Masonry MCQ

In md5, the length of a message is padded to ____ bits.

Answer

Correct Answer: 512

Note: This Question is unanswered, help us to find answer for this one

In the uac dialog boxes, the color ____ indicates the lowest risk.

Answer

Correct Answer: Gray

Note: This Question is unanswered, help us to find answer for this one

____ encryption uses two keys instead of only one and these keys are mathematically related.

Answer

Correct Answer: Asymmetric

Note: This Question is unanswered, help us to find answer for this one

Standards may be published, scrutinized, and ratified by a group, as in formal or ____ standards.

Answer

Correct Answer: De public

Note: This Question is unanswered, help us to find answer for this one

An example of _____ of data would be if a computer virus eliminated files on that computer.

Answer

Correct Answer: Destruction

Note: This Question is unanswered, help us to find answer for this one

An ____ is an ap that is set up by an attacker.

Answer

Correct Answer: Evil twin

Note: This Question is unanswered, help us to find answer for this one

To create a rainbow table, each ____ begins with an initial password that is encrypted.

Answer

Correct Answer: Chain

Note: This Question is unanswered, help us to find answer for this one

A(n) _____ is a published set of rules that govern the operation of a pki.

Answer

Correct Answer: Certificate policy (CP).

Note: This Question is unanswered, help us to find answer for this one

The strongest technology that would assure alice that bob is the sender of a message is a(n) _____.

Answer

Correct Answer: Digital certificate

Note: This Question is unanswered, help us to find answer for this one

The sql injection statement ____ finds specific users.

Answer

Correct Answer: - whatever' OR full_name LIKE '%Mia%'

Note: This Question is unanswered, help us to find answer for this one

Unencrypted information is called ____.

Answer

Correct Answer: Plain text

Note: This Question is unanswered, help us to find answer for this one

The sql injection statement ____ erases the database table.

Answer

Correct Answer: - whatever'; DROP TABLE members; --

Note: This Question is unanswered, help us to find answer for this one

The signal from an id badge is detected as the owner moves near a ____, which receives the signal.

Answer

Correct Answer: Proximity reader

Note: This Question is unanswered, help us to find answer for this one

The nist ________________ program establishes guidelines for selecting and using forensics tools.

Answer

Correct Answer: CFTT.

Note: This Question is unanswered, help us to find answer for this one

The ____ utility manages a firewall and packet filtering.

Answer

Correct Answer: Iptables

Note: This Question is unanswered, help us to find answer for this one

A(n) ____ does not serve clients, but instead routes incoming requests to the correct server.

Answer

Correct Answer: Reverse proxy

Note: This Question is unanswered, help us to find answer for this one

A digital certificate associates _____.

Answer

Correct Answer: The user's identity with his public key

Note: This Question is unanswered, help us to find answer for this one

The basis for a digital signature rests on the ability of ____ keys to work in both directions.

Answer

Correct Answer: Asymmetric

Note: This Question is unanswered, help us to find answer for this one

____ is an attack that sends unsolicited messages to bluetooth-enabled devices.

Answer

Correct Answer: Bluejacking

Note: This Question is unanswered, help us to find answer for this one

____ is the time it takes for a key to be pressed and then released.

Answer

Correct Answer: Dwell time

Note: This Question is unanswered, help us to find answer for this one

A ____ cipher rearranges letters without changing them.

Answer

Correct Answer: Transposition

Note: This Question is unanswered, help us to find answer for this one

Amsterdam has more than ______ bridges.

Answer

Correct Answer: 1200

Note: This Question is unanswered, help us to find answer for this one

Most bluetooth devices use a class 2 radio that has a range of ____ feet.

Answer

Correct Answer: 33

Note: This Question is unanswered, help us to find answer for this one

Symmetric encryption is also called ____ cryptography

Answer

Correct Answer: Private key

Note: This Question is unanswered, help us to find answer for this one

The ____ list is intended to facilitate the development of a free network exploration tool.

Answer

Correct Answer: Nmap-hackers

Note: This Question is unanswered, help us to find answer for this one

A ____ is designed to separate a nonsecured area from a secured area.

Answer

Correct Answer: Mantrap

Note: This Question is unanswered, help us to find answer for this one

____ is the encryption protocol standard for wpa2.

Answer

Correct Answer: AES-CCMP

Note: This Question is unanswered, help us to find answer for this one