Читайте также:
|
|
A. Symmetric encryption
B. Asymmetric encryption
C. One key encryption
D. Same key encryption
E. Private key encryption
61. What is Hacking?
A. Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use for malicious, unwanted purposes.
B. Hacking is basically hacking with a telephone. Using different “boxes” and “tricks” to manipulate the phone companies and their phones, you gain many things.
C. A cryptographic technique that seeks to make the relationship between the statistics of the ciphertext and the value of the encryption key as complex as possible.
D. A decoy system designed to lure a potential attacker away from critical systems. A form of intrusion detection.
E. An individual who gains, or attempts to gain, unauthorized access to a computer system or to gain unauthorized privileges on that system.
62. What is Cracking?
A. Cracking is almost the same as hacking.
B. A cracker destroys the information that they get into.
C. Cracking get into people servers and accounts illegally.
D. A cracker destroys the software that they get into.
E. All of the statements
63. What is Phreaking?
A. Phreaking refers to an array of activities which are done to intrude some one else’s personal information space so as to use for malicious, unwanted purposes.
B. Phreaking is basically hacking with a telephone. Using different “boxes” and “tricks” to manipulate the phone companies and their phones, you gain many things.
C. A cryptographic technique that seeks to make the relationship between the statistics of the ciphertext and the value of the encryption key as complex as possible.
D. A decoy system designed to lure a potential attacker away from critical systems. A form of intrusion detection.
E. An individual who gains, or attempts to gain, unauthorized access to a computer system or to gain unauthorized privileges on that system.
A ____________ is someone who breaks into the telephone network illegally manipulating various audio frequencies associated with the tones, typically to make free long-distance phone calls.
A. Phreak
B. Hacker
C. Cracker
D. Intruder
E. Kerberos
65. How can we protect the system?
A. Never patch security hole
B. Encrypt important data
C. Include unused setujd/setgid programs
D. Setup firewall
E. Setup IDS
66. What should do after hacked?
A. Shutdown the system
B. Separate the system from network
C. Restore the system with the backup
D. Reinstall all programs
E. All of the statements
67. Which one of the following statements is not the mode of Hacker attack?
A. Locally
B. Offline
C. Theft
D. Deception
E. None of the statements
Дата добавления: 2015-08-18; просмотров: 168 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC | | | An attacker alters his identity so that someone thinks he is someone else |