ITN 262 MIDTERM REVIEW
QUESTIONS WITH ALL CORRECT
ANSWERS
An authentication system that requires the user to provide two different passwords and
a fingerprint scan is an example of: - Answer-two-factor authentication
Hashing: - Answer-transforms readable text into gibberish
An attack that blocks access to a system by other users is called: - Answer-denial of
service
An attack in which someone tries to trick a system administrator into divulging a
password is called: - Answer-social engineering
In a password system, the total number of possible passwords is called the: - Answer-
search space
Authentication does what: - Answer-Associates an individual with an identity
The most recent listed hash algorithm is what? - Answer-SHA-512
There are three types of tokens; they do not include which?
A. One-time password tokens
B. Challenge-response tokens
C. Passive tokens
D. Offensive tokens - Answer-D. Offensive tokens
The following risks are associated with a weak threat except.
A. Simple trial and error password guessing
B. All are risks associated with a weak threat
C. Shoulder surfing
, D. Searching for a written password - Answer-B. All are risks associated with a weak
threat
Hiding an object, such as a diary, to prevent others from finding it is an example of: -
Answer-Security through Obscurity
An algorithm is a type of ______________________. - Answer-procedure
An encryption algorithm that uses the same key for both encryption and decryption is: -
Answer-symmetric
To use symmetric cryptography, the sender and receiver must share: - Answer-a secret
key
The type of cipher that rearranges the text of a message is called: - Answer-
transposition
The Enigma was: - Answer-a rotor machine
Gilbert Vernam's bit combination operation for encrypting digital teletype transfer is now
referred as_______________________________. - Answer-XOR (Exclusive Or)
Which cipher replaces A with D and B with E? - Answer-Caesar Cipher
File encryption on the computer's hard drive involves what risk?
A. All of the Answers
B. Access by a Trojan Horse
C. Acess to low-level data written to the hard drive
D. Access by a separately booted OS - Answer-A. All of the Answers
Moore's Law observed that computing power for doubled every; - Answer-18 Months
Encryption protects information by presenting a - Answer-Key
AES was introduced in what year? - Answer-2002
When we share a key with two or more people we refer to that group as being the
____________. - Answer-Cryptonet
The following are common ways to handle new encryption keys except: - Answer-
transfer them via instant messenger
QUESTIONS WITH ALL CORRECT
ANSWERS
An authentication system that requires the user to provide two different passwords and
a fingerprint scan is an example of: - Answer-two-factor authentication
Hashing: - Answer-transforms readable text into gibberish
An attack that blocks access to a system by other users is called: - Answer-denial of
service
An attack in which someone tries to trick a system administrator into divulging a
password is called: - Answer-social engineering
In a password system, the total number of possible passwords is called the: - Answer-
search space
Authentication does what: - Answer-Associates an individual with an identity
The most recent listed hash algorithm is what? - Answer-SHA-512
There are three types of tokens; they do not include which?
A. One-time password tokens
B. Challenge-response tokens
C. Passive tokens
D. Offensive tokens - Answer-D. Offensive tokens
The following risks are associated with a weak threat except.
A. Simple trial and error password guessing
B. All are risks associated with a weak threat
C. Shoulder surfing
, D. Searching for a written password - Answer-B. All are risks associated with a weak
threat
Hiding an object, such as a diary, to prevent others from finding it is an example of: -
Answer-Security through Obscurity
An algorithm is a type of ______________________. - Answer-procedure
An encryption algorithm that uses the same key for both encryption and decryption is: -
Answer-symmetric
To use symmetric cryptography, the sender and receiver must share: - Answer-a secret
key
The type of cipher that rearranges the text of a message is called: - Answer-
transposition
The Enigma was: - Answer-a rotor machine
Gilbert Vernam's bit combination operation for encrypting digital teletype transfer is now
referred as_______________________________. - Answer-XOR (Exclusive Or)
Which cipher replaces A with D and B with E? - Answer-Caesar Cipher
File encryption on the computer's hard drive involves what risk?
A. All of the Answers
B. Access by a Trojan Horse
C. Acess to low-level data written to the hard drive
D. Access by a separately booted OS - Answer-A. All of the Answers
Moore's Law observed that computing power for doubled every; - Answer-18 Months
Encryption protects information by presenting a - Answer-Key
AES was introduced in what year? - Answer-2002
When we share a key with two or more people we refer to that group as being the
____________. - Answer-Cryptonet
The following are common ways to handle new encryption keys except: - Answer-
transfer them via instant messenger