Test 4 Flashcards
Which of the following is not a type of computer connector?
A)
USB
B)
SATA
C)
IDS
D)
FireWire
C)
IDS
Web browsers cache web pages that the user visited recently. This cached data is referred to as a temporary Internet file, and it is stored in a folder on the user’s hard drive.
A) True B) False
A) True
An e-mail header can have more than one Received field.
A) True B) False
A) True
A ________________ systematically tries every conceivable combination until a password is found, or until all possible combinations have been exhausted.
Brute force attack
______________ A technique that you can use to determine if the extension of a file has been changed.
(Signature analysis, Signature)
Metadata is a data component that describes other data. In other words, it’s data about data.
A) True B) False
A) True
A criminal can conceal data in hidden disk partitions.
A) True B) False
A) True
On a Windows 7 computer, what is the name of the feature that stores user names, passwords, and other credentials?
A)
Credential Manager
B)
Security Accounts Manager (SAM)
C)
Password Vault Manager
D)
Password.pwl
A)
Credential Manager
In Linux, which directory holds the security logs?
A)
/Sec/Log/
B)
/Logs/Security/
C)
/Var/Syslog/Log/
D)
/Var/Log/
D)
/Var/Log/
Suspects can hide data in which of the following locations? (Choose all that apply.)
A)
White space in documents
B)
Behind graphics in documents
C)
USB port
D)
Host protected areas (HPAs) on drives
A)
White space in documents
B)
Behind graphics in documents
D)
Host protected areas (HPAs) on drives
_________ is the process of translating an encrypted message back into the original unencrypted message.
___Decryption___
Which of the following security principles assures that a message originated from the stated source?
A)
Confidentiality
B)
Integrity
C)
Authentication
D)
Nonrepudiation
D)
Nonrepudiation
Which of the following uses the same value to encrypt and decrypt text?
A)
Private key algorithm
B)
Public key algorithm
C)
Transposition cipher
D)
Substitution cipher
A)
Private key algorithm
A _________ algorithm uses one key to encrypt plaintext and another key to decrypt ciphertext.
public key, public-key
A key that is 4 bits in length can represent how many different key values? Hint: 2^4
A)
16
B)
32
C)
64
D)
128
A)
16