100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C840 Test Flash Cards all Questions & answers solved accurately with Complete Solution Graded A+ latest version $12.99   Add to cart

Exam (elaborations)

WGU C840 Test Flash Cards all Questions & answers solved accurately with Complete Solution Graded A+ latest version

 2 views  0 purchase
  • Course
  • Institution

WGU C840 Test Flash Cards all Questions & answers solved accurately with Complete Solution Graded A+ latest version

Preview 4 out of 37  pages

  • July 6, 2024
  • 37
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
C840 Flash Cards / WGU C840 Test


Rainbow tables - ANSWER-IEssentially, these types of password crackers work
with precalculated hashes of all passwords available within a certain character
space, be that a-z or a-zA-z or a-zA-Z0-9, etc. These files are called rainbow
tables because they contain every letter combination "under the rainbow." They
are particularly useful when trying to crack hashes

Caesar cipher - ANSWER-The method of cryptography in which someone
chooses a number by which to shift each letter of a text in the alphabet and
substitute the new letter for the letter being encrypted. For example, if your text is
"A CAT," and you choose to shift by two letters, your encrypted text is "C ECV."
This is also known as the monoalphabet, single-alphabet, or substitution cipher.

DiskDigger - ANSWER-Used to recover deleted files from Windows computers.
The free version only allows you to recover one file at a time.

The Communication Assistance to Law Enforcement Act - ANSWER-The
Communication Assistance to Law Enforcement Act (CALEA), not to be confused
with the law enforcement standards certification of the same name, is a U.S.
wiretapping law passed in 1994.

Transend Migrator Tool - ANSWER-There are tools that allow you to convert from
one e-mail file format to another. For example, the accused's e-mail file could be
an EML file, but you use Outlook. It would be helpful to translate that file into an
Outlook .pst format. Transend Migrator is a tool that will do this for you.

clean room - ANSWER-A clean room is an environment that has a controlled
level of contamination, such as from dust, microbes, and other particles.

The cluster bitmap file - ANSWER-is a map of all the clusters on the hard drive.
This is an array of bit entries where each bit indicates whether its corresponding
cluster is allocated/used or free/unused.

,Diffie-Hellman - ANSWER-The Diffie-Hellman algorithm is a cryptographic
protocol that allows two parties to establish a shared key over an insecure
channel. In other words, Diffie-Hellman is often used to allow parties to exchange
a symmetric key through some insecure medium, such as the Internet.
Diffie-Hellman enabled all secure communications between parties that did not
have a preestablished relationship, such as e-commerce, and facilitated
communications even between parties with a preestablished relationship, such
as e-banking.

MP3Stego - ANSWER-Is used to hide data in MP3 files. It takes the information
(usually text) and combines it with a sound file to create a new sound file that
contains the hidden information.

There are ____ ways of hiding and scrambling information - ANSWER-Two

MP3Stego - ANSWER-Hides payload in MP3 files

Snow - ANSWER-Hides data in white space

Payload - ANSWER-is the information to be covertly communicated. In other
words, it is the message you want to hide.

The carrier or carrier file - ANSWER-is the signal, stream, or file in which the
payload is hidden.

The channel is the type of medium used. - ANSWER-This may be a passive
channel, such as photos, video, or sound files, or even an active channel, such
as a Voice over IP (VoIP) voice call or streaming video connection.

A dead drop - ANSWER-Is a location where one person drops off an item, and
then a second person picks it up

Steganophony - ANSWER-is a term for hiding messages in sound files.

How does Steganophony hide messages in sound files? - ANSWER-This can be
done with the LSB method. However, another method to use with steganophony
is the echo method. This method adds extra sound to an echo inside an audio

,file. It is that extra sound that contains information. Steganophony can be used
with static files, such as MP3 files, but can also be used dynamically with VoIP
and similar multimedia technologies, also utilizing the LSB method and
imperceptibly changing the sound being transmitted.

Steganography how to learn it - ANSWER-Invisible Secrets is a free tool to hide
or extract hidden file.

Steganalysis Tools (Free Tools) - ANSWER-Steg Secret and StegSpy has fewer
limitations than StegDetect

Steganalysis Tools - ANSWER-Forensic Toolkit (FTK) and EnCase both check
for steganography, and FTK has an entire image detection engine devoted to this
task.

Steganalysis Methods - ANSWER-There are several methods for analyzing an
image to detect hidden messages. The raw quick pair method is one. It is based
on statistics of the numbers of unique colors and close-color pairs in a 24-bit
image.

Another option uses the chi-square method from statistics. Chi-square analysis
calculates the average LSB and builds a table of frequencies and a second table
with pairs of values.

Steganalysis - ANSWER-is the process of analyzing a file or files for hidden
content. It is a difficult task. At best, it can show a likelihood that a given file has
additional information hidden in it. A common method for detecting LSB
steganography is to examine close-color pairs. Close-color pairs consist of two
colors whose binary values differ only in the LSB. If this is seen too frequently in
a given file, it can indicate that steganographically hidden messages may be
present.

Video Steganography - ANSWER-Information can also be hidden in video files, a
practice called video steganography. There are various ways to do this, including
the LSB method. Whatever method is used, it is important to realize that video
files are obviously larger than other file types. This provides a great deal of
opportunity for hiding information.

, Stealth Files 4 - ANSWER-Works with sound files, video files, and image files;

Invisible Secrets - ANSWER-Will hide information within an image for you; Is
much more robust, with both a free and a commercial version

QuickStego: - ANSWER-will hide information within an image for you, it is very
easy to use but is very limited.

The most common method today is to hide messages in pictures -
ANSWER-This is done using the least significant bit (LSB) method (when the last
bit or least significant bit is used to store data).

Steganography is the art and science of - ANSWER-writing hidden messages

Question :_________ information is clearly scrambled, and not hidden -
ANSWER-Encrypted

There are _____ methods of ___________, which is a term for hiding messages
in sound files. The two methods are LSB and echo. - ANSWER-Two, Stegaphony

There are ________ methods for analyzing an image to detect hidden
messages. - ANSWER-Several

The Advanced Encryption Standard (AES) - ANSWER-is also known as the
Rijndael block cipher. It was officially designated as a replacement for DES in
2001 after a five-year process involving 15 competing algorithms. AES is
designated as Federal Information Processing Standard 197 (FIPS 197).

RSA - ANSWER-his algorithm was publicly described in 1977 by Ron Rivest, Adi
Shamir, and Leonard Adleman at MIT. The letters RSA are the initials of their
surnames. RSA is perhaps the most widely used public key cryptography
algorithm in existence today.It is based on some interesting relationships of prime
numbers. The security of RSA derives from the fact that it is difficult to factor a
large integer composed of two or more large prime factors.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TUTORSON. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78140 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart