Answer the following statements true (T) or false (F)

1. The connection-oriented integrity service addresses both message stream modification and denial of service.
2. All the techniques for providing security have two components: a security-related transformation on the information to be sent and some secret information shared by the two principals.
3. An attack tree is a branching hierarchical data structure represents a set of potential techniques for exploiting security vulnerabilities.
4. The data integrity service inserts bits into gaps in a data stream to frustrate traffic analysis attempts.
5. Symmetric encryption is used to conceal the contents of blocks or streams of data of any size, including messages, files, encryption keys, and passwords.


1. TRUE
2. TRUE
3. TRUE
4. FALSE
5. TRUE

Computer Science & Information Technology

You might also like to view...

Windows XP has a default background picture

Indicate whether the statement is true or false

Computer Science & Information Technology

The left margin for a leftbound report is ____.

A. Default (1") B. 1.25" C. 1.5" D. 2"

Computer Science & Information Technology

Calculates the total of a range of values when multiple conditions are met.

What will be an ideal response?

Computer Science & Information Technology

Which feature of a DBMS allows producing an on-screen or printed document from all or part of a database?

A) access security B) data dictionary C) data recovery D) report generator E) utilities

Computer Science & Information Technology