Java Games: Flashcards, matching, concentration, and word search.

ADV CYBER | Game 3 | Units 3-4-5

You can play different games to enhance your learning, so check it out and grow your knowledge for the Unit 3-4-5 Test. Good Luck!

AB
What is integrity?Protecting information from being modified by unauthorized parties
What is confidentiality?secrecy
What is authentication?confirmation
If the plaintext cant be divided evenly into equal sized blocks, what is done to bring the plaintext to a proper length?padding
What is ECB?electronic codebook
What does CBC add on top of ECB?randomization
GCM and GMAC are given their names after which famous mathematician?Galois
What is a stream cipher?A symmetric key cipher that encrypts plaintext one byte at a time
______ are measurable physiological or behavioral characteristics which are used for biometrics.biometric factors
What is the AAA framework?A simple way to understand security issues surrounding the access ability of individuals within an organization
Which of the following is an example of "something you are"?fingerprint
Which of the following is an example of "something you have"?USB Token
Which of the following is an example of "something you know"?a pin
Which of the following is an example of "somewhere you are"?an ip address
Which of the following is an example of "something you do"?a signature
What type of trust involves domain B trusting domain A, but domain A not trusting domain B?one-way
What does PDS stand for?protected distribution system
What OSI Layer does Transport Layer Security (TLS) operate on?Layer 4 (4-7)
What is SFTP used for?secure file transfer
What is one of the most popular key exchange protocols?diffie hellman protocol


Computer Science & Technology Teacher
Union County High School
Blairsville, GA

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities