100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 262 EXAM 1 QUESTIONS AND CORRECT ANSWERS NEW UPDATE $12.49   Add to cart

Exam (elaborations)

ITN 262 EXAM 1 QUESTIONS AND CORRECT ANSWERS NEW UPDATE

 5 views  0 purchase
  • Course
  • ITN 262
  • Institution
  • ITN 262

ITN 262 EXAM 1 QUESTIONS AND CORRECT ANSWERS NEW UPDATE What is Denial of Service? - Answer- Denial of service is an attack that blocks access to a system by other users. What is Social Engineering? - Answer- Social engineering is an attack in which someone tries to trick a system administra...

[Show more]

Preview 1 out of 4  pages

  • October 10, 2024
  • 4
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 262
  • ITN 262
avatar-seller
Scholarsstudyguide
ITN 262 EXAM 1 QUESTIONS AND
CORRECT ANSWERS NEW
UPDATE

What is Denial of Service? - Answer- Denial of service is an attack that blocks access to
a system by other users.

What is Social Engineering? - Answer- Social engineering is an attack in which
someone tries to trick a system administrator into divulging a password.

In a password system, the total number of possible passwords is called the - Answer-
SEARCH SPACE.

What is Authentication? - Answer- Authentication associates an individual with an
identity.

What is the most recent listed hash algorithm? - Answer- SHA-512

What are the three types of tokens? - Answer- • One-time password tokens • Challenge-
response tokens • Passive tokens

Which risks are associated with a weak threat? - Answer- • Simple trial and error
password guessing • Shoulder surfing • Searching for a written password

What is Security through Obscurity? - Answer- Security through obscurity is hiding an
object to prevent others from finding it.

An algorithm is a type of - Answer- PROCEDURE.

What is symmetric encryption? - Answer- Symmetric encryption is an encryption
algorithm that uses the same key for both encryption and decryption.

What is a transposition cipher? - Answer- A transposition cipher rearranges the text of a
message.

Explain symmetric cryptography. - Answer- To use symmetric cryptography, the sender
and the receiver must share a secret key.

What is Enigma? - Answer- Enigma was a rotor machine used in WWII to encrypt
messages.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart