Following someone through a secure door for access without using an authorized ID card or pass code is called ________. (Choose the most specific answer.)
Blog
A ________ attack is an attack that is made before attack si…
A ________ attack is an attack that is made before attack signatures for the threat are defined.
When two parties communicate with each other using symmetric…
When two parties communicate with each other using symmetric key encryption, how many keys are used in total to encrypt and decrypt?
_______________ is a protocol that can be used to make an en…
_______________ is a protocol that can be used to make an encrypted remote connection to a Linux server or network equipment.
Someone who breaks encryption is called a ________.
Someone who breaks encryption is called a ________.
Rainbow tables contain lists of pre-computed password hashes…
Rainbow tables contain lists of pre-computed password hashes that are indexed to expedite the password cracking process.
Restoration of data files from tape ________.
Restoration of data files from tape ________.
It is not possible for a vulnerability to fall within more t…
It is not possible for a vulnerability to fall within more than one of OWASP’s top ten categories.
____________ is a type of spear-phishing that targets execut…
____________ is a type of spear-phishing that targets executives and high-profile targets.
It is very important for testers to get permission before ru…
It is very important for testers to get permission before running a password cracking program on their company’s computers to check for weak passwords even if such testing is in their job definitions.