Ethical Hacking Chapter 7 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data?

ciphertext-only

Which of the following is the process of converting ciphertext back into plaintext?

decryption

Which of the following is a computer placed on the network perimeter with the main goal of distracting hackers from attacking legitimate network resources?

honeypot

What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms?

known plaintext

AES uses a 128-bit key and is used in PGP encryption software.

False

What type of IDS/IPS is used to protect a critical network server or database server by installing the IDS or IPS software on the system you're attempting to protect?

Host-based

Which type of device monitors a network's hardware so that security administrators can identify attacks in progress and stop them?

IDS

What type of IDSs/IPSs monitors activity on network segments by sniffing traffic as it flows over the network and alerting a security administrator when something suspicious occurs?

Network-based

What type of packet filtering records session-specific information about a network connection, including the ports a client uses?

Stateful

What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt?

chosen-plaintext


Set pelajaran terkait

(PA Regulations) Law Supplement Practice Exam

View Set

the art of public speaking chapter 8 Part 2, public speaking chapter 8

View Set

Health Assessment Prep U: Chapter 18-Assessing Mouth Throat Nose and Sinuses

View Set

Lesson 1 - Filing a Tax Return *

View Set