Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so? correct answers
... [Show More] Script Kiddies
Which term below is frequently used to describe the tasks of securing information that is in a digital format? correct answers Information Security
What position is considered an entry-level position for a person who has the necessary technical skills? correct answers Security Technician
Which of the three protections ensures that only authorized parties can view information? correct answers Confidentiality
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks? correct answers Easter Egg
What is a malicious computer code that reproduces itself on the same computer? correct answers Virus
Name the method for classifying the various instances of malware by using the primary trait that the malware possesses? correct answers Source
Which type of phishing attack targets specific users? correct answers Spear Phishing
T/F - One of the functions of a digital signature is to protect the public key correct answers False
Know that ELLIPTIC CURVE cryptography and DIGITAL SIGNATURE ALGORITHMS are common asymmetric cryptographic algorithms correct answers Elliptic Curve
Digital Signature Algorithm
When bob needs to send Alice a message with a digital signature, whose private key is used to encrypt the hash? correct answers Bob's private key
What type of cryptography uses the two keys instead of just one, generating both a private and public key? correct answers Asymmetric
Which of the following is an input value that must be unique within some specified scope, such as for a given period or an entire session? correct answers Nonce
A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as? correct answers Certificate Practice Statement (CPS) [Show Less]