18 Questions
Which security service ensures that only authorized entities can access a resource?
Access Control
Which security service provides protection against denial of involvement in a communication by one of the parties?
Nonrepudiation
Which security mechanism is often used to provide multiple security services?
Digital signatures
Which security service ensures that data received is exactly as sent by an authorized entity?
Data Integrity
Which security service protects data from unauthorized disclosure?
Data Confidentiality
Which security service provides assurance that the communicating entity is the one claimed?
Authentication
What is the generic name for the collection of tools designed to protect data and thwart hackers?
Computer security
Which term refers to the measures taken to ensure that data is not modified or tampered with during transmission?
Data integrity
What is the term for the protection of data from unauthorized access by controlling who can access what information?
Access control
Which security service ensures that a sender cannot deny the transmission of a message at a later stage?
Nonrepudiation
Which type of security mechanism involves automated tools designed to protect files and stored information?
Computer security
In network security, what term is used for measures taken to protect data during their transmission?
Data confidentiality
What is the purpose of access control in security services?
To prevent unauthorized use of resources
Which of the following is NOT a type of data confidentiality service?
Selective-field connection integrity
What is the purpose of data integrity services?
To ensure that data received is exactly as sent by an authorized entity
Which of the following is NOT a type of nonrepudiation service?
Nonrepudiation, confidentiality
Which of the following is an example of a specific security mechanism?
Digital signatures
What is the purpose of traffic-flow confidentiality?
To protect the pattern of communication traffic from analysis
Learn about authentication and access control in the context of X.800 security services. Topics include peer entity authentication to establish connection and data-origin authentication during data transfer phase.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free