16 questions
This strategy for cracking a has attempts every possible code until a match is found.
brute force
dictionary
rainbow table
lookup table
This type of attack against a hash attempts the common words, phrases, and passwords in a language.
brute force
dictionary
rainbow table
lookup table
Digital signatures cannot be repudiated. What does this mean?
They can't be reused.
They can't be altered.
It can't be denied that they happened in the future.
It can be reliably trusted
These are the three steps to creating a document with a digital signature, in order.
1.The digest and private key are encrypted
2.Message and message digest are created
3.The message, encrypted digest, and public key are bundled together.
1.The message, encrypted digest, and public key are bundled together.
2.The digest and private key are encrypted
3.Message and message digest are created
1.Message and message digest are created
2.The digest and private key are encrypted
3.The message, encrypted digest, and public key are bundled together.
This is your first indicator that a site is using a digital certificate.
HTTPS in the URL
HTTP in the URL
A lock symbol in the browser security bar
No lock symbol in the browser security bar.
These are three validation rules for data base data. (Pick 3)
Size
Format
Check Digit
Value
Opinion
Which of the following is not one of the data integrity constraints for data bases.
Entity Integrity
Domain Integrity
Referential Integrity
User-Defined Integrity
Personal Integrity
This data base integrity constraint states that every table mush have a primary key and that columns that hold primary keys must be unique and not NULL.
Entity Integrity
Domain Integrity
Referential Integrity
User-Defined Integrity
Personal Integrity
Which of the following is NOT a strategy to ensure user input validation?
Input masks
Drop down menus
Mandatory inputs
Data ranges
Empty field requirement
What is symmetric encryption?
Encryption that uses a pair of keys to encrypt and decrypt messages when communicating
Encryption that is made up of exactly similar parts facing each other or around an axis
Encryption that uses one key that must be shared among the people receiving a message
Encryption that has parts which fail to correspond to one another in shape, size, or arrangement
Taking a secret message and reproducing the original plain text is known as?
Caesar Cipher
Encryption
Cipher Text
Decryption
Both e-signature and digital signature can satisfy the legal requirement of signature on a document.
True
False
A website has a digital certificate issued by a Certificate Authority (CA). The session key generated for the SSL session between a browser and the server hosting the website is encrypted using ___________ .
A) The CA’s public key.
B) The CA’s private key.
C) The public key that comes with the digital
certificate.
D) The CA’s public key.
In verifying that a digital certificate is from a Certificate Authority (CA), which of the following information is being compared?
A) CA’s public key.
B) CA’s private key.
C) Message digest of the digital certificate.
D) Public key on the digital certificate.
What does SSL stand for?
Secure Socket Layer
Special Security License
Secure Space Layer
Straight Socket Loop