Which term means a cryptography mechanism that hides secret communications within various forms of data quizlet?
Which of the following lists accurately describes TCP and UDP? Show 1) TCP: connectionless, unreliable, unsequenced, low overhead Your company's network provides HTTP, HTTPS, and SSH access to remote employees. Which ports must be opened on the firewall to allow this traffic to pass? 1) 80, 443, 22 Upgrade to remove ads Only SGD 41.99/year
Terms in this set (24)Chapter 3 3.1 What is the cryptography mechanism which hides secret communications within various forms of data? Steganography Which of the following encryption methods combines a random value with the plain text to produce the cipher text? Transposition Onetime pad (form of substitution) Which type of cipher changes the position of the characters in a plain text message? Transposition The Enigma machine, a cryptographic tool introduced in 1944 and used in WW2, encrypted messages by replacing characters for plain text. Which type of cipher does the Enigma machine use? Substitution In a cryptographic system, what properties should the initialization vector have? (Select two.)
Unpredictable Which of the following is a form of mathematical attack against the complexity of a cryptosystem's algorithm? Analytic attack Analytic attack Which form of cryptanalysis focuses on the
weaknesses in the supporting computing platform as a means to exploit and defeat encryption? Statistical attack In which type of attack does the attacker have access to both the plain text and the resulting cipher text, but does not have the ability to encrypt the plain text? Known plaintext Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plain text to see the resulting cipher text. What type of attack is this? Known plaintext Chosen plaintext When an attacker decrypts an encoded message using a different key than was used during encryption, what type of attack has occurred? Key clustering Key clustering Which of the following best describes a sidechannel attack? The attack exploits weaknesses in a cryptosystem such as inability to produce random numbers or floating point
errors. The attack is based on information gained from the physical implementation of a cryptosystem Which of the following password attacks adds appendages to known dictionary
words? Hybrid Which of the following attacks will typically take the longest amount of time to complete? Brute force attack Which type of password attack employs a list of predefined passwords
that it tries against a logon prompt or a local copy of a security accounts database? Dictionary Why are brute force attacks always successful? They are platform independent They test every possible valid combination A __________cipher replaces one set of characters with symbols or another character set. substitution A __________ cipher creates a sequence of bits that are used as the key stream A _______________ cipher takes a fixedlength number of bits, referred to as a block, and encrypts them all at once. block An ___________ attack is a form of mathematical attack against the complexity of a cryptosystem's algorithm. The goal is to break the algorithm. analytic A __________attack is focused on hashing algorithms, but not on the algorithm itself. birthday A __________attack tries all possible combinations of keys to decipher an encrypted message brute force A ___________ attack attempts to retransmit encryption session keys in hopes of accessing the resource in a deencrypted mode. replay A ________cipher text attack is where the attacker produces cipher text and then sends it through a decryption process to see the resulting plaintext chosen Sets with similar terms3.1.515 terms ashmulamula 9.414 terms gabbyalor CISSP - Types of Attacks and Viruses62 terms javery473 Security+ Chapter 1525 terms cat_mouf Sets found in the same folderChapter 8 Host Defense19 terms ekreigh Chapter 9 Application Defense15 terms ekreigh CS 3883 Final20 terms ekreigh Chapter 1047 terms ekreigh Other sets by this creatorCS 3883 Final Study Set398 terms ekreigh Chapter 732 terms ekreigh Chapter 698 terms ekreigh 2.84 terms ekreigh Recommended textbook solutionsFundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 720 solutions
Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions Other Quizlet setsCompTIA Security+ Exam SY0-501 Cryptography Quiz50 terms pbr5033 Chapter 7 Practice Questions Security+15 terms jofo4 FALL2019-CNIT120-CH.0340 terms roland_villarama 215 Final15 terms poszmod Related questionsQUESTION A software library of cryptographic standards and algorithms. These libraries are typically distributed within crypto modules. 5 answers QUESTION What are the three virus classifications 8 answers QUESTION True or False: A cryptographic key generated to be used only once within a short time frame is known as session key. 3 answers QUESTION In traditional backup approach in virtualized environment, the backup agent can be installed on the VM or on the hypervisor. 4 answers Which term means a cryptography mechanism that hides secret communications within various forms of data?Encryption is the method by which information is converted into secret code that hides the information's true meaning. The science of encrypting and decrypting information is called cryptography. In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext.
Which cryptography mechanism hides secret communications?What is the cryptography mechanism which hides secret communications within various forms of data? Which type of cipher changes the position of the characters in a plain text message? The Enigma machine, a cryptographic tool introduced in 1944 and used in WW2, encrypted messages by replacing characters for plain text.
Which term means a cryptography?Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden.
What is cryptographic secrets?In cryptography, a shared secret is a piece of data, known only to the parties involved, in a secure communication. This usually refers to the key of a symmetric cryptosystem. The shared secret can be a password, a passphrase, a big number, or an array of randomly chosen bytes.
|