ICS133 Finals

It is okay to have the message transfer agent (MTA) automatically delete all emails suspected of spam
True
False
Encryption protects information by presenting a:
Riddle
Puzzle
Bug
Key
Traditional applications generally follow the database model.
True
False
Encrypting an encryption key using a passphrase is called:
Key exchange
Key wrapping
asymmetric cryptography
modular inversing
When you visit a website with an "https" prefix in the address, the site is secure.
False
True
After encrypting a plaintext file it should actively erase the plaintext file's context and save the encryption
True
False
Volume encryption can provide strong protection, but, like all security measures, has residual risks. What are they?
data integrity
data nonrepudiation
untrustworthy encryption
encryption integrity
_____ email is the medium for distributing phishing attacks
Decryption is the process of reversing encryption
true
false
A email security problem that can be prevented from occurring is:
spam
an email virus
phishing
a connection-based attack
An attacker can modify a file without changing the file's hash value.
true
false
An encryption algorithm that uses the same key for both encryption and decryption is:
asymmetric
symmetric
ciphertext
none of the answers
Every valid public-key certificate contains a(n):
misleading syntax
stolen private key
digital signature
SSL certificate
Stores and retrieves data in a structured manner.
ROM
Database Management Software
Hard Disk Drive
MySQL
Although a Content Management System (CMS) is not vulnerable to the same attacks as any server or other software, it also never faces a vulnerability.
true
false
Client-side scripting poses special risks because the browser's chain of control passes to the instructions in the hard drive.
true
false
MIME formatting does not support rich emails, such as those that include boldface text, italics, bulleted lists, and graphics.
true
false
Chain emails often result in:
spread of a macro virus
excessive email traffic directed at a victim
recipients visiting a website that attacks their computer
all of the above
. A digital signature uses symmetric keys to sign or verify digital data.
true
false
key wrapping provides a simple, general-purpose approach for storing and protecting persistent key storage
true
false
a tweakable cipher includes a third input, a nonce-like value that modifies the encryption without the cost of changing the encryption key
true
false
A block cipher encrypts data in fixed-sized blocks.
true
false
Volume encryption risks include:
Untrustworthy encryption
theft leaves data unprotected
data copied to removable storage is unprotected
leaking the plaintext
Counter (CTR) mode, like OFB, generates a key stream and applies x or, to implement a stream cipher instead of using feedback, the counter mode encrypts successive values of a counter.
true
false
0
{"name":"ICS133 Finals", "url":"https://www.quiz-maker.com/QZBV2YA","txt":"It is okay to have the message transfer agent (MTA) automatically delete all emails suspected of spam, Encryption protects information by presenting a:, Traditional applications generally follow the database model.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker