Masonry MCQ

Masonry

1. In md5, the length of a message is padded to ____ bits.

Answer

Correct Answer: 512

Note: This Question is unanswered, help us to find answer for this one

2. In the uac dialog boxes, the color ____ indicates the lowest risk.

Answer

Correct Answer: Gray

Note: This Question is unanswered, help us to find answer for this one

3. ____ encryption uses two keys instead of only one and these keys are mathematically related.

Answer

Correct Answer: Asymmetric

Note: This Question is unanswered, help us to find answer for this one

4. Standards may be published, scrutinized, and ratified by a group, as in formal or ____ standards.

Answer

Correct Answer: De public

Note: This Question is unanswered, help us to find answer for this one

5. An example of _____ of data would be if a computer virus eliminated files on that computer.

Answer

Correct Answer: Destruction

Note: This Question is unanswered, help us to find answer for this one

6. An ____ is an ap that is set up by an attacker.

Answer

Correct Answer: Evil twin

Note: This Question is unanswered, help us to find answer for this one

7. To create a rainbow table, each ____ begins with an initial password that is encrypted.

Answer

Correct Answer: Chain

Note: This Question is unanswered, help us to find answer for this one

8. A(n) _____ is a published set of rules that govern the operation of a pki.

Answer

Correct Answer: Certificate policy (CP).

Note: This Question is unanswered, help us to find answer for this one

9. The strongest technology that would assure alice that bob is the sender of a message is a(n) _____.

Answer

Correct Answer: Digital certificate

Note: This Question is unanswered, help us to find answer for this one

10. The sql injection statement ____ finds specific users.

Answer

Correct Answer: - whatever' OR full_name LIKE '%Mia%'

Note: This Question is unanswered, help us to find answer for this one

11. Unencrypted information is called ____.

Answer

Correct Answer: Plain text

Note: This Question is unanswered, help us to find answer for this one

12. The sql injection statement ____ erases the database table.

Answer

Correct Answer: - whatever'; DROP TABLE members; --

Note: This Question is unanswered, help us to find answer for this one

13. The signal from an id badge is detected as the owner moves near a ____, which receives the signal.

Answer

Correct Answer: Proximity reader

Note: This Question is unanswered, help us to find answer for this one

14. The nist ________________ program establishes guidelines for selecting and using forensics tools.

Answer

Correct Answer: CFTT.

Note: This Question is unanswered, help us to find answer for this one

15. The ____ utility manages a firewall and packet filtering.

Answer

Correct Answer: Iptables

Note: This Question is unanswered, help us to find answer for this one

16. A(n) ____ does not serve clients, but instead routes incoming requests to the correct server.

Answer

Correct Answer: Reverse proxy

Note: This Question is unanswered, help us to find answer for this one

17. A digital certificate associates _____.

Answer

Correct Answer: The user's identity with his public key

Note: This Question is unanswered, help us to find answer for this one

18. The basis for a digital signature rests on the ability of ____ keys to work in both directions.

Answer

Correct Answer: Asymmetric

Note: This Question is unanswered, help us to find answer for this one

19. ____ is an attack that sends unsolicited messages to bluetooth-enabled devices.

Answer

Correct Answer: Bluejacking

Note: This Question is unanswered, help us to find answer for this one

20. ____ is the time it takes for a key to be pressed and then released.

Answer

Correct Answer: Dwell time

Note: This Question is unanswered, help us to find answer for this one

21. A ____ cipher rearranges letters without changing them.

Answer

Correct Answer: Transposition

Note: This Question is unanswered, help us to find answer for this one

22. Amsterdam has more than ______ bridges.

Answer

Correct Answer: 1200

Note: This Question is unanswered, help us to find answer for this one

23. Most bluetooth devices use a class 2 radio that has a range of ____ feet.

Answer

Correct Answer: 33

Note: This Question is unanswered, help us to find answer for this one

24. Symmetric encryption is also called ____ cryptography

Answer

Correct Answer: Private key

Note: This Question is unanswered, help us to find answer for this one

25. The ____ list is intended to facilitate the development of a free network exploration tool.

Answer

Correct Answer: Nmap-hackers

Note: This Question is unanswered, help us to find answer for this one

26. A ____ is designed to separate a nonsecured area from a secured area.

Answer

Correct Answer: Mantrap

Note: This Question is unanswered, help us to find answer for this one

27. ____ is the encryption protocol standard for wpa2.

Answer

Correct Answer: AES-CCMP

Note: This Question is unanswered, help us to find answer for this one