Deck 2: Cybersecurity and Cryptography

ملء الشاشة (f)
exit full mode
سؤال
This was commonly used in cryptography during World War II.

A)Tunneling
B)Personalization
C)Van Eck phreaking
D)One-time pad
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Today, many Internet businesses and users take advantage of cryptography based on this approach.

A)Public key infrastructure
B)Output feedback
C)Encrypting File System
D)Single sign on
سؤال
This is the name for the issuer of a PKI certificate.

A)Man in the middle
B)Certificate authority
C)Resource Access Control Facility
D)Script kiddy
سؤال
Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations.

A)DS
B)OCSP
C)Secure HTTP
D)Pretty Good Privacy
سؤال
This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.

A)Rijndael
B)Kerberos
C)Blowfish
D)IPsec
سؤال
This is the inclusion of a secret message in otherwise unencrypted text or images.

A)Masquerade
B)Steganography
C)Spoof
D)Eye-in-hand system
سؤال
In password protection, this is a random string of data used to modify a password hash.

A)Sheepdip
B)Salt
C)Bypass
D)Dongle
سؤال
This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa.

A)Foot printing
B)Hash function
C)Watermark
D)Electronic Code Book
سؤال
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.

A)Chaffing and winnowing
B)Cryptanalysis
C)Serendipity
D)Brute force cracking
سؤال
An intruder might install this on a networked computer to collect user ids and passwords from other machines on the network.

A)Passphrase
B)Root kit
C)Ownership tag
D)Token
سؤال
This type of intrusion relies on the intruder's ability to trick people into breaking normal security procedures.

A)Shoulder surfing
B)Hijacking
C)Brain fingerprinting
D)Social engineering
سؤال
The developers of an operating system or vendor application might issue this to prevent intruders from taking advantage of a weakness in their programming.

A)Cookie
B)Key fob
C)Watermark
D)Patch
سؤال
This is an attack on a computer system that takes advantage of a particular vulnerability that the system offers to intruders.

A)Port scan
B)Denial of service
C)Exploit
D)Logic bomb
سؤال
This is a program in which harmful code is contained inside apparently harmless programming or data.

A)Snort
B)Honeypot
C)Blue bomb
D)Trojan horse
سؤال
This is the modification of personal information on a Web user's computer to gain unauthorized information with which to obtain access to the user's existing accounts.

A)Identity theft
B)Cookie poisoning
C)Shoulder surfing
D)Relative identifier
سؤال
This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions - for example, changing data or disclosing confidential information.

A)Buffer overflow
B)Block cipher
C)War dialing
D)Distributed denial-of-service attack
سؤال
This is the forging of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.

A)Foot printing
B)Non repudiation
C)E-mail spoofing
D)Finger
سؤال
This is a type of network security attack in which the intruder takes control of a communication between two entities and masquerades as one of them.

A)Hijacking
B)Identity theft
C)Smurf attack
D)Tunneling
سؤال
This is a compromised Web site that is being used as an attack launch point in a denialof-service attack.

A)Bastion host
B)Packet monkey
C)Dongle
D)Zombie
سؤال
This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.

A)Private key
B)Digital certificate
C)Smart card
D)Ownership tag
سؤال
What "layer" of an e-mail message should you consider when evaluating e-mail security?

A)TCP/IP
B)SMTP
C)Body
D)All of the above
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/21
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Cybersecurity and Cryptography
1
This was commonly used in cryptography during World War II.

A)Tunneling
B)Personalization
C)Van Eck phreaking
D)One-time pad
One-time pad
2
Today, many Internet businesses and users take advantage of cryptography based on this approach.

A)Public key infrastructure
B)Output feedback
C)Encrypting File System
D)Single sign on
Public key infrastructure
3
This is the name for the issuer of a PKI certificate.

A)Man in the middle
B)Certificate authority
C)Resource Access Control Facility
D)Script kiddy
Certificate authority
4
Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations.

A)DS
B)OCSP
C)Secure HTTP
D)Pretty Good Privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
5
This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.

A)Rijndael
B)Kerberos
C)Blowfish
D)IPsec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
6
This is the inclusion of a secret message in otherwise unencrypted text or images.

A)Masquerade
B)Steganography
C)Spoof
D)Eye-in-hand system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
7
In password protection, this is a random string of data used to modify a password hash.

A)Sheepdip
B)Salt
C)Bypass
D)Dongle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
8
This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa.

A)Foot printing
B)Hash function
C)Watermark
D)Electronic Code Book
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
9
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.

A)Chaffing and winnowing
B)Cryptanalysis
C)Serendipity
D)Brute force cracking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
10
An intruder might install this on a networked computer to collect user ids and passwords from other machines on the network.

A)Passphrase
B)Root kit
C)Ownership tag
D)Token
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
11
This type of intrusion relies on the intruder's ability to trick people into breaking normal security procedures.

A)Shoulder surfing
B)Hijacking
C)Brain fingerprinting
D)Social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
12
The developers of an operating system or vendor application might issue this to prevent intruders from taking advantage of a weakness in their programming.

A)Cookie
B)Key fob
C)Watermark
D)Patch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
13
This is an attack on a computer system that takes advantage of a particular vulnerability that the system offers to intruders.

A)Port scan
B)Denial of service
C)Exploit
D)Logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
14
This is a program in which harmful code is contained inside apparently harmless programming or data.

A)Snort
B)Honeypot
C)Blue bomb
D)Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
15
This is the modification of personal information on a Web user's computer to gain unauthorized information with which to obtain access to the user's existing accounts.

A)Identity theft
B)Cookie poisoning
C)Shoulder surfing
D)Relative identifier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
16
This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions - for example, changing data or disclosing confidential information.

A)Buffer overflow
B)Block cipher
C)War dialing
D)Distributed denial-of-service attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
17
This is the forging of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.

A)Foot printing
B)Non repudiation
C)E-mail spoofing
D)Finger
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
18
This is a type of network security attack in which the intruder takes control of a communication between two entities and masquerades as one of them.

A)Hijacking
B)Identity theft
C)Smurf attack
D)Tunneling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
19
This is a compromised Web site that is being used as an attack launch point in a denialof-service attack.

A)Bastion host
B)Packet monkey
C)Dongle
D)Zombie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
20
This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.

A)Private key
B)Digital certificate
C)Smart card
D)Ownership tag
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
21
What "layer" of an e-mail message should you consider when evaluating e-mail security?

A)TCP/IP
B)SMTP
C)Body
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 21 في هذه المجموعة.