1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is an interception attack?
An Unauthorized Viewing
What is an Impersonation/Masquerade attack?
Claim a different identity.
What is a Modification Attack?
An unauthorized change.
What is a Fabrication attack?
An unauthorized creation.
What is an interruption attack?
prevents authorized access.
How can you determine if data sent over the network has been modified?
You can use a Hash with a key to determine if the data has been modified.
What is the Purpose of the DNS?
The Domain name system provides the IP of the server whos URL you typed in.
What is DNS Spoofing?
When someone impersonated the DNS and sends you an IP to a potentially malicious website.
Why types of attacks can Cryptography not protect against?
It can not protect against networks attacks.