100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 260 MIDTERM EXAM QUESTIONS AND ANSWERS GRADED A+ $12.99   Add to cart

Exam (elaborations)

ITN 260 MIDTERM EXAM QUESTIONS AND ANSWERS GRADED A+

 7 views  0 purchase
  • Course
  • ITN 260
  • Institution
  • ITN 260

ITN 260 MIDTERM EXAM QUESTIONS AND ANSWERS GRADED A+ A watering hole attack is directed against which of the following? - Answer- a smaller group of specific users Hedda pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attac...

[Show more]

Preview 2 out of 9  pages

  • October 10, 2024
  • 9
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 260
  • ITN 260
avatar-seller
Scholarsstudyguide
ITN 260 MIDTERM EXAM
QUESTIONS AND
ANSWERS GRADED A+
A watering hole attack is directed against which of the following? - Answer- a smaller
group of specific users

Hedda pretends to be the help desk manager and calls Steve to trick him into giving her
his password. What social engineering attack has Hedda performed - Answer-
impersonation

Which areas of a file cannot be used by steganography to hide data? - Answer- in the
directory structure of the file system

Proving that a user sent an email message is known as _____. - Answer- non-
repudiation

Illya was asked to recommend the most secure asymmetric cryptographic algorithm to
his supervisor. Which of the following did he choose - Answer- RSA

What is a characteristic of the Trusted Platform Module (TPM)? - Answer- It provides
cryptographic services in hardware instead of software

Which of the following key exchanges uses the same keys each time? - Answer- Diffie-
Hellman (DH)

Public key systems that generate random public keys that are different for each session
are called _____. - Answer- perfect forward secrecy

If Bob wants to send a secure message to Alice using an asymmetric cryptographic
algorithm, which key does he use to encrypt the message? - Answer- Alice's public key

Abram was asked to explain to one of his coworkers the XOR cipher. He showed his
coworker an example of adding two bits, 1 and 1. What is the result of this sum? -
Answer- 0

, At a staff meeting one of the technicians suggested that the enterprise protect its new
web server by hiding it and not telling anyone where it is located. Iosif raised his hand
and said that security through obscurity was a poor idea. Why did he say that? -
Answer- It would be essentially impossible to keep its location a secret from everyone.

Which of these is NOT a characteristic of a secure hash algorithm - Answer- Collisions
should be rare.

Alyosha was explaining to a friend the importance of protecting a cryptographic key
from cryptoanalysis. He said that the key should not relate in a simple way to the cipher
text. Which protection is Alyosha describing? - Answer- confusion

What is the latest version of the Secure Hash Algorithm? - Answer- SHA-3

Which of these is the strongest symmetric cryptographic algorithm? - Answer-
Advanced Encryption Standard

The Hashed Message Authentication Code (HMAC) _____. - Answer- hashes the key
and the message

Which of these has an onboard key generator and key storage facility, as well as
accelerated symmetric and asymmetric encryption, and can back up sensitive material
in encrypted form? - Answer- Hardware Security Module (HSM)

Which of these is NOT a basic security protection for information that cryptography can
provide? - Answer- risk loss

Egor wanted to use a digital signature. Which of the following benefits will the digital
signature not provide? - Answer- verify the receiver

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
- Answer- plaintext

A(n) _____ is not decrypted but is only used for comparison purposes. - Answer- digest

Alexei was given a key to a substitution cipher. The key showed that the entire alphabet
was rotated 13 steps. What type of cipher is this? - Answer- ROT13

A digital certificate associates _____ - Answer- the user's identity with his public key

Which statement is NOT true regarding hierarchical trust models? - Answer- It is
designed for use on a large scale.

What is a value that can be used to ensure that hashed plaintext will not consistently
result in the same digest - Answer- salt

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart