.false Ans✓✓✓ True or False? A script kiddy is sharing with someone who visits
our living or working space, getting physical access to the computer.
1 select file to encrypt
2 erase plaintext
3 program encrypts the file and saves the encrypted copy
4. Provide the key to the encrypted file Ans✓✓✓ What are the steps for using an
encryption program?
11110 Ans✓✓✓ If we combine "10101" with "01011" using Exclusive Or, which
result do we get?
d) 100001
c) 00001
a) 11110
b) 100000
18 months Ans✓✓✓ Moore's Law observed that computing power doubled
every:
c) 24 months.
a) 12 months.
,b) 18 months.
d) None of these is correct.
1975 Ans✓✓✓ DES was unveiled in what year?
d) 1965
c) 1875
b) 1975
a) 1935
1990s Ans✓✓✓ Cyber vulnerabilities became a public issue in the __________ as
new internet users struggled to understand the technology's risks.
a) 1970s
d) 2000s
c) 1980s
b) 1990s
,2002 Ans✓✓✓ AES was introduced in what year?
3% Ans✓✓✓ Typical retail businesses expect a _____ rate of loss due to theft,
damages, and other causes.
c) 0 percent
d) 3 percent
b) 7 percent
a) 15 percent
4 Ans✓✓✓ Section 7.3 notes that in 1997, using DESCHALL, a desktop computer
could crack 1 million keys per second. If we apply Moore's Law to estimate the
improvement in cracking speed, how many million keys per second could we
crack 6 years later?
c) 5
a) 3
b) 4
d) 6
, A message after its contents are hidden using a code or cipher Ans✓✓✓ What is
ciphertext?
A message before it's contents are hidden using a code or cipher Ans✓✓✓ What
is plaintext?
A threat agent and an attack the agent can perform Ans✓✓✓ Which of the
following produces a risk to an asset?
b) A threat and a vulnerability
a) A threat agent and an attack the agent can perform
d) A threat agent and a script kiddy
c) A vulnerability and an attack that implements that vulnerability
a) An activity may look normal when it occurs and abnormal when analyzed in
context with other activities
c) Normal activities help track side effects of abnormal activities Ans✓✓✓ Why
do event logs record both normal and abnormal activities? Select all that apply.
b) Normal activities are so rarely logged that they do not add enough overhead to
justify removing them.
a) An activity may look normal when it occurs and abnormal when analyzed in
context with other activities
c) Normal activities help track side effects of abnormal activities