Exam 6: Encryption and Password Cracking
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
____ is a change in the position or order of letters or words, as in an anagram.
Free
(Multiple Choice)
5.0/5
(30)
Correct Answer:
C
As might be expected,Triple DES is almost three times faster than DES.
Free
(True/False)
4.8/5
(41)
Correct Answer:
False
____ attacks use all possible combination of letters, numbers, and special characters to determine the target password.
(Multiple Choice)
4.8/5
(38)
____________________ uses an algorithm to encrypt a ciphertext document from a plaintext document, and when the information is needed again, the algorithm is used to decrypt the ciphertext back into plaintext.
(Short Answer)
4.8/5
(42)
Also called public key algorithms, ____________________ key algorithms use two keys for encrypting and decrypting data.
(Short Answer)
4.7/5
(38)
Whether or not encryption is used, the use of password protection is open to various kinds of attack.
(True/False)
4.8/5
(22)
Sometimes called secret key algorithms, ____________________ key algorithms use the same key to encrypt and to decrypt the data.
(Short Answer)
4.8/5
(30)
____ is a method for secure key exchange over an insecure channel based on the nature of photons.
(Multiple Choice)
4.8/5
(36)
DSS stands for the United States government's Digital Signature Standard, which is based on the Digital Signature Algorithm (DSA).
(True/False)
4.8/5
(43)
____________________ is a secure hash algorithm developed in 1992 by Ron Rivest,one of the inventors of RSA.
(Short Answer)
4.8/5
(37)
____ ciphers use a key stream to encrypt and decrypt a plaintext message.
(Multiple Choice)
4.8/5
(35)
____ is the replacement of a letter or group of letters with another letter or group of letters.
(Multiple Choice)
4.9/5
(40)
The ____________________, also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government.
(Short Answer)
4.8/5
(43)
Describe some of the most common terms you need to know when dealing with cryptography.
(Essay)
4.8/5
(30)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)