2602
Which term is used to describe individuals who want to attack computers yet lack the knowledge
of computers and networks needed to do so? - ANSScript Kiddies
Which term below is frequently used to describe the tasks of securing information that is in a
digital format? - ANSInformation Security
What position is considered an entry-level position for a person who has the necessary
technical skills? - ANSSecurity Technician
Which of the three protections ensures that only authorized parties can view information? -
ANSConfidentiality
What type of undocumented yet benign hidden feature launches after a special set of
commands, key combinations, or mouse clicks? - ANSEaster Egg
What is a malicious computer code that reproduces itself on the same computer? - ANSVirus
Name the method for classifying the various instances of malware by using the primary trait that
the malware possesses? - ANSSource
Which type of phishing attack targets specific users? - ANSSpear Phishing
T/F - One of the functions of a digital signature is to protect the public key - ANSFalse
Know that ELLIPTIC CURVE cryptography and DIGITAL SIGNATURE ALGORITHMS are
common asymmetric cryptographic algorithms - ANSElliptic Curve
Digital Signature Algorithm
When bob needs to send Alice a message with a digital signature, whose private key is used to
encrypt the hash? - ANSBob's private key
What type of cryptography uses the two keys instead of just one, generating both a private and
public key? - ANSAsymmetric
Which of the following is an input value that must be unique within some specified scope, such
as for a given period or an entire session? - ANSNonce