Review Questions

  1. What is a password?

  2. What is the process of getting someone to carry out a task for you?

  3. Are more complex passwords stronger or weaker than simpler passwords?

  4. What method should you first use to get a password?

  5. What type of password attack tries passwords from a predefined list?

  6. Which type of password attack uses passwords from a list and then tries variations on each element from the list?

  7. What is an algorithm for encrypting and decrypting data?

  8. What term describes an encrypted message?

  9. Which symmetric encryption algorithm is based on the Rijndael cipher?

  10. Which symmetric encryption algorithm uses 56-bit keys?

Computer Forensics JumpStart
Computer Forensics JumpStart
ISBN: 0470931663
EAN: 2147483647
Year: 2004
Pages: 153

Similar book on Amazon © 2008-2017.
If you may any questions please contact us: