SEC 280 - Quiz - Week - 4A+
- From Business, Accounting
- NUMBER1TUTOR
- Rating : 88
- Grade : A+
- Questions : 0
- Solutions : 0
- Blog : 3
- Earned : $14856.59
Question 1.
Question :
(TCO 4) Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the target. The process of going through a target's trash is known in the community as _____.
Student Answer:
trash rummaging
garbage surfing
piggy diving
dumpster diving
Instructor Explanation:
Page 74
Points Received:
3 of 3
Comments:
Question 2.
Question :
(TCO 4) The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called _____.
Student Answer:
steganography
cryptanalysis
cryptography
key management
Instructor Explanation:
Page 82
Points Received:
3 of 3
Comments:
Question 3.
Question :
(TCO 4) The cipher that replaces each letter of the alphabet with a different letter (not in sequence) is a _____.
Student Answer:
shift cipher
substitution cipher
transposition cipher
Vigenère cipher
Instructor Explanation:
Pages 84-85
Points Received:
3 of 3
Comments:
Question 4.
Question :
(TCO 4) Keyspace refers to _____.
Student Answer:
the location where keys are stored
the number of keys needed to encrypt or decrypt a message
all the possible key values
the portion of the algorithm that the key connects with to encrypt or decrypt a message
Instructor Explanation:
Page 86
Points Received:
3 of 3
Comments:
Question 5.
Question :
(TCO 4) Which of the following is not a hashing algorithm?
Student Answer:
SHA1
MD2
SHA3
MD5
Instructor Explanation:
Pages 88-91