Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

____ 16. If you are a victim of ____, you should consider installing anti-virus

ID: 3622578 • Letter: #

Question

____ 16. If you are a victim of ____, you should consider installing anti-virus software on your SMTP gateway.
a. SYN flooding c. harmful e-mail messages
b. a virus d. port scanning


____ 17. The Cisco CIDS intrusion detection system monitors the area between the ____ and the Internet.
a. LAN gateway c. VPN gateway
b. firewall d. router


____ 18. The Generally Accepted System Security Principles (GASSP) is a set of security and information management practices put forth by the ____.
a. BIOS c. International Information Security Foundation (I2SF).
b. Massachusetts Institute of Technology (MIT) d. NAT




____ 19. In the figure above, "D" is a(n)____.
a. firewall c. VPN gateway
b. router d. LAN gateway


____ 20. ____ is when a hacker intercepts part of an encrypted data session to gain control over the data being exchanged.
a. Man-in-the-middle attacks c. Encryption
b. Session hijacks d. Public Key


____ 21. In e-commerce, some cryptographic tools can be used to ensure that parties to the transaction are authentic, so that they cannot later deny having participated in a transaction,
a feature often called ____.
a. encryption c. cryptology
b. nonrepudiation d. ciphertext


____ 22. ____ is the process of converting a message into a form that cannot be read by
unauthorized individuals.
a. Encryption c. Cyptanalysis
b. Cryptology d. Ciphertext


____ 23. The transformation of the individual components (characters, bytes, or bits) of an unencrypted message into encrypted components is a(n) ____.
a. cipher c. decipher
b. algorithm d. encipher


____ 24. The set of transformations necessary to convert an unencrypted message into an encrypted message is a (n) ____.
a. cryptosystem c. keyspace
b. cryptogram d. work factor


____ 25. To encrypt or convert plaintext to ciphertext is to ____.
a. decipher c. encipher
b. cipher d. ciphertext

Explanation / Answer

16. b) a virus 18 c) International Information Security Foundation (I2SF). 19 Please provide the necessary figure 20 a) Man-in-the-middle attacks 21 b) nonrepudiation 22 a) Encryption 23 a) Cipher 24 a) Cryptosystem 25 c) Encipher