In SSL/TLS, a ________ is a specific set of security methods and options.
An electronic signature provides ________ and ________.
An electronic signature provides ________ and ________.
A hacker is able to install a keylogger on a user’s computer…
A hacker is able to install a keylogger on a user’s computer. What is the hacker attempting to do in this situation?
Encryption for confidentiality was the original purpose of c…
Encryption for confidentiality was the original purpose of cryptography.
________ ciphers leave letters in their original positions.
________ ciphers leave letters in their original positions.
In pretexting, an attacker calls claiming to be a certain pe…
In pretexting, an attacker calls claiming to be a certain person in order to ask for private information about that person.
The following is an example of what type of vulnerability? A…
The following is an example of what type of vulnerability? An application uses untrusted data in the construction of the following vulnerable SQL call: String query = “SELECT * FROM accounts WHERE custID='” + request.getParameter(“id”) + “’”;
Public key encryption is ________.
Public key encryption is ________.
In a _________________ attack, the attacker disrupts servic…
In a _________________ attack, the attacker disrupts services by taking down hosts.
You have been performing a vulnerability test on your system…
You have been performing a vulnerability test on your system. Those who are conducting the testing have knowledge about the system that they are running their tests on. What type of testing is being used?