X.800 Security Services: Authentication and Access Control

GenialRadon avatar
GenialRadon
·
·
Download

Start Quiz

Study Flashcards

18 Questions

Which security service ensures that only authorized entities can access a resource?

Access Control

Which security service provides protection against denial of involvement in a communication by one of the parties?

Nonrepudiation

Which security mechanism is often used to provide multiple security services?

Digital signatures

Which security service ensures that data received is exactly as sent by an authorized entity?

Data Integrity

Which security service protects data from unauthorized disclosure?

Data Confidentiality

Which security service provides assurance that the communicating entity is the one claimed?

Authentication

What is the generic name for the collection of tools designed to protect data and thwart hackers?

Computer security

Which term refers to the measures taken to ensure that data is not modified or tampered with during transmission?

Data integrity

What is the term for the protection of data from unauthorized access by controlling who can access what information?

Access control

Which security service ensures that a sender cannot deny the transmission of a message at a later stage?

Nonrepudiation

Which type of security mechanism involves automated tools designed to protect files and stored information?

Computer security

In network security, what term is used for measures taken to protect data during their transmission?

Data confidentiality

What is the purpose of access control in security services?

To prevent unauthorized use of resources

Which of the following is NOT a type of data confidentiality service?

Selective-field connection integrity

What is the purpose of data integrity services?

To ensure that data received is exactly as sent by an authorized entity

Which of the following is NOT a type of nonrepudiation service?

Nonrepudiation, confidentiality

Which of the following is an example of a specific security mechanism?

Digital signatures

What is the purpose of traffic-flow confidentiality?

To protect the pattern of communication traffic from analysis

Learn about authentication and access control in the context of X.800 security services. Topics include peer entity authentication to establish connection and data-origin authentication during data transfer phase.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

SP800-171 Guidelines Quiz
47 questions

SP800-171 Guidelines Quiz

TroubleFreeDesert avatar
TroubleFreeDesert
Use Quizgecko on...
Browser
Browser