.
Network attacks, firewall and worms
Viruses, worms and encryption
Network attacks, viruses and worms
Viruses, network encryptions and worms
Firewall, IDS, Kerberos, blogs
IDS, firewall, authentication, policies
Virus, worms, attacks, web-sites
Network attacks, IDS, worms, virus
5
4
3
2
6
Unauthorized access
Asset lost, unusable, unavailable
Unauthorized change, tamper of data
Unauthorized add data to a database
Unauthorized access
Asset lost, unusable, unavailable
Unauthorized change, tamper of data
Unauthorized add data to a database
Unauthorized access
Asset lost, unusable, unavailable
Unauthorized change, tamper of data
Unauthorized add data to a database
Firewall, router access control list, spam filters, virus scanners
Employee communication, policy on company Intranet
Audit logs, intrusion detection system, network traffic monitoring
Network attacks, IDS, worms, virus
Firewall, router access control list, spam filters, virus scanners
Employee communication, policy on company Intranet
Audit logs, intrusion detection system, network traffic monitoring
Network attacks, IDS, worms, virus
Firewall, router access control list, spam filters, virus scanners
Employee communication, policy on company Intranet
Audit logs, intrusion detection system, network traffic monitoring
Network attacks, IDS, worms, virus
Is the process of encoding a message so that its meaning is not obvious
Is the reverse process, transforming an encrypted message back into its normal, original form
Is the process of preventing any attacks from the hackers
SSL
Nonce
One time password
Secret key
Encrypt the message with his private key, encrypt the result with Alice’s public key, and then send Alice the message.
Encrypt the message with his private key, encrypt the result with Alice’s private key, and then send Alice the message.
Encrypt the message with his public key, encrypt the result with Alice’s public key, and then send Alice the message.
A hash can be reversed, a cipher cannot
A hash produces a variable output for any input size, a cipher does not
A cipher can be reversed, a hash cannot
Decryption
Cryptanalysis
Cryptography
Brute force cracking
Auditability
Availability
Integrity
Confidentiality
Interception
Interruption
Interpretation
Modification
The CA’s private key
Bob’s public key
The CA’s public key
Bob’s private key
Network Adapter
Antivirus Software
Intrusion Detection System
Firewall
Method, Opportunity, Motive
Method, Operation, Model
Mother
Market, Option, Motivation
Confidentiality, Integrity, Availability
Central Intelligence Agency
Culinary Institute of America
Certified Internal Auditor
Different-length ciphertext block
Same-length ciphertext block
The same letter
No answer
A weakness in the security system
A method which uses flaws to have more access, privileges, or resources to the system
A method which used to eliminate or reduce threats
A kind of authentication to the system
Antivirus
Intrusion Detection System (IDS)
Personal Firewall
Network Monitor
Algorithm for performing encryption and decryption
Encrypted message
None of the mentioned
Raw message
Algorithm for performing encryption and decryption
Encrypted message
None of the mentioned
All of the mentioned
Algorithm for performing encryption and decryption
Encrypted message
Raw message
None of the mentioned
Info used to cipher, known only sender and receiver
Algorithm for transforming plaintext to ciphertext
Encrypted message
Recovering plaintext from ciphertext
Study of principles/methods of deciphering ciphertext without knowing key
Info used to cipher, known only sender and receiver
Algorithm for transforming plaintext to ciphertext
Recovering plaintext from ciphertext
Sender
Receiver
Sender and receiver
Everyone in the network
All the connected devices to the network
Sender
Receiver
Sender and receiver
Everyone in the network
All the connected devices to the network
RSA algorithm
Diffie-Hellman algorithm
DES algorithm
DSA algorithm
Transpositional ciphers
Substation cipher
All kinds of cipher
None of the mentioned
Block cipher
Stream cipher
Bit cipher
None of the mentioned
To increase the speed
To find some insecurity in a cryptographic scheme
To encrypt the data
None of the mentioned
Fixed size bit string
Variable size bit string
None of the mentioned
Both of the mentioned
Keys
Others
Multi Parties
Single Party
1 key
2 key
3 key
4 key
Interception
Interruption
Interpretation
Modification
A workstation or system that generates a random challenge string that the user enters when prompted along with the proper PIN (Personal Identification Number)
A workstation or system that generates a random ID that the user enters when prompted along with the proper PIN (Personal Identification Number)
A special hardware device that is used to generate random text in a cryptography system
The authentication mechanism in the workstation or system does not determine if the owner should be authenticated.
6
8
9
16
Encrypt the message with Alice’s public key and send Alice the message
Encrypt the message with Alice’s private key and send the encrypted message to Alice
Encrypt the message with his public key and send Alice the message
Encrypt the message with his private key and send the encrypted message to Alice
Bob applies a hash function to m and then encrypts the result with his public key
Bob applies a hash function to m and then encrypts the result with his private key
Bob applies a hash function to m and then encrypts the result with Alice’s public key
Bob encrypts m with his private key and then applies a hash function to the result
Applies Bob's public key to the digital signature, then a de-hashing function to the result. She then compares the results of this last operation with the message m
Applies a de-hashing function to the digital signature and compare the result to m
No correct answer
Applies Bob's public key to the digital signature, applies the hash function to m, and compares the results of the two operations
Network Adapter
Antivirus Software
Intrusion Detection System
Firewall
Identification and authorization
Identification and authentication
Authentication and authorization
Authentication and password
Asymmetric
Symmetric
RSA
Hash
Conditional access
Authentication
Identification
Anonymizer
Password
Two factor authentication
Security token
Authentication
The tickets are encrypted
The tickets are digitally signed
The tickets are used a token
The tickets are time stamped
The attackers catch our employee in the middle of them and start applying physical pressure on them
The attacker (man) hides inside (in the middle of) a crowd to sneak past the guards and cameras
The hacker jacks in a network and records all the information sent over the network
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.