Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

An attacker alters his identity so that someone thinks he is someone else

You can use ____________ to protect your computer from outsiders. | A stateful firewall maintains a ______________, which is a list of active connections. | Match each term according to their meanings in Public-Key Cryptosystem | The process of verifying and identity claimed by or for a system entity. | Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC | The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams | A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. | According to DAD triad, ___________ attempts to defeat availability. | The quality or state of having ownership or control of some object or item. | Personal Firewall |


Читайте также:
  1. B) IDENTITY CARD
  2. Invite Someone You Don’t Know to Dinner.
  3. Lay With Someone, Motionless, Just Feeling Each Other.
  4. Let Someone Kayden Get Close to You
  5. Offer to Help Someone Without Them Asking.
  6. Part 2. This broken city sky like butane on my skin. Someone save us

A. Spoofing

B. DDos Attack

C. Permutation scanning

D. Central source propagation

E. Threat modelling

 

69. Which of the following statements are types of Spoofing?

A. IP Spoofing

B. Email Spoofing

C. Web Spoofing

D. Application Spoofing

E. DDos Spoofing

 

70. Which of the following statements is the definition of IP Spoofing – Flying-Blind Attack?

A. Attacker uses IP address of another computer to acquire information or gain access.

B. Attacker spoofs the IP address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies.

C. Attacker sends messages masquerading as someone else.

D. Web Site maintains authentication so that the user does not have to authenticate repeatedly

E. Process of taking over an existing active session.

 

71. Which of the following statements is the definition of IP Spoofing – Source Routing?

A. Attacker uses IP address of another computer to acquire information or gain access.

B. Attacker spoofs the IP address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies.

C. Attacker sends messages masquerading as someone else.

D. Web Site maintains authentication so that the user does not have to authenticate repeatedly

E. Process of taking over an existing active session.

 

72. Which of the following statements is the definition of E-mail Spoofing?

A. Attacker uses IP address of another computer to acquire information or gain access.

B. Attacker spoofs the IP address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies.

C. Attacker sends messages masquerading as someone else.

D. Web Site maintains authentication so that the user does not have to authenticate repeatedly

E. Process of taking over an existing active session.

 

73. Which of the following statements is the definition of Session Hijackig?

A. Attacker uses IP address of another computer to acquire information or gain access.

B. Attacker spoofs the IP address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies.

C. Attacker sends messages masquerading as someone else.

D. Web Site maintains authentication so that the user does not have to authenticate repeatedly

E. Process of taking over an existing active session.

 

74. Which attack takes advantage of the way in which information is stored by computer programs?

A. Buffer overflow attacks

B. DDos Attack

C. Spoofing

D. Session Hijacking

E. None of the statements

 

75. How does the Dictionary attack work?

A. Hacker tries all words in dictionary to crack password

B. Try all permutations of the letters and symbols in the alphabet

C. Words from dictionary and their variations used in attack

D. People dump their trash papers in garbage which may contain information to crack passwords

E. People write passwords in different places and disclose passwords naively to others

 

76. How does the Brute Force attack work?

A. Hacker tries all words in dictionary to crack password

B. Try all permutations of the letters and symbols in the alphabet

C. Words from dictionary and their variations used in attack

D. People dump their trash papers in garbage which may contain information to crack passwords

E. People write passwords in different places and disclose passwords naively to others

 

77. How does the Hybrid attack work?

A. Hacker tries all words in dictionary to crack password

B. Try all permutations of the letters and symbols in the alphabet

C. Words from dictionary and their variations used in attack

D. People dump their trash papers in garbage which may contain information to crack passwords

E. People write passwords in different places and disclose passwords naively to others

 

78. How does the Social Engineering work?

 

A. Hacker tries all words in dictionary to crack password

B. Try all permutations of the letters and symbols in the alphabet

C. Words from dictionary and their variations used in attack

D. People dump their trash papers in garbage which may contain information to crack passwords

E. People write passwords in different places and disclose passwords naively to others

 

79. How does the Dumpster Diving work?

A. Hacker tries all words in dictionary to crack password

B. Try all permutations of the letters and symbols in the alphabet

C. Words from dictionary and their variations used in attack

D. People dump their trash papers in garbage which may contain information to crack passwords

E. People write passwords in different places and disclose passwords naively to others

 


Дата добавления: 2015-08-18; просмотров: 96 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.| Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers.

mybiblioteka.su - 2015-2024 год. (0.007 сек.)