CIS4385 final

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

The goal of ________________ is to hide information so that even if it is intercepted, it is not clear that information is hidden there.

steganography

2
New cards

According to the text, RAID stands for

Redundant Array of Independent Disks

3
New cards

ROT13 refers to

a simple single-alphabet substitution cipher where all letters are just shifted thirteen places.

4
New cards

"John the Ripper" and "0phcrack" are examples of

password crackers

5
New cards

Who is the author of your textbook?

Chuck Easttom

6
New cards

Which of the following is a good reason for making a hash of data?

To show that original data and copies of that data are identical.

7
New cards

What is file slack?

The unused space between logical end of a file and the physical end of the file.

8
New cards

An Ethernet MAC (Media Access Control) address is a __________ address that can be used to identify a network interface card (though somewhat unreliably since there's no verification of these, and mac-spoofing is quite common.)

6-byte (or 48 bit)

9
New cards

The Linux/UNIX command ________ can be used to search the contents for files, contents of files and just about anything you may want to search for.

grep

10
New cards

The above cartoon is an illustration of

the attribution problem

11
New cards

What does the "dd" program do on Linux?

It copies data.

12
New cards

It is _______ for people to re-use the same password on many different systems.

common

13
New cards

What does fsck do in Linux?

It examines filesystems for problems and allows one to attempt to correct these.

14
New cards

On a Linux machine, what does dmesg do?

It shows messages from the boot process.

15
New cards

Does the Playfair system have Feistel rounds?

No

16
New cards

On a Linux machine, what does the mount program do?

It allows one to mount a new filesystem for access.

17
New cards

What does the "file" program do on Linux?

It can discern the type of a file by various heuristics.

18
New cards

Which of the following are all Internet protocols commonly used to send and retrieve in email systems?

SMTP, POP, IMAP

19
New cards

Which of the following is not a Linux distribution?

NTFS

20
New cards

In newer (last five years) computers, which of these is more common for booting?

EFI/UEFI