What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?

What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?A . Man-in-the-middle attackB . Meet-in-the-middle attackC . Replay attackD . Traffic analysis...

September 29, 2023 No Comments READ MORE +

What is correct about digital signatures?

What is correct about digital signatures?A . A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.B . Digital signatures may be used in different documents of the same type.C...

September 29, 2023 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

September 29, 2023 No Comments READ MORE +

In the field of cryptanalysis, what is meant by a “rubber-hose” attack?

In the field of cryptanalysis, what is meant by a “rubber-hose” attack?A . Forcing the targeted keystream through a hardware-accelerated device such as an ASIC.B . A backdoor placed into a cryptographic algorithm by its creator.C . Extraction of cryptographic secrets through coercion or torture.D . Attempting to decrypt ciphertext...

September 29, 2023 No Comments READ MORE +

What may be the problem?

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

September 29, 2023 No Comments READ MORE +

Study the snort rule given below:

Study the snort rule given below: From the options below, choose the exploit against which this rule applies.A . WebDavB . SQL SlammerC . MS BlasterD . MyDoomView AnswerAnswer: C

September 29, 2023 No Comments READ MORE +

Which of the following is not a Bluetooth attack?

Which of the following is not a Bluetooth attack?A . BluedrivingB . BluesmackingC . BluejackingD . BluesnarfingView AnswerAnswer: A Explanation: https://github.com/verovaleros/bluedriving Bluedriving is a bluetooth wardriving utility. It can capture bluetooth devices, lookup their services, get GPS information and present everything in a nice web page. It can search for...

September 29, 2023 No Comments READ MORE +

“http: // www. MyPersonalBank. com/ account?

While using your bank’s online servicing you notice the following string in the URL bar: “http: // www. MyPersonalBank. com/ account?id=368940911028389&Damount=10980&Camount=21” You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflects the changes. Which type of vulnerability is...

September 29, 2023 No Comments READ MORE +

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?A . Residual riskB . Impact riskC . Deferred riskD . Inherent riskView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Residual_risk The residual risk is the risk or danger of an action or an event,...

September 29, 2023 No Comments READ MORE +

What should you do?

Your company performs penetration tests and security assessments for small and medium-sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking. What should you do?A . Confront the client in a respectful manner and ask her about...

September 29, 2023 No Comments READ MORE +