444 network security final review fall 2025

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

___ is the process of providing a nonsecret, random piece of data to the hashing function when the hash is first calculated.

Salting

2
New cards

____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.

Hash algorithms

3
New cards

____ is the process of converting the ciphertext message back into plaintext so that it can be readily understood.

Decryption

4
New cards

symetric encryption is used to test…

confidentiality

5
New cards

hashing provided by MAC is used to test

integrity

6
New cards

Rachel is teaching at the University of Massachusetts-Boston and she is trying to send a document to her students. She wants to make sure that students have the correct document. which key will rachel use to encrypt the document

rachels public key

7
New cards

What is the binary number associated with the decimal integer 39.

100111

8
New cards

Using the following Perl code, how many times will “This is easy…” be displayed onscreen?

5

9
New cards

An English-like language you can use to help create the structure of your program is known as which of the following?

pseudocode

10
New cards

A missing parenthesis or brace might cause a C compiler to return which of the following?

Syntax error

11
New cards

The art of trailing closely behind an employee who has access to an area without the person realizing it is known as which of the following?

Piggybacking

12
New cards

To determine what resources or shares are on a network, security testers must first determine what OS is being used via port scanning and what other method?

footprinting

13
New cards

The term ___ is used to describe a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest.

Message authenticaton code (MAC)

14
New cards

An employee works on a small team that shares critical information about the company's network. When sending emails that have this information, what would be used to provide the identity of the sender and prove that the information has not been tampered with?

Digital signature

15
New cards

(might be on) What is the main disadvantage of asymmetric encryption compared to symmetric encryption?

Slower encryption and decryption

16
New cards

(might be on)What is the primary advantage of asymmetric encryption over symmetric encryption?

Stronger security for key distribution

17
New cards

Which function is considered unsafe and commonly leads to buffer overflows?

gets()

18
New cards

Which type of attack is often enabled by buffer overflows?

Remote code execution

19
New cards

128, 64, 32, 16, 8, 4, 2, 1

20
New cards

A security technician needs to transfer a large file to another user in a data center while ensuring non-repudiation. Which statement best illustrates what type of encryption the technician should use to perform the task?

(Might be B)The technician should use asymmetric encryption to verify the data center user's identity and agree on a symmetric encryption algorithm for the data transfer.

21
New cards

Which two cryptographic functions can be combined to authenticate a sender and prove the integrity of a message?

Public key cryptography and hashing

22
New cards

ip adresss 192.168.39.55/21 whats the subnet mask and network id

subnet mask: 255.255.248.0 and the network id: 192.168.32.0