Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
половина база.docx
Скачиваний:
1
Добавлен:
01.05.2025
Размер:
40.17 Кб
Скачать

59. A function that is easily computed, and the calculation of its inverse is infeasible unless certain privileged information is known.

A. Trojan Horse

B. Logical Bomb

C. Trapdoor one-way function

D. Virus

E. Worm

60. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.

A. Symmetric encryption

B. Asymmetric encryption

C. One key encryption

D. Same key encryption

E. Private key encryption

61. What is Hacking?

A. Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use for malicious, unwanted purposes.

B. Hacking is basically hacking with a telephone. Using different “boxes” and “tricks” to manipulate the phone companies and their phones, you gain many things.

C. A cryptographic technique that seeks to make the relationship between the statistics of the ciphertext and the value of the encryption key as complex as possible.

D. A decoy system designed to lure a potential attacker away from critical systems. A form of intrusion detection.

E. An individual who gains, or attempts to gain, unauthorized access to a computer system or to gain unauthorized privileges on that system.

62. What is Cracking?

A. Cracking is almost the same as hacking.

B. A cracker destroys the information that they get into.

C. Cracking get into people servers and accounts illegally.

D. A cracker destroys the software that they get into.

E. All of the statements

63. What is Phreaking?

A. Phreaking refers to an array of activities which are done to intrude some one else’s personal information space so as to use for malicious, unwanted purposes.

B. Phreaking is basically hacking with a telephone. Using different “boxes” and “tricks” to manipulate the phone companies and their phones, you gain many things.

C. A cryptographic technique that seeks to make the relationship between the statistics of the ciphertext and the value of the encryption key as complex as possible.

D. A decoy system designed to lure a potential attacker away from critical systems. A form of intrusion detection.

E. An individual who gains, or attempts to gain, unauthorized access to a computer system or to gain unauthorized privileges on that system.

64. A ____________ is someone who breaks into the telephone network illegally manipulating various audio frequencies associated with the tones, typically to make free long-distance phone calls.

A. Phreak

B. Hacker

C. Cracker

D. Intruder

E. Kerberos

65. How can we protect the system?

A. Never patch security hole

B. Encrypt important data

C. Include unused setujd/setgid programs

D. Setup firewall

E. Setup IDS

66. What should do after hacked?

A. Shutdown the system

B. Separate the system from network

C. Restore the system with the backup

D. Reinstall all programs

E. All of the statements

67. Which one of the following statements is not the mode of Hacker attack?

A. Locally

B. Offline

C. Theft

D. Deception

E. None of the statements

68. _____________ - an attacker alters his identity so that someone thinks he is someone else

A. Spoofing

B. DDos Attack

C. Permutation scanning

D. Central source propagation

E. Threat modelling

69. Which of the following statements are types of Spoofing?

A. IP Spoofing

B. Email Spoofing

C. Web Spoofing

D. Application Spoofing

E. DDos Spoofing

70. Which of the following statements is the definition of IP Spoofing – Flying-Blind Attack?

A. Attacker uses IP address of another computer to acquire information or gain access.

B. Attacker spoofs the IP address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies.

C. Attacker sends messages masquerading as someone else.

D. Web Site maintains authentication so that the user does not have to authenticate repeatedly

E. Process of taking over an existing active session.