Question

In: Computer Science

Select/provide the correct term for the following statements. 5.External devices such as firewalls cannot provide access...

Select/provide the correct term for the following statements.

5.External devices such as firewalls cannot provide access control services. (True/False)

6.The ciphertext-only attack is the easiest to defend against. (True/False)

7.A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained. (True/False)

8.The Feistel structure is a particular example of the more general structure used by all symmetric block ciphers. (True/False)

9.User authentication is the basis for most types of access control and for user accountability. (True/False)

Solutions

Expert Solution

=====Answer=====

Answer 5- False

Explanation:

  • External devices such as firewalls cannot allow for authentication and gain access for security reason.

Answer 6- True

Explanation:

  • The ciphertext simply affliction is the well-fixed to support against.

Answer 7- True

Explanation:

  • It constructs too troublesome to encounter the key from the ciphertext and the planning of the determines of overmuch or every of the bits in the ciphertext will be impressed.

Answer 8- True

Explanation:

  • Its organize is a specific representative of the greater extent general structure applied by completely symmetric block ciphers.

Answer 9- True

Explanation:

  • Basically, user authentication is required to access by accountability is a requirement part of collection security and access control is used for authentication and gain access for security reason.

Note- Please do upvote, if any problem then comment in box sure I will help.


Related Solutions

II: Select/provide the correct term for the following statements.(1*5=5pts) 6.Because of the mathematical properties of the...
II: Select/provide the correct term for the following statements.(1*5=5pts) 6.Because of the mathematical properties of the message authentication code function it is less vulnerable to being broken than encryption.(True/False) 7.Cryptographic hash functions generally execute slower in software than conventional encryption algorithms such as DES. (True/False) 8.Public-key algorithms are based on mathematical functions rather than on simple operations on bit patterns. (True/False) 9.With two keys used, the public-key encryption provides a stronger protection than the single-key/symmetricencryption. (True/False) 10.Message authentication code (MAC)...
Which of the following statements are/is true? Select all that apply. A. Stateful inspection firewalls can...
Which of the following statements are/is true? Select all that apply. A. Stateful inspection firewalls can detect SYN attacks. B. Both application-level and circuit-level gateways do not allow a direct end-to-end connection between the connecting parties. C. Stateful inspection firewalls, circuit-level gateways and application-level gateways provide reactive network defense, whereas packet filtering firewalls provide proactive network defense.
which of the following statements is/are correct: A. A promise generally cannot be enforced by a...
which of the following statements is/are correct: A. A promise generally cannot be enforced by a party to the promise if that party has not given consideration of it. B.Consideration means that the parties to the contract did not act unfairly or unconscionably. C.Consideration means that each party has given something in return for the promise of the other party. D.Both parties must offer equal consideration. a. All of A B C and D b. B and C c. Only...
47. Which of the following statements are correct? Select which option is correct. Select one or...
47. Which of the following statements are correct? Select which option is correct. Select one or more: The level of professional skepticism can be reduced where the auditor has past experience with the entity indicating the honesty and integrity of management. The level of professional skepticism needs to be maintained throughout the whole engagement. Professional skepticism implies an expectation of fraud or error, so is a biased viewpoint. Professional skepticism is not important in considering management's explanations for unusual trends...
Which of the following statements is true? Select the correct answer a.NONE OF THE STATEMENTS ARE...
Which of the following statements is true? Select the correct answer a.NONE OF THE STATEMENTS ARE TRUE b.Electric forces depend on velocity of a charged object c.Objects having a net charge experience only electric force, not magnetic force d.It is impossible to separate the North and South poles of a bar magnet e.Electric forces decrease with decreasing distance from charges, but magnetic forces do not decrease with decreasing distance from magnets
Which of the following statements are correct (Select all that apply): Select one or more: A....
Which of the following statements are correct (Select all that apply): Select one or more: A. An income statement reports on financing activities. B. A balance sheet reports on investing and financing activities. C. The statement of cash flows reports on cash flows from operating, investing, and financing activities over a period of time. D. A balance sheet reports on a company's assets and liabilities over a period of time. E. The statement of equity reports on changes in the...
Which of the following statements are correct (Select all that apply): Select one or more: A....
Which of the following statements are correct (Select all that apply): Select one or more: A. A balance sheet reports on investing and financing activities. B. An income statement reports on financing activities. C. The statement of equity reports on changes in the accounts that make up equity. D. The statement of cash flows reports on cash flows from operating, investing, and financing activities over a period of time. E. A balance sheet reports on a company's assets and liabilities...
5.         Which of the following statements concerning paying for long-term care is correct?        Thankfully Medicare covers...
5.         Which of the following statements concerning paying for long-term care is correct?        Thankfully Medicare covers the cost of long-term care no matter the patient asset level        Thankfully Medicaid covers the cost of long-term care no matter the patient asset level        Everyone should have long-term care insurance        You can self-insure for long-term care
Q22: Which one of the following statements is a correct in Access Control? 1. A user...
Q22: Which one of the following statements is a correct in Access Control? 1. A user who is given permission to read a file is called an object. 2. A custodian of a data file configures who can have a read access to the file. 3. A data file created by owner is called a subject. 4. End users of files review the security settings of data files. 5. Discretionary Access Control (DAC) is most restrictive model.
1. Channels are? ( )a. Devices that provide the external storage medium between dataprocessing...
1. Channels are? ( )a. Devices that provide the external storage medium between data processing systems and their internal environmentb. The communication path from the Channel Subsystem to the control units and I/O devicesc. The mainframe’s water circulation for air conditioningd. The electrical circuits that provides power to the mainframe2. Channel addresses are composed of? ( )a. Channel number, Control unit number, Device numberb. Machine name, LPAR name, System namec. Machine name, System name, LPAR named. Building number, Floor number,...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT