Integrity Flashcards

1
Q

Technology that supports Integrity

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MD5

A

Message Digest 5

128-bit hash digests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SHA-1

A

Secure Hash Algorithm 1

160-bit hash digests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Salami Attack

A

Collection of small attacks that combine for a larger attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Diddling

A

Data is changed before it is stored.

Virus, Trojan horse, or worm could change characters from what is displayed on screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trust Relationship Exploitation

A

Compromise a device that has access to another device that is harder to reach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojan Horse

A

Appears to be a useful program but has another purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Packet Capture

A

Can see the contents of plain-text packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keylogger

A

Logs the keystrokes made by a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Brute Force

A

Tries all possible password combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dictionary Attack

A

Tries commonly used words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Botnet

A

Collection of computers (zombies) infected with software (bots)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hijacking Session

A

Hijacking a TCP session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly