What four basic protections can cryptography support?

What will be an ideal response?


Cryptography can support confidentiality, integrity, authentication, and non-repudiation.

Computer Science & Information Technology

You might also like to view...

Which tool intercepts and logs network packets?

A. Certifier B. Packet sniffer C. Throughput tester D. Port scanner

Computer Science & Information Technology

The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?

A. /load B. /bin C. /boot D. /mnt

Computer Science & Information Technology

A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?

A. Loopback adapter B. Cable tester C. Tone generator D. Multimeter

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The IDS component responsible for collecting data is the user interface. 2. Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified. 3. The primary purpose of an IDS is to detect intrusions, log suspicious events, and send alerts. 4. Signature-based approaches attempt to define normal, or expected, behavior, whereas anomaly approaches attempt to define proper behavior. 5. Anomaly detection is effective against misfeasors.

Computer Science & Information Technology