1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Security is a form of...
policy
Which of the keys are used to encrypt (not decrypt) a message when anyone can create the message, but only A can read the message?
public key of A
Secret data remains secret
confidentiality
unauthorized user should not be able to modify data
integrityno
nobody can make a system unusable
availability
determining who the user is
authentication
determining who is allowed to do what
authorization
making sure people can do only what they are allowed to do
enforcement
storing all permissions for all users with each object
access control list
storing all objects a process can touch
capability list
seemingly innocent program that perfoms an unexpected function
trojan horse
Download 10-million-passwords.txt and wordlist.10000.txt from the class website. The first file contains 10 million passwords. The second file contains 10,000 words from the English dictionary. Use tools or write programs to analyze the patterns of the 10 million passwords.
What is the second most popular password?
Password
Download 10-million-passwords.txt and wordlist.10000.txt from the class website. The first file contains 10 million passwords. The second file contains 10,000 words from the English dictionary. Use tools or write programs to analyze the patterns of the 10 million passwords.
How many different passwords consist of only numbers?
640001
Download 10-million-passwords.txt and wordlist.10000.txt from the class website. The first file contains 10 million passwords. The second file contains 10,000 words from the English dictionary. Use tools or write programs to analyze the patterns of the 10 million passwords.
How many different passwords are found in the dictionary (lower-case password matches only)?
8000
Download 10-million-passwords.txt and wordlist.10000.txt from the class website. The first file contains 10 million passwords. The second file contains 10,000 words from the English dictionary. Use tools or write programs to analyze the patterns of the 10 million passwords.
How many different passwords are in the password file?
4400000