Exam 17: Computer Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The requirement that the sender and receiver must share the cipher key is a major drawback of public-key cryptography.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

False

Encryption is the process of converting plaintext into ciphertext.

Free
(True/False)
4.8/5
(42)
Correct Answer:
Verified

True

What are the two ways antivirus software detects malicious code?

Free
(Essay)
4.9/5
(37)
Correct Answer:
Verified

Antivirus software works by detecting malicious code that has been previously identified in general. It may work using signature detection, which looks for recognizable patterns in executable code that match known malware. A more advanced version uses more general heuristics that look for even more general patterns in order to catch malware that has deliberately mutated in an attempt to avoid detection.

A Caesar cipher that shifts characters 4 positions to the right would encode the word LADDER as which of the following?

(Multiple Choice)
4.8/5
(40)

A digital signature is a way to "sign" a document such that the recipient can verify that it came from the originator and has not been altered during transmission.

(True/False)
4.8/5
(37)

Cryptanalysis is the process of "breaking" a cryptographic code.

(True/False)
4.8/5
(36)

In terms of information security, what is risk analysis?

(Essay)
4.8/5
(33)

Which of the following malware programs is disguised as a benevolent program?

(Multiple Choice)
4.8/5
(34)

A Caesar cipher that shifts characters 3 positions to the right would encode the word BUBBLE as which of the following?

(Multiple Choice)
4.8/5
(33)

Which of the following is the least significant challenge in the use of fingerprint analysis for user authentication?

(Multiple Choice)
4.8/5
(41)

Which feature of a cell phone has been in the news because it is being exploited by some organizations to collect data about the user?

(Multiple Choice)
4.8/5
(41)

Which of the following cryptography techniques requires two separate keys to encrypt and decrypt messages?

(Multiple Choice)
4.8/5
(32)

A route cipher is an example of what category of encryption?

(Multiple Choice)
4.7/5
(43)

Which of the following is not a reasonable password management guideline?

(Multiple Choice)
4.8/5
(42)

Which of the following are not user authentication credentials?

(Multiple Choice)
4.9/5
(36)

How does a transposition cipher work? Is it effective?

(Essay)
5.0/5
(39)

What are some of the reasons a person makes mistakes when it comes to keeping their online information secure?

(Essay)
4.9/5
(43)

Public-key cryptography and transposition ciphers are examples of modern computer encryption.

(True/False)
4.8/5
(37)

A computer virus and a computer worm are both self-replicating programs.

(True/False)
4.8/5
(39)

Antivirus software is only effective against viruses.

(True/False)
4.8/5
(41)
Showing 1 - 20 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)