CIS
UVC2 STUDY MATERIAL.docx

D before signing a document to a remote server for

Info icon This preview shows pages 7–9. Sign up to view the full content.

D. Before signing a document to a remote server for storage, a computer calculates and attach its message digest. 14. Patient's records are stored in a database server at the hospital. Why do all medical databases have to be encrypted? A. To ensure the confidentiality of patient's personal information. B. To ensure the non-repudiation of patients information. C. To ensure the integrity of patients information. D. To ensure the availability of patients information. 15. The chief executive officer of a company is sending out an important financial memo to the chief financial officer. Which corporate symbol security will verify that the memo was sent by the chief executive officer? A. Digital signatures - A digital signature (not to be confused with a digital certificate) is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document B. X.509 certificate - C. Asymmetric cryptography - Asymmetric cryptography or public- key cryptography is cryptography in which a pair of keys is used to encrypt and decrypt a message so that it arrives securely. Initially, a network user receives a public and private key pair from a certificate authority. D. Non-repudiation - Nonrepudiation is the assurance that someone cannot deny something. Typically, nonrepudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. 16. In a common attack against servers, one or more clients repeatedly request the allocation of resources without accepting the offer of the connection. As a result, the server is unable to respond to legitimate request for connection. What is the term for this type of attack? A. SYN flooding - A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. B. Connection baiting -
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

C. Over provisioning - During this process, the SSD controller, or flash controller that manages NAND flash memory in an SSD, reads all the good pages of a block. (Skipping the invalid pages) and writes them to a new erased block. Then the original block is erased, thus preparing it for new data. Amount of Over-provisioning D. Unacknowledged link. 17. Which action represents an example of using cryptography to ensure non- repudiation? A. A client system encrypts the session key with the server's public key. B. A sending station encrypts a message digest with the sender's private key and attaches it to an outgoing message. C. A user provides his username and password, and provides correct answers to the security questions to gain access to bank's website.
Image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern