Information Security MCQs and Notes
P
Q 11. This type of intrusion relies on the intruder's ability to trick people into breaking normal security procedures.
R
Q 12. An intruder might install this on a networked computer to collect user ids and passwords from other machines on the network.
R
Q 13. This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
S
Q 14. This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa.
V
Q 15. In password protection, this is a random string of data used to modify a password hash.
A
Q 16. This is the inclusion of a secret message in otherwise unencrypted text or images.
P
Q 17. This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.
P
Q 18. Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations.
A
Q 19. This is the name for the issuer of a PKI certificate.
R