Professional Documents
Culture Documents
ميدترم الوزاب
ميدترم الوزاب
a. Keylogger
c. Phishing
b. countermeasure
صواب
Crossover error rate (CER) refers to which of the following graphical intersections?
a. Phishing attack
The sensitivity adjustment on a biometric authentication device affects which of the following?
d. Trapdoors
d. hash function
صواب
c. Encrypted Virus
خطا
The original message or data that is fed into the algorithm is __________.
d. plaintext
____________ perform automated DoS (Denial of Service) attacks on a targeted web address.
a. DDoS-Trojan
__________ is a procedure that allows communicating parties to verify that received or stored
messages are authentic.
c. Message authentication
Once activated __________ can enable ____________to spy on the victim, steal their sensitive
information & gain backdoor access to the system.
c. trojans, cyber-criminals
b. self-replicate
Infected computers and other systems within the botnet are called __________
c. zombies
a. decryption algorithm
b. availability
_________also known as a user-interface (UI) redress attack is a vulnerability used by an attacker to collect
an infected user’s clicks.
b. Clickjacking
d. Trigger
صواب
Also referred to as single-key encryption, the universal technique for providing confidentiality for
transmitted or stored data is __________ .
a. symmetric encryption
The more critical a component or service, the higher the level of availability
required.
صواب