Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.

You can use ____________ to protect your computer from outsiders. | A stateful firewall maintains a ______________, which is a list of active connections. | Match each term according to their meanings in Public-Key Cryptosystem | The process of verifying and identity claimed by or for a system entity. | Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. | The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams | A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. | According to DAD triad, ___________ attempts to defeat availability. | The quality or state of having ownership or control of some object or item. | Personal Firewall |


Читайте также:
  1. A stateful firewall maintains a ______________, which is a list of active connections.
  2. Answer the following questions using your own words but taking into account the
  3. C) Interview your partner using the questions in
  4. Choose a verb from the list and complete the text using Past Continuous or the Past Simple.
  5. Complete the following sentences using an appropriate form of the verb.
  6. Correct the mistakes which have been underlined for you. Suggest a suitable word (words).

A. Symmetric encryption

B. Asymmetric encryption

C. One key encryption

D. Same key encryption

E. Private key encryption

 

61. What is Hacking?

A. Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use for malicious, unwanted purposes.

B. Hacking is basically hacking with a telephone. Using different “boxes” and “tricks” to manipulate the phone companies and their phones, you gain many things.

C. A cryptographic technique that seeks to make the relationship between the statistics of the ciphertext and the value of the encryption key as complex as possible.

D. A decoy system designed to lure a potential attacker away from critical systems. A form of intrusion detection.

E. An individual who gains, or attempts to gain, unauthorized access to a computer system or to gain unauthorized privileges on that system.

 

62. What is Cracking?

A. Cracking is almost the same as hacking.

B. A cracker destroys the information that they get into.

C. Cracking get into people servers and accounts illegally.

D. A cracker destroys the software that they get into.

E. All of the statements

 

63. What is Phreaking?

A. Phreaking refers to an array of activities which are done to intrude some one else’s personal information space so as to use for malicious, unwanted purposes.

B. Phreaking is basically hacking with a telephone. Using different “boxes” and “tricks” to manipulate the phone companies and their phones, you gain many things.

C. A cryptographic technique that seeks to make the relationship between the statistics of the ciphertext and the value of the encryption key as complex as possible.

D. A decoy system designed to lure a potential attacker away from critical systems. A form of intrusion detection.

E. An individual who gains, or attempts to gain, unauthorized access to a computer system or to gain unauthorized privileges on that system.

 

A ____________ is someone who breaks into the telephone network illegally manipulating various audio frequencies associated with the tones, typically to make free long-distance phone calls.

A. Phreak

B. Hacker

C. Cracker

D. Intruder

E. Kerberos

 

65. How can we protect the system?

A. Never patch security hole

B. Encrypt important data

C. Include unused setujd/setgid programs

D. Setup firewall

E. Setup IDS

 

66. What should do after hacked?

A. Shutdown the system

B. Separate the system from network

C. Restore the system with the backup

D. Reinstall all programs

E. All of the statements

 

67. Which one of the following statements is not the mode of Hacker attack?

A. Locally

B. Offline

C. Theft

D. Deception

E. None of the statements

 


Дата добавления: 2015-08-18; просмотров: 168 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC| An attacker alters his identity so that someone thinks he is someone else

mybiblioteka.su - 2015-2024 год. (0.007 сек.)