Exam 2: Cybersecurity and Cryptography
Exam 1: Cybersecurity and Technology25 Questions
Exam 2: Cybersecurity and Cryptography21 Questions
Select questions type
This is an attack on a computer system that takes advantage of a particular vulnerability that the system offers to intruders.
Free
(Multiple Choice)
4.8/5
(44)
Correct Answer:
C
This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.
Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
A
The developers of an operating system or vendor application might issue this to prevent intruders from taking advantage of a weakness in their programming.
Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
D
Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations.
(Multiple Choice)
4.9/5
(30)
What "layer" of an e-mail message should you consider when evaluating e-mail security?
(Multiple Choice)
4.9/5
(39)
In password protection, this is a random string of data used to modify a password hash.
(Multiple Choice)
4.8/5
(34)
This is the forging of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.
(Multiple Choice)
4.9/5
(31)
This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa.
(Multiple Choice)
4.8/5
(34)
This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions - for example, changing data or disclosing confidential information.
(Multiple Choice)
5.0/5
(38)
This is a compromised Web site that is being used as an attack launch point in a denialof-service attack.
(Multiple Choice)
4.8/5
(31)
This is a type of network security attack in which the intruder takes control of a communication between two entities and masquerades as one of them.
(Multiple Choice)
4.9/5
(31)
This is the modification of personal information on a Web user's computer to gain unauthorized information with which to obtain access to the user's existing accounts.
(Multiple Choice)
4.8/5
(31)
This was commonly used in cryptography during World War II.
(Multiple Choice)
4.8/5
(33)
Today, many Internet businesses and users take advantage of cryptography based on this approach.
(Multiple Choice)
4.9/5
(35)
This is a program in which harmful code is contained inside apparently harmless programming or data.
(Multiple Choice)
4.8/5
(30)
An intruder might install this on a networked computer to collect user ids and passwords from other machines on the network.
(Multiple Choice)
4.7/5
(30)
This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.
(Multiple Choice)
4.8/5
(36)
This is the inclusion of a secret message in otherwise unencrypted text or images.
(Multiple Choice)
4.8/5
(42)
This type of intrusion relies on the intruder's ability to trick people into breaking normal security procedures.
(Multiple Choice)
4.9/5
(29)
Showing 1 - 20 of 21
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)