
Security Technology Part 2
Authored by EDRIAN ARANDIA
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In this type of attack, the victim perceives encrypted communication as occurring normally. However, in reality, the attacker receives each encrypted message, decodes it, encrypts it again, and sends it to the originally intended recipient.
Man in the middle attack
Dictionary attack
Brute-force attack
Cyberbridge attack
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
These attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of unknown keys and ciphertext.
Man in the middle attacks
Correlation attacks
Session hijacking attacks
Replay attacks
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Brute Force attacks are usually limited to passwords of a reasonable length
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements about HTTPS (Hypertext Transfer Protocol Secure) is true?
HTTPS encrypts data in transit between a user's browser and the web server, providing a secure connection.
HTTPS is primarily used for caching web content to improve website performance
HTTPS stands for Hypertext Transfer Protocol Standard, a basic protocol for web communication
HTTPS only encrypts data when it is being transmitted over public Wi-Fi networks
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes steganography?
Steganography is a cryptographic technique that involves changing the order of characters in a message to conceal its meaning
Steganography is the practice of hiding secret information within an ordinary, non-secret file or message.
Steganography is a method of authentication used to verify the integrity of transmitted data.
Steganography is a type of malware designed to steal sensitive information from computer systems.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which technology is specifically designed to secure web transactions by providing protection from electronic payment fraud?
HTTPS (Hypertext Transfer Protocol Secure)
SET (Secure Electronic Transactions)
SSH (Secure Shell)
VPN (Virtual Private Network)
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following is an IDS capable of?
Alerting
Taking Action
Detecting
Blocking
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?