Which of the following lists accurately describes TCP and UDP?
1] TCP: connectionless, unreliable, unsequenced, low overhead
2] UDP: connection-oriented, reliable, sequenced, high overhead
3] TCP: connection-oriented, reliable, sequenced, high overhead
4] UDP: connectionless, unreliable, unsequenced, low overhead
Your company's network provides HTTP, HTTPS, and SSH access to remote employees. Which ports must be opened on the firewall to allow this traffic to pass?
1] 80, 443, 22
2] 8088, 440, 25
3] 88, 4043, 22
4] 8080, 4430, 21
Upgrade to remove ads
Only SGD 41.99/year
- Science
- Computer Science
- Computer Security and Reliability
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set [24]
Chapter 3
3.1
What is the cryptography mechanism which hides secret communications within various forms of data?
Steganography
Polyinstantiation
Signals
Codes
Steganography
Which of the following encryption methods combines a random value with the plain text to produce the cipher text? Transposition
Elliptic curve
Steganography
Onetime pad
Onetime pad [form of substitution]
Which type of cipher changes the position of the characters in a plain text message?
Stream
Block
Substitution
Transposition
Transposition
The Enigma machine, a cryptographic tool introduced in 1944 and used in WW2, encrypted messages by replacing characters for plain text. Which type of cipher does the Enigma machine use?
Stream
Transposition
Block
Substitution
Substitution
In a cryptographic system, what properties should the initialization vector have? [Select two.]
Unpredictable
Large
Short
Uniform
Predictable
Unpredictable
Large
Which of the following is a form of mathematical attack against the complexity of a cryptosystem's algorithm? Analytic attack
Replay attack
Brute force attack
Birthday attack
Analytic attack
Which form of cryptanalysis focuses on the
weaknesses in the supporting computing platform as a means to exploit and defeat encryption?
Statistical attack
Implementation attack
Ciphertext only attack
Statistical attack
In which type of attack does the attacker have access to both the plain text and the resulting cipher text, but does not have the ability to encrypt the plain text?
Brute force
Chosen plaintext
Known plaintext
Chosen
cipher
Known plaintext
Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plain text to see the resulting cipher text. What type of attack is this? Known plaintext
Chosen cipher
Brute force
Chosen plaintext
Chosen plaintext
When an attacker decrypts an encoded message using a different key than was used during encryption, what type of attack has occurred? Key clustering
Statistical
Analytic
Replay
Key clustering
Which of the following best describes a sidechannel attack? The attack exploits weaknesses in a cryptosystem such as inability to produce random numbers or floating point
errors.
The attack targets a weakness in the software, protocol, or encryption algorithm.
The attack targets the key containing a small data set.
The attack is based on information gained from the physical implementation of a cryptosyste
The attack is based on information gained from the physical implementation of a cryptosystem
Which of the following password attacks adds appendages to known dictionary
words?
Hybrid
Dictionary
Analytic
Brute force
Hybrid
Which of the following attacks will typically take the longest amount of time to complete?
Brute force attack
Impersonation attack
Replay attack
Dictionary attack
Brute force attack
Which type of password attack employs a list of predefined passwords
that it tries against a logon prompt or a local copy of a security accounts database?
Salami
Dictionary
Brute Force
Dictionary
Why are brute force attacks always successful? They are platform independent
They can be performed in a distributed parallel processing environment
They test every possible valid combination
They are fast
They test every possible valid combination
A __________cipher replaces one set of characters with symbols or another character set.
substitution
A __________ cipher creates a sequence of bits that are used as the key
stream
A _______________ cipher takes a fixedlength number of bits, referred to as a block, and encrypts them all at once.
block
An ___________ attack is a form of mathematical attack against the complexity of a cryptosystem's algorithm. The goal is to break the algorithm.
analytic
A __________attack is focused on hashing algorithms, but not on the algorithm itself.
birthday
A __________attack tries all possible combinations of keys to decipher an encrypted message
brute force
A ___________ attack attempts to retransmit encryption session keys in hopes of accessing the resource in a deencrypted mode.
replay
A ________cipher text attack is where the attacker produces cipher text and then sends it through a decryption process to see the resulting plaintext
chosen
Sets with similar terms3.1.5
15 terms
ashmulamula
9.4
14 terms
gabbyalor
CISSP - Types of Attacks and Viruses
62 terms
javery473
Security+ Chapter 15
25 terms
cat_mouf
Sets found in the same folderChapter 8 Host Defense
19 terms
ekreigh
Chapter 9 Application Defense
15 terms
ekreigh
CS 3883 Final
20 terms
ekreigh
Chapter 10
47 terms
ekreigh
Other sets by this creatorCS 3883 Final Study Set
398 terms
ekreigh
Chapter 7
32 terms
ekreigh
Chapter 6
98 terms
ekreigh
2.8
4 terms
ekreigh
Recommended textbook solutionsFundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
720 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Other Quizlet setsCompTIA Security+ Exam SY0-501 Cryptography Quiz
50 terms
pbr5033
Chapter 7 Practice Questions Security+
15 terms
jofo4
FALL2019-CNIT120-CH.03
40 terms
roland_villarama
215 Final
15 terms
poszmod
Related questionsQUESTION
A software library of cryptographic standards and algorithms. These libraries are typically distributed within crypto modules.
5 answers
QUESTION
What are the three virus classifications
8 answers
QUESTION
True or False: A cryptographic key generated to be used only once within a short time frame is known as session key.
3 answers
QUESTION
In traditional backup approach in virtualized environment, the backup agent can be installed on the VM or on the hypervisor.
4 answers