18 Questions
What is the primary purpose of maintaining records in a security system?
To support nonrepudiation and enable forensic analysis
Which OSI security component focuses on protecting against security attacks?
Security mechanisms
What type of security attack involves monitoring or eavesdropping on transmissions?
Passive Attack
What are the two types of passive attacks mentioned in the text?
Release of message contents and traffic analysis
Which OSI security component is designed to counter security attacks?
Security services
What characteristic makes passive attacks particularly difficult to detect?
They do not involve data alteration
What type of attack involves the creation of a false data stream?
Masquerade
Which security mechanism involves transforming data into a non-readable form?
Encipherment
What security service assures that the communicating entity is who they claim to be?
Authentication
Which type of attack involves modifying the data stream?
Modification of messages
What is the purpose of digital signatures?
Verifying data authenticity
Which security service provides assurance about the source and integrity of data units?
Data-Origin Authentication
Which of the following best describes the concept of authenticity in cybersecurity?
Confidence in the validity of a transmission, a message, or message originator, verifying that users and each input arriving at the system came from a trusted source.
Which of the following is NOT a common security attack that affects authenticity?
Denial-of-Service attack
Which of the following best describes a man-in-the-middle attack on authenticity?
An attacker intercepts and alters communication between two parties without their knowledge.
Which of the following best describes a replay attack on authenticity?
An attacker replays captured data transmission from an earlier exchange.
Which of the following best describes a phishing attack on authenticity?
An attacker deceives a victim into revealing sensitive information by posing as a trusted entity.
Which of the following is the PRIMARY concern of a security attack that affects authenticity?
Authenticity
Explore the concept of accountability in the OSI Security Architecture, which supports nonrepudiation by keeping records of activities for forensic analysis. Learn about security attacks, mechanisms, and services recommended by X.800.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free