Test 2 - Network Security
Question 1
0.03 / 0.03 pts
Security services:
They allow the implementation of security mechanisms.
They allow for attacks on information systems.
To access security services it is necessary to employ mechanisms of
security.
None of the above.
Question 2
0.03 / 0.03 points
The security mechanisms:
They allow security attacks to be implemented.
Each of them allows for several security services.
They can only be physical and organizational procedures.
None of the above.
Question 3
0.03 / 0.03 pts
In a passive attack:
The attacker modifies the content of the encrypted messages.
The victim machines are blocked by a Denial of Service Attack
Service.
The attacker observes a communication and obtains the transmitted data.
None of the above.
Test 2 - Network Security
Question 4
0.03 / 0.03 pts
The authentication service:
Cannot be employed when the user is away from the system.
information.
Allow only the appropriate users to read the information
confidential.
It is the prior step to access control service.
Responses A and B are correct.
Question 5
0.03 / 0.03 pts
The data integrity service:
Allows detecting changes in data integrity.
It allows avoiding changes to data integrity.
It allows avoiding and detecting changes in data integrity.
None of the above.
Question 6
0.03 / 0.03 pts
The service of non-repudiation at the origin:
It allows you to ensure that a user has sent a message.
It allows me to ensure that a user has received a message.
Answers A and B are correct.
Test 2 - Network Security
None of the above.
Question 7
0.03 / 0.03 pts
The traffic fill-in:
It is based on the inclusion of repeated messages in certain
communications.
It aims to saturate the bandwidth of communication to prevent attacks from
denial of service.
It is based on the grouping and joint sending of valid messages.
None of the above.
Question 8
0.03 / 0.03 pts
An identity theft attack:
It is a passive attack.
It is an active attack.
It is an attack that can be prevented by using a confidentiality service.
None of the above.
Question 9
0.03 / 0.03 pts
Denial of service attacks:
They pose a threat to the confidentiality of the system.
Test 2 - Network Security
They pose a threat to the integrity of the system.
Answers A and B are correct.
None of the above.
Question 10
0.03 / 0.03 pts
To protect against a passive message content retrieval attack:
An authentication service is necessary that could be provided through a
digital signature mechanism.
An integrity service is necessary that could be provided through a
digital signature mechanism.
A confidentiality service is necessary that could be provided through
a digital signature mechanism.
A confidentiality service is necessary that could be provided through
a cryptographic mechanism.