60 likes | 157 Views
Which of these does not belong in a security policy? A: data sensitivity definitions B: rules about USB key usage C: brand of anti-virus software D: background check requirements for hiring. Is using a weak password a threat or a vulnerability? A: threat B: vulnerability.
E N D
Which of these does not belong in a security policy? • A: data sensitivity definitions • B: rules about USB key usage • C: brand of anti-virus software • D: background check requirements for hiring
Is using a weak password a threat or a vulnerability? • A: threat • B: vulnerability
In risk analysis, estimating the likelihood of a vulnerability being exploited and the impact of an attack are key components of: • A: Quantitative risk analysis • B: Qualitative risk analysis • C: Both
Which of these cryptographic attacks models is the strongest? • A: Ciphertextonly • B: Known plaintext • C: Chosen plaintext
How would you classify the attack on the Vigenere cipher described in last lecture • A: ciphertext only • B: known plaintext • C: chosen plaintext
What is/are essential properties of a one-time pad? • A: key length equal to plaintext length • B: keys never reused • C: key must be chosen randomly • D: A & B • E: All of the above