Search Header Logo

Security Technology Part 2

Authored by EDRIAN ARANDIA

Computers

University

Used 2+ times

Security Technology Part 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In this type of attack, the victim perceives encrypted communication as occurring normally. However, in reality, the attacker receives each encrypted message, decodes it, encrypts it again, and sends it to the originally intended recipient.

Man in the middle attack

Dictionary attack

Brute-force attack

Cyberbridge attack

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

These attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of unknown keys and ciphertext.

Man in the middle attacks

Correlation attacks

Session hijacking attacks

Replay attacks

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Brute Force attacks are usually limited to passwords of a reasonable length

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements about HTTPS (Hypertext Transfer Protocol Secure) is true?

HTTPS encrypts data in transit between a user's browser and the web server, providing a secure connection.

HTTPS is primarily used for caching web content to improve website performance

HTTPS stands for Hypertext Transfer Protocol Standard, a basic protocol for web communication

HTTPS only encrypts data when it is being transmitted over public Wi-Fi networks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes steganography?

Steganography is a cryptographic technique that involves changing the order of characters in a message to conceal its meaning

Steganography is the practice of hiding secret information within an ordinary, non-secret file or message.

Steganography is a method of authentication used to verify the integrity of transmitted data.

Steganography is a type of malware designed to steal sensitive information from computer systems.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technology is specifically designed to secure web transactions by providing protection from electronic payment fraud?

HTTPS (Hypertext Transfer Protocol Secure)

SET (Secure Electronic Transactions)

SSH (Secure Shell)

VPN (Virtual Private Network)

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following is an IDS capable of?

Alerting

Taking Action

Detecting

Blocking

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?