Exam 2: Cybersecurity and Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

This is an attack on a computer system that takes advantage of a particular vulnerability that the system offers to intruders.

Free
(Multiple Choice)
4.8/5
(44)
Correct Answer:
Verified

C

This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.

Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
Verified

A

The developers of an operating system or vendor application might issue this to prevent intruders from taking advantage of a weakness in their programming.

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

D

Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations.

(Multiple Choice)
4.9/5
(30)

What "layer" of an e-mail message should you consider when evaluating e-mail security?

(Multiple Choice)
4.9/5
(39)

In password protection, this is a random string of data used to modify a password hash.

(Multiple Choice)
4.8/5
(34)

This is the forging of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.

(Multiple Choice)
4.9/5
(31)

This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa.

(Multiple Choice)
4.8/5
(34)

This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions - for example, changing data or disclosing confidential information.

(Multiple Choice)
5.0/5
(38)

This is a compromised Web site that is being used as an attack launch point in a denialof-service attack.

(Multiple Choice)
4.8/5
(31)

This is a type of network security attack in which the intruder takes control of a communication between two entities and masquerades as one of them.

(Multiple Choice)
4.9/5
(31)

This is the modification of personal information on a Web user's computer to gain unauthorized information with which to obtain access to the user's existing accounts.

(Multiple Choice)
4.8/5
(31)

This was commonly used in cryptography during World War II.

(Multiple Choice)
4.8/5
(33)

Today, many Internet businesses and users take advantage of cryptography based on this approach.

(Multiple Choice)
4.9/5
(35)

This is a program in which harmful code is contained inside apparently harmless programming or data.

(Multiple Choice)
4.8/5
(30)

An intruder might install this on a networked computer to collect user ids and passwords from other machines on the network.

(Multiple Choice)
4.7/5
(30)

This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.

(Multiple Choice)
4.8/5
(36)

This is the inclusion of a secret message in otherwise unencrypted text or images.

(Multiple Choice)
4.8/5
(42)

This type of intrusion relies on the intruder's ability to trick people into breaking normal security procedures.

(Multiple Choice)
4.9/5
(29)

This is the name for the issuer of a PKI certificate.

(Multiple Choice)
4.8/5
(27)
Showing 1 - 20 of 21
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)