Attackers need a certain amount of information before


Question 1. Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the target. The process of going through a target's trash is known in the community as _____.

  • trash rummaging
  • garbage surfing
  • piggy diving
  • dumpster diving

Question 2. The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called _____.

  • steganography
  • cryptanalysis
  • cryptography
  • key management

Question 3. The cipher that replaces each letter of the alphabet with a different letter (not in sequence) is a _____.

  • shift cipher
  • substitution cipher
  • transposition cipher
  • Vigenère cipher

Question 4. Keyspace refers to _____.

  • the location where keys are stored
  • the number of keys needed to encrypt or decrypt a message
  • all the possible key values
  • the portion of the algorithm that the key connects with to encrypt or decrypt a message

Question 5. Which of the following is not a hashing algorithm?

  • SHA1
  • MD2
  • SHA3
  • MD5

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Attackers need a certain amount of information before
Reference No:- TGS01235516

Now Priced at $10 (50% Discount)

Recommended (94%)

Rated (4.6/5)