietary form, including any word processing or hypertext form. However, if you provide access to or distribute copies of a Project Gutenberg™ work in a format other than “Plain Vanilla ASCII” or other format used in the official version posted on the official Project Gutenberg™ website (www.gutenberg.org), you must, at no additional cost, fee or expense to the user, provide a copy, a means of exporting a copy, or a means of obtaining a copy upon request, of the work in its original “Plain Vanilla ASCII” or other form. Any alternate format must include the full Project Gutenberg™ License as specified in paragraph 1.E.1. 1.E.7. Do not charge a fee for access to, viewing, displaying, performing, copying or distributing any Project Gutenberg™ works unless you comply with paragraph 1.E.8 or 1.E.9. 1.E.8. You may charge a reasonable fee for copies of or providing access to or distributing Project Gutenberg™ electronic works provided that: • You pay a royalty fee of 20% of the gross profits you derive from the use of Project Gutenberg™ works calculated using the method you already use to calculate your applicable taxes. The fee is owed to the owner of the Project Gutenberg™ trademark, but he has agreed to donate royalties under this paragraph to the Project Gutenberg Literary Archive Foundation. Royalty payments must be paid within 60 days following each date on which you prepare (or are legally required to prepare) your periodic tax returns. Royalty payments should be clearly marked as such and sent to the Project Gutenberg Literary Archive Foundation at the address specified in Section 4, “Information
  • 13. about donations to the Project Gutenberg Literary Archive Foundation.” • You provide a full refund of any money paid by a user who notifies you in writing (or by e-mail) within 30 days of receipt that s/he does not agree to the terms of the full Project Gutenberg™ License. You must require such a user to return or destroy all copies of the works possessed in a physical medium and discontinue all use of and all access to other copies of Project Gutenberg™ works. • You provide, in accordance with paragraph 1.F.3, a full refund of any money paid for a work or a replacement copy, if a defect in the electronic work is discovered and reported to you within 90 days of receipt of the work. • You comply with all other terms of this agreement for free distribution of Project Gutenberg™ works. 1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™ electronic work or group of works on different terms than are set forth in this agreement, you must obtain permission in writing from the Project Gutenberg Literary Archive Foundation, the manager of the Project Gutenberg™ trademark. Contact the Foundation as set forth in Section 3 below. 1.F. 1.F.1. Project Gutenberg volunteers and employees expend considerable effort to identify, do copyright research on, transcribe and proofread works not protected by U.S. copyright law in creating the Project Gutenberg™ collection. Despite these efforts, Project Gutenberg™ electronic works, and the medium on which they may be stored, may contain “Defects,” such as, but not limited to, incomplete, inaccurate or corrupt data, transcription errors, a copyright or other intellectual property infringement, a defective or
  • 14. damaged disk or other medium, a computer virus, or computer codes that damage or cannot be read by your equipment. 1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for the “Right of Replacement or Refund” described in paragraph 1.F.3, the Project Gutenberg Literary Archive Foundation, the owner of the Project Gutenberg™ trademark, and any other party distributing a Project Gutenberg™ electronic work under this agreement, disclaim all liability to you for damages, costs and expenses, including legal fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE. 1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you discover a defect in this electronic work within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending a written explanation to the person you received the work from. If you received the work on a physical medium, you must return the medium with your written explanation. The person or entity that provided you with the defective work may elect to provide a replacement copy in lieu of a refund. If you received the work electronically, the person or entity providing it to you may choose to give you a second opportunity to receive the work electronically in lieu of a refund. If the second copy is also defective, you may demand a refund in writing without further opportunities to fix the problem. 1.F.4. Except for the limited right of replacement or refund set forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
  • 15. INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE. 1.F.5. Some states do not allow disclaimers of certain implied warranties or the exclusion or limitation of certain types of damages. If any disclaimer or limitation set forth in this agreement violates the law of the state applicable to this agreement, the agreement shall be interpreted to make the maximum disclaimer or limitation permitted by the applicable state law. The invalidity or unenforceability of any provision of this agreement shall not void the remaining provisions. 1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation, the trademark owner, any agent or employee of the Foundation, anyone providing copies of Project Gutenberg™ electronic works in accordance with this agreement, and any volunteers associated with the production, promotion and distribution of Project Gutenberg™ electronic works, harmless from all liability, costs and expenses, including legal fees, that arise directly or indirectly from any of the following which you do or cause to occur: (a) distribution of this or any Project Gutenberg™ work, (b) alteration, modification, or additions or deletions to any Project Gutenberg™ work, and (c) any Defect you cause. Section 2. Information about the Mission of Project Gutenberg™ Project Gutenberg™ is synonymous with the free distribution of electronic works in formats readable by the widest variety of computers including obsolete, old, middle-aged and new computers. It exists because of the efforts of hundreds of volunteers and donations from people in all walks of life. Volunteers and financial support to provide volunteers with the assistance they need are critical to reaching Project Gutenberg™’s goals and ensuring that the Project Gutenberg™ collection will
  • 16. remain freely available for generations to come. In 2001, the Project Gutenberg Literary Archive Foundation was created to provide a secure and permanent future for Project Gutenberg™ and future generations. To learn more about the Project Gutenberg Literary Archive Foundation and how your efforts and donations can help, see Sections 3 and 4 and the Foundation information page at www.gutenberg.org. Section 3. Information about the Project Gutenberg Literary Archive Foundation The Project Gutenberg Literary Archive Foundation is a non-profit 501(c)(3) educational corporation organized under the laws of the state of Mississippi and granted tax exempt status by the Internal Revenue Service. The Foundation’s EIN or federal tax identification number is 64-6221541. Contributions to the Project Gutenberg Literary Archive Foundation are tax deductible to the full extent permitted by U.S. federal laws and your state’s laws. The Foundation’s business office is located at 809 North 1500 West, Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up to date contact information can be found at the Foundation’s website and official page at www.gutenberg.org/contact Section 4. Information about Donations to the Project Gutenberg Literary Archive Foundation Project Gutenberg™ depends upon and cannot survive without widespread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine-readable form accessible by the widest array of equipment including outdated equipment. Many
  • 17. small donations ($1 to $5,000) are particularly important to maintaining tax exempt status with the IRS. The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States. Compliance requirements are not uniform and it takes a considerable effort, much paperwork and many fees to meet and keep up with these requirements. We do not solicit donations in locations where we have not received written confirmation of compliance. To SEND DONATIONS or determine the status of compliance for any particular state visit www.gutenberg.org/donate. While we cannot and do not solicit contributions from states where we have not met the solicitation requirements, we know of no prohibition against accepting unsolicited donations from donors in such states who approach us with offers to donate. International donations are gratefully accepted, but we cannot make any statements concerning tax treatment of donations received from outside the United States. U.S. laws alone swamp our small staff. Please check the Project Gutenberg web pages for current donation methods and addresses. Donations are accepted in a number of other ways including checks, online payments and credit card donations. To donate, please visit: www.gutenberg.org/donate. Section 5. General Information About Project Gutenberg™ electronic works Professor Michael S. Hart was the originator of the Project Gutenberg™ concept of a library of electronic works that could be freely shared with anyone. For forty years, he produced and distributed Project Gutenberg™ eBooks with only a loose network of volunteer support.
  • 18. Project Gutenberg™ eBooks are often created from several printed editions, all of which are confirmed as not protected by copyright in the U.S. unless a copyright notice is included. Thus, we do not necessarily keep eBooks in compliance with any particular paper edition. Most people start at our website which has the main PG search facility: www.gutenberg.org. This website includes information about Project Gutenberg™, including how to make donations to the Project Gutenberg Literary Archive Foundation, how to help produce our new eBooks, and how to subscribe to our email newsletter to hear about new eBooks.