1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The goal of ________________ is to hide information so that even if it is intercepted, it is not clear that information is hidden there.
steganography
According to the text, RAID stands for
Redundant Array of Independent Disks
ROT13 refers to
a simple single-alphabet substitution cipher where all letters are just shifted thirteen places.
"John the Ripper" and "0phcrack" are examples of
password crackers
Who is the author of your textbook?
Chuck Easttom
Which of the following is a good reason for making a hash of data?
To show that original data and copies of that data are identical.
What is file slack?
The unused space between logical end of a file and the physical end of the file.
An Ethernet MAC (Media Access Control) address is a __________ address that can be used to identify a network interface card (though somewhat unreliably since there's no verification of these, and mac-spoofing is quite common.)
6-byte (or 48 bit)
The Linux/UNIX command ________ can be used to search the contents for files, contents of files and just about anything you may want to search for.
grep
The above cartoon is an illustration of
the attribution problem
What does the "dd" program do on Linux?
It copies data.
It is _______ for people to re-use the same password on many different systems.
common
What does fsck do in Linux?
It examines filesystems for problems and allows one to attempt to correct these.
On a Linux machine, what does dmesg do?
It shows messages from the boot process.
Does the Playfair system have Feistel rounds?
No
On a Linux machine, what does the mount program do?
It allows one to mount a new filesystem for access.
What does the "file" program do on Linux?
It can discern the type of a file by various heuristics.
Which of the following are all Internet protocols commonly used to send and retrieve in email systems?
SMTP, POP, IMAP
Which of the following is not a Linux distribution?
NTFS
In newer (last five years) computers, which of these is more common for booting?
EFI/UEFI