Which term means a cryptography mechanism that hides secret communications within various forms of data quizlet?

Which of the following lists accurately describes TCP and UDP?

1) TCP: connectionless, unreliable, unsequenced, low overhead
2) UDP: connection-oriented, reliable, sequenced, high overhead
3) TCP: connection-oriented, reliable, sequenced, high overhead
4) UDP: connectionless, unreliable, unsequenced, low overhead

Your company's network provides HTTP, HTTPS, and SSH access to remote employees. Which ports must be opened on the firewall to allow this traffic to pass?

1) 80, 443, 22
2) 8088, 440, 25
3) 88, 4043, 22
4) 8080, 4430, 21

Upgrade to remove ads

Only SGD 41.99/year

  1. Science
  2. Computer Science
  3. Computer Security and Reliability

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (24)

Chapter 3

3.1

What is the cryptography mechanism which hides secret communications within various forms of data?
Steganography
Polyinstantiation
Signals
Codes

Steganography

Which of the following encryption methods combines a random value with the plain text to produce the cipher text? Transposition
Elliptic curve
Steganography
Onetime pad

Onetime pad (form of substitution)

Which type of cipher changes the position of the characters in a plain text message?
Stream
Block
Substitution
Transposition

Transposition

The Enigma machine, a cryptographic tool introduced in 1944 and used in WW2, encrypted messages by replacing characters for plain text. Which type of cipher does the Enigma machine use?
Stream
Transposition
Block
Substitution

Substitution

In a cryptographic system, what properties should the initialization vector have? (Select two.)
Unpredictable
Large
Short
Uniform
Predictable

Unpredictable
Large

Which of the following is a form of mathematical attack against the complexity of a cryptosystem's algorithm? Analytic attack
Replay attack
Brute force attack
Birthday attack

Analytic attack

Which form of cryptanalysis focuses on the weaknesses in the supporting computing platform as a means to exploit and defeat encryption?
Statistical attack
Implementation attack
Ciphertext only attack

Statistical attack

In which type of attack does the attacker have access to both the plain text and the resulting cipher text, but does not have the ability to encrypt the plain text?
Brute force
Chosen plaintext
Known plaintext
Chosen cipher

Known plaintext

Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plain text to see the resulting cipher text. What type of attack is this? Known plaintext
Chosen cipher
Brute force
Chosen plaintext

Chosen plaintext

When an attacker decrypts an encoded message using a different key than was used during encryption, what type of attack has occurred? Key clustering
Statistical
Analytic
Replay

Key clustering

Which of the following best describes a sidechannel attack? The attack exploits weaknesses in a cryptosystem such as inability to produce random numbers or floating point errors.
The attack targets a weakness in the software, protocol, or encryption algorithm.
The attack targets the key containing a small data set.
The attack is based on information gained from the physical implementation of a cryptosyste

The attack is based on information gained from the physical implementation of a cryptosystem

Which of the following password attacks adds appendages to known dictionary words?
Hybrid
Dictionary
Analytic
Brute force

Hybrid

Which of the following attacks will typically take the longest amount of time to complete?
Brute force attack
Impersonation attack
Replay attack
Dictionary attack

Brute force attack

Which type of password attack employs a list of predefined passwords that it tries against a logon prompt or a local copy of a security accounts database?
Salami
Dictionary
Brute Force

Dictionary

Why are brute force attacks always successful? They are platform independent
They can be performed in a distributed parallel processing environment
They test every possible valid combination
They are fast

They test every possible valid combination

A __________cipher replaces one set of characters with symbols or another character set.

substitution

A __________ cipher creates a sequence of bits that are used as the key

stream

A _______________ cipher takes a fixedlength number of bits, referred to as a block, and encrypts them all at once.

block

An ___________ attack is a form of mathematical attack against the complexity of a cryptosystem's algorithm. The goal is to break the algorithm.

analytic

A __________attack is focused on hashing algorithms, but not on the algorithm itself.

birthday

A __________attack tries all possible combinations of keys to decipher an encrypted message

brute force

A ___________ attack attempts to retransmit encryption session keys in hopes of accessing the resource in a deencrypted mode.

replay

A ________cipher text attack is where the attacker produces cipher text and then sends it through a decryption process to see the resulting plaintext

chosen

Sets with similar terms

3.1.5

15 terms

ashmulamula

9.4

14 terms

gabbyalor

CISSP - Types of Attacks and Viruses

62 terms

javery473

Security+ Chapter 15

25 terms

cat_mouf

Sets found in the same folder

Chapter 8 Host Defense

19 terms

ekreigh

Chapter 9 Application Defense

15 terms

ekreigh

CS 3883 Final

20 terms

ekreigh

Chapter 10

47 terms

ekreigh

Other sets by this creator

CS 3883 Final Study Set

398 terms

ekreigh

Chapter 7

32 terms

ekreigh

Chapter 6

98 terms

ekreigh

2.8

4 terms

ekreigh

Recommended textbook solutions

Which term means a cryptography mechanism that hides secret communications within various forms of data quizlet?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Which term means a cryptography mechanism that hides secret communications within various forms of data quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Which term means a cryptography mechanism that hides secret communications within various forms of data quizlet?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

720 solutions

Which term means a cryptography mechanism that hides secret communications within various forms of data quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Other Quizlet sets

CompTIA Security+ Exam SY0-501 Cryptography Quiz

50 terms

pbr5033

Chapter 7 Practice Questions Security+

15 terms

jofo4

FALL2019-CNIT120-CH.03

40 terms

roland_villarama

215 Final

15 terms

poszmod

Related questions

QUESTION

A software library of cryptographic standards and algorithms. These libraries are typically distributed within crypto modules.

5 answers

QUESTION

What are the three virus classifications

8 answers

QUESTION

True or False: A cryptographic key generated to be used only once within a short time frame is known as session key.

3 answers

QUESTION

In traditional backup approach in virtualized environment, the backup agent can be installed on the VM or on the hypervisor.

4 answers

Which term means a cryptography mechanism that hides secret communications within various forms of data?

Encryption is the method by which information is converted into secret code that hides the information's true meaning. The science of encrypting and decrypting information is called cryptography. In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext.

Which cryptography mechanism hides secret communications?

What is the cryptography mechanism which hides secret communications within various forms of data? Which type of cipher changes the position of the characters in a plain text message? The Enigma machine, a cryptographic tool introduced in 1944 and used in WW2, encrypted messages by replacing characters for plain text.

Which term means a cryptography?

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden.

What is cryptographic secrets?

In cryptography, a shared secret is a piece of data, known only to the parties involved, in a secure communication. This usually refers to the key of a symmetric cryptosystem. The shared secret can be a password, a passphrase, a big number, or an array of randomly chosen bytes.