1/21
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
___ is the process of providing a nonsecret, random piece of data to the hashing function when the hash is first calculated.
Salting
____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.
Hash algorithms
____ is the process of converting the ciphertext message back into plaintext so that it can be readily understood.
Decryption
symetric encryption is used to test…
confidentiality
hashing provided by MAC is used to test
integrity
Rachel is teaching at the University of Massachusetts-Boston and she is trying to send a document to her students. She wants to make sure that students have the correct document. which key will rachel use to encrypt the document
rachels public key
What is the binary number associated with the decimal integer 39.
100111
Using the following Perl code, how many times will “This is easy…” be displayed onscreen?
5
An English-like language you can use to help create the structure of your program is known as which of the following?
pseudocode
A missing parenthesis or brace might cause a C compiler to return which of the following?
Syntax error
The art of trailing closely behind an employee who has access to an area without the person realizing it is known as which of the following?
Piggybacking
To determine what resources or shares are on a network, security testers must first determine what OS is being used via port scanning and what other method?
footprinting
The term ___ is used to describe a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest.
Message authenticaton code (MAC)
An employee works on a small team that shares critical information about the company's network. When sending emails that have this information, what would be used to provide the identity of the sender and prove that the information has not been tampered with?
Digital signature
(might be on) What is the main disadvantage of asymmetric encryption compared to symmetric encryption?
Slower encryption and decryption
(might be on)What is the primary advantage of asymmetric encryption over symmetric encryption?
Stronger security for key distribution
Which function is considered unsafe and commonly leads to buffer overflows?
gets()
Which type of attack is often enabled by buffer overflows?
Remote code execution
128, 64, 32, 16, 8, 4, 2, 1
A security technician needs to transfer a large file to another user in a data center while ensuring non-repudiation. Which statement best illustrates what type of encryption the technician should use to perform the task?
(Might be B)The technician should use asymmetric encryption to verify the data center user's identity and agree on a symmetric encryption algorithm for the data transfer.
Which two cryptographic functions can be combined to authenticate a sender and prove the integrity of a message?
Public key cryptography and hashing
ip adresss 192.168.39.55/21 whats the subnet mask and network id
subnet mask: 255.255.248.0 and the network id: 192.168.32.0