Man-in-the-middle attack
A) Mandatory access control b) Intrusion detection system c) Meet-in-the-middle attack d) None of the statements a) Mandatory access control b) Intrusion detection system c) Meet-in-the-middle attack d) None of the statements Mandatory access control
Intrusion detection system
Meet-in-the-middle attack
None of the statements
Password attack
Brute force attack
Word list attack
Dictionary attack
Keystroke attack
Password attack
Word list attack
Keystroke attack
Dictionary attack
Brute force attack
RC4 does not need padding
Depends on the size of the block
4
8
6
Digital Cipher Standard
Digital Encryption Standard
Data Encryption Standard
Digital Cryptography Standard
Data Cryptography Standard
Providing an entity with the legal right to use or transfer a resource to others
Concealing the identity of an entity involved in some process
Acknowledgement that services have been provided
Retraction of certification or authorisation
Preventing the denial of previous commitments or actions
Floor
Scheme
Round
Ceil
Iteration
Providing an entity with the legal right to use or transfer a resource to others
Verifying the creation or existence of information by an entity other than the creator
Acknowledgement that services have been provided
Acknowledgement that information has been received
Concealing the identity of an entity involved in some process
The key to encrypt is different from the key to decrypt
The key to encrypt is the same with the key to decrypt
The algorithm to encrypt is the same with the algorithm to decrypt
None of the listed answers
The algorithm to encrypt is different from the algorithm to decrypt
Plaintext
Ciphertext
Cleartext
Originaltext
Messagetext
AES
RC4
DES
Feistel Cipher
A5/1
Retraction of certification or authorisation
Concealing the identity of an entity involved in some process
Preventing the denial of previous commitments or actions
Providing an entity with the legal right to use or transfer a resource to others
Acknowledgement that services have been provided
25
26
26!
625
25!
All of the statements
If two messages encrypted with the same “one-time” pad key the probability of leaking the key is high
If two messages encrypted with the same “one-time” pad key and when two different ciphertexts XORed with each other the key disappears
If two messages encrypted with the same “one-time” pad key and when two different ciphertexts XORed with each other the plaintext disappears
Two messages encrypted with the same “one-time” pad key the produced ciphertext always will be the same
Exploits
Flooders
Kit (virus generator)
Auto-rooter
Downloaders
OTP is highly secure algorithm
Pad must be securely transmitted to the recipient before the ciphertext can be decrypted.
A pad (key) consisting of a randomly selected string of bits that is the same length as the message.
The pad (key) is the same length as the message
Or modern high data-rate systems, a one-time pad cipher is totally impractical
Zombie
Trojan horse
Spammer
Keylogger
Rootkit
Kit (virus generator)
Exploits
Downloaders
Flooders
Auto-rooter
Virus
Trapdoor
Firewall
Cache
Worm
Plaintext
Public key
Password
Secret key
Private key
Any password the brute force attack tries, the dictionary attack also tries
The dictionary attack tries fewer passwords than does the brute force attack
The dictionary attack is faster than the brute force attack
The brute-force attack tries many additional passwords that the dictionary attack does not
A hacker probably start with a dictionary attack and if that fails, move on to a modified brute force attack
Trap door
Logic Bombs
Zombie
Worm
Trojan Horses
If one of the trustees leaves the company, the secret is still safe, and there’s no need to restart the key recovery process from the beginning
If one trustee leaves the company, his or her share becomes invalid
No one person can recover keys; it takes a group acting together
If one of the trustees is unavailable, it’s still possible to perform the operation
The threshold scheme has many advantages over other key recovery programs
Avoid using personal information
Avoid using actual words
Memorise it
Do not write it down
Store the password in a safe place