Filters
Question type

____ governs what an authenticated user is allowed to do.


A) Authentication
B) Encryption
C) Access management
D) Authorization

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

____ is the process of using people to get the information you want.


A) Social networking
B) Social engineering
C) Social objecting
D) Social management

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Explain at length what a Caesar cipher does.

Correct Answer

verifed

verified

A Caesar cipher, also called a shift cip...

View Answer

The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong ____ and authorization process.


A) authentication
B) encryption
C) access
D) interference

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

​ To reduce the chance that two passwords will have the same hash value, a timestamp can be appended to a password,and the result is then run through the encryption algorithm and stored as theencrypted password in the password file.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.


A) hash function
B) encryption function
C) mash function
D) stash function

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

To try all possible passwords of length k or less would require ____ attempts.


A) nk
B) kk
C) n1 + n2 + ...+ nk
D) k1 + k2 + ...+ kn

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

A(n) Trojan horse embeds itself within another program or file and when that program or file is activated, it copies itself and attacks other files on the system._________________________

A) True
B) False

Correct Answer

verifed

verified

Any positive ____________________ is either a prime number or a number that can be written in a unique way as a product of prime factors.

Correct Answer

verifed

verified

A(n) asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver._________________________

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer