Solved

Match Each Term with the Correct Statement Below

Question 32

Matching

Match each term with the correct statement below.

Premises:
attacker floods the radio frequency spectrum with noise
person who has been hired to break into a computer and steal information
series of 1's and 0's equal in length to the text plus the ICV
key value that is used to encrypt wireless data transmissions when they are sent
person who violates system security with malicious intent
encryption algorithm
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
limit a user's admission to the access point
unskilled or novice users who break into computer systems with malicious intent
Responses:
cipher
jam
script kiddies
computer spy
cracker
hacker
keystream
filter
default key

Correct Answer:

attacker floods the radio frequency spectrum with noise
person who has been hired to break into a computer and steal information
series of 1's and 0's equal in length to the text plus the ICV
key value that is used to encrypt wireless data transmissions when they are sent
person who violates system security with malicious intent
encryption algorithm
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
limit a user's admission to the access point
unskilled or novice users who break into computer systems with malicious intent
Related Questions