Chapter 30 Flashcards

0
Q

Brute force attack

A

A cryptanalytic attack that can be used against my encrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Browser hijacking

A

The modification of a web browser’s settings by malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hacking

A

Someone who seeks and exploits weaknesses in a computer system or computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardware firewall

A

Uses packet filtering to examine the header of a packet to determine its spruce and destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key logger

A

The action of tracking the keys struck on a keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Private key

A

A class of algorithms for cryptography that use trivially related cryptographically keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Public key

A

A cryptographic key that van be obtained and used by anyone to encrypt messages intended for a particular recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Repetitive strain injury

A

A condition in which the prolonged performance of repetitive actions cause pain or impairment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure sockets layer

A

Cryptographic protocols that provide security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sniffer

A

A computer tool that captures network data in the form of low level packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

Software that self installed on the computer,enabling information to be gatherer covertly about a person’s Internet use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Strong password

A

Password strength is measured by the effectiveness of a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Transport layer security

A

Cryptographic protocols that provide communication security over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly