Related Questions
Home My Library
Discovery
1. Whichofthefollowingtermswouldbestmatchthisdefinition:Transformsamessageordatafileinsuchawaythat its contents are hidden from unauthorized readers. a. authentication b. encryption c. ciphertext d. decryption ANSWER: b 2. Anoriginalmessageorfilethathasnotyetbeenencryptedisreferredtoasciphertext. a. True b. False ANSWER: False 3. Acryptographic________isaword,number,orphrasethatmustbeknowntoencryptordecryptdata. ANSWER: key 4. Therearevariousencryptionmethods,but__________istheencryptionstandardcurrentlyusedworldwide. a. AES b. DDoS c. IMSI d. TLS ANSWER: a 5. Acryptographic__________isaprocedureforencryptionordecryption. a. firewall b. ciphertext c. key d. algorithm ANSWER: d 6. Whichofthefollowingisnotanexampleofanauthenticationprotocol? a. password b. PINs c. fingerprintscanner d. alloftheabove ANSWER: d CengageLearningTesting,Powered byCogneroPage1 Name: Class: Date: Unit 07 Digital Security What software shields certain applications against behaviors commonly exhibited by intrusions?Anti-exploit software shields certain applications against behaviors commonly exhibited by intrusions. A(n) port scan pings a packet of data to a port in order to see if that port is open or not. A network utility called Netstat produces a detailed list of open ports on a device.
What is the best defense against malware infection?Here's a seven-step plan.. Only Use Trusted Antivirus and Malware Software.. Configure Regular Scans and Monitor Settings.. Always Update Your Operating System.. Rely Only On Secure Networks (Encrypted). Employ Browser Common Sense.. Keep a Tight Grip on Your Personal Information.. Stay Up-to-Date on the Latest Attacks.. Which software is designed to detect prevent and remove malicious?Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer. Once installed, most antivirus software runs automatically in the background to provide real-time protection against virus attacks.
What is software that is intended to damage or disable?Software designed to destroy, damage, disable, or gain unauthorized access to any computer system, software, or electronic data. Malware is an abbreviation of the term malicious software and is also known as malicious code.
|