Answer the following statements true (T) or false (F)

1. The connection-oriented integrity service addresses both message stream modification and denial of service.
2. All the techniques for providing security have two components: a security-related transformation on the information to be sent and some secret information shared by the two principals.
3. An attack tree is a branching hierarchical data structure represents a set of potential techniques for exploiting security vulnerabilities.
4. The data integrity service inserts bits into gaps in a data stream to frustrate traffic analysis attempts.
5. Symmetric encryption is used to conceal the contents of blocks or streams of data of any size, including messages, files, encryption keys, and passwords.

1. TRUE
2. TRUE
3. TRUE
4. FALSE
5. TRUE

Computer Science & Information Technology

You might also like to view...

How many host addresses are available on a Class C network?

A. 254 B. 256 C. 65534 D. 65536

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Any algorithm that can be coded with recursion can also be coded with an iterative structure. 2. When recursion is used on a linked list, it will always display the contents of the list in reverse order. 3. The speed and amount of memory available to modern computers diminishes the performance impact of recursion so much that inefficiency is no longer a strong argument against it. 4. All mathematical problems are designed to be more efficient using recursive solutions.

Computer Science & Information Technology