Which of the following attacks involve intercepting a session and modifying network packets? (Select the two best answers.)
A. TCP/IP hijacking
B. Denial of service
C. Man-in-the-middle attack
D. DNS poisoning
E. Null session
Answer: A & C.
Learn More :
Cryptography
- What are the general equations for encryption and decryption in the affine cipher?
- Describe a relationship between plaintext, encryption, decryption and cipher
- Carlos wants to send a message to Alice so only she can understand it. He also wants to send a message to Bob so only Bob can understand it. How many private keys does Carlos need?
- The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
- The ________ method provides a one-time session key for two parties.
- One commonly used public-key cryptography method is the ______ algorithm.
- In an asymmetric-key cipher, the receiver uses the ______ key.
- In an asymmetric-key cipher, the sender uses the__________ key.
- In a(n) ________ cipher, a pair of keys is used.
- In a(n) ________, the key is called the secret key.
- In a(n) ________ cipher, the same key is used by both the sender and receiver.
- The _______ is a number or a set of numbers on which the cipher operates.
- A combination of an encryption algorithm and a decryption algorithm is called a ________.
- A(n) _______ algorithm transforms ciphertext to plaintext.
- A(n) _______ algorithm transforms plaintext to ciphertext.
- The ________ is the message after transformation.
- The ________is the original message before transformation.
- This is the name for the issuer of a PKI certificate.
- This is an encryption/decryption key known only to the party or parties that exchange secret messages.
- Cryptanalysis is used
- What is data encryption standard (DES)?
- In asymmetric key cryptography, the private key is kept by
- In cryptography, what is cipher?
- What is Vulnerability?
- What is Availability?