Filters
Question type

A Trojan horse embeds itself within another program or file, and when that program or file is activated, it copies itself and attacks other files on the system. _________________________

Correct Answer

verifed

verified

Provide at least five examples of ways in which you can protect yourself from online threats.

Correct Answer

verifed

verified

• Be sure your computer has up-to-date a...

View Answer

____ governs what an authenticated user is allowed to do.


A) Authentication
B) Encryption
C) Access management
D) Authorization

Correct Answer

verifed

verified

In a(n)public-key system, the __________ for messages to go to a particular receiver is broadcast to everyone, but the decryption key cannot be derived from it and is known only by the receiver.

Correct Answer

verifed

verified

The success of RSA encryption depends on the fact that it is extremely difficult to find the prime factors for n if n is a large number.

Correct Answer

verifed

verified

_______ is the hide in plain sight encryption when a text file is hidden in an image file by changing (if needed)the least significant bit of each byte of the image file to match the binary form of the characters in the text.

Correct Answer

verifed

verified

For a given user ID, ____ software will first try all words in its built-in dictionary, encrypting each with the well-known hash function and comparing the result with the password file.


A) password-cracking
B) password-phreaking
C) password-whacking
D) password-tackling

Correct Answer

verifed

verified

A ____ is an integer greater than 1 that can only be written as the product of itself and 1.


A) prime number
B) primary number
C) natural number
D) whole number

Correct Answer

verifed

verified

The exchange of setup information between the client and server, preparatory to exchanging real data, is known as a ____.


A) handshake
B) training exchange
C) linkage
D) synchronization

Correct Answer

verifed

verified

A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.


A) block
B) Trojan
C) Caesar
D) Brutus

Correct Answer

verifed

verified

Explain what an embedded computer is and provide examples.

Correct Answer

verifed

verified

Embedded computers are computational dev...

View Answer

A(n)asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver. _________________________

Correct Answer

verifed

verified

Firewall software guards the access points to your computer, blocking viruses from sites . _________________________

Correct Answer

verifed

verified

Explain what a denial-of-service attack is, including the terms DDOS and zombie army in your response.

Correct Answer

verifed

verified

A denial-of-service (DoS)attack is typic...

View Answer

SSL protocols are the only security protocols that are supported by all web browsers.

Correct Answer

verifed

verified

The operating system encrypts the password for a given user by encoding the information, using a process that is easy to apply but difficult to undo.

Correct Answer

verifed

verified

____________________ is the science of "secret writing."

Correct Answer

verifed

verified

What is the definition of phishing?

Correct Answer

verifed

verified

Phishing is a practice used to illegally...

View Answer

What is the major difference between TSL and SSL?

Correct Answer

verifed

verified

The major difference between TSL and SSL...

View Answer

Your best defense against someone guessing your password is to be smart about how you choose and use your password.

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer