Ethical Hacking Chapter 7 Quiz
In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data?
ciphertext-only
Which of the following is the process of converting ciphertext back into plaintext?
decryption
Which of the following is a computer placed on the network perimeter with the main goal of distracting hackers from attacking legitimate network resources?
honeypot
What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms?
known plaintext
AES uses a 128-bit key and is used in PGP encryption software.
False
What type of IDS/IPS is used to protect a critical network server or database server by installing the IDS or IPS software on the system you're attempting to protect?
Host-based
Which type of device monitors a network's hardware so that security administrators can identify attacks in progress and stop them?
IDS
What type of IDSs/IPSs monitors activity on network segments by sniffing traffic as it flows over the network and alerting a security administrator when something suspicious occurs?
Network-based
What type of packet filtering records session-specific information about a network connection, including the ports a client uses?
Stateful
What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt?
chosen-plaintext