What is the process by which the same key is used to encrypt and decrypt a message?
Symmetric key encryption
Public key encryption
Shared key encryption
In public key encryption, what is the public key used for?
To generate an encrypted message for a specific user profile that can be accessed by all systems
To generate an encrypted message for a specific user profile that is only used by the operating system hosting that profile
To send data to members of the public rather than individuals within a business
Which of the following is issued by a certificate authority to verify the authenticity of the holder?
An e-signature
A digital signature
Primary algorithm
Which of the following is not an algorithm used in the creation of a digital signature?
Signing algorithm
Public/private algorithm
Signature verifying algorithm
Which of the following are not part of a digital certificate?
The certificate authority that verifies the information in the certificate
The country of origin of the certificate holder
The date that the certificate is valid from and the date that the certificate expires
Which of the following describes a digital signature?
A message/data encoded using a key, with the same key needed to decode the message/data
A certificate to prove the authenticity of the certificate holder/organisation
A series of algorithms used together to prove that a digital message is authentic
Which of the following best describes ‘tracking cookies’?
Text files that are used to enhance your browsing experience by remembering data entered on websites
Text files that act as normal cookies but send information to third parties without permission
Text files that track orders form e-commerce websites
Which of the following best describes a Denial of Service (DOS) attack?
An attack from within an operating system, designed to replicate and attach to files
An attack designed to take down a server, often by overloading a server to the point that it cannot accept legitimate traffic
Software that will send browsing habits to third parties without user consent
Which type of denial of service attack is designed to intercept data sent on a network to prevent data from being kept secure or reaching its intended target?
Bandwidth consumption
Resource Starvation
Routing
A person who can be hired to carry out denial of service attacks is likely to be motivated by which of the following?
Financial gain
Personal reasons
Political views