Which of the following best describes a backdoor?
A. Code inserted into software that initiates one of several types of functions when specific criteria are met
B. Computer programs used to bypass normal authentication or other security mechanisms in place
C. A platonic extra added to an operating system
D. A group of compromised computers
Answer: B
Learn More :
Cryptography
- What are the general equations for encryption and decryption in the affine cipher?
- Describe a relationship between plaintext, encryption, decryption and cipher
- Carlos wants to send a message to Alice so only she can understand it. He also wants to send a message to Bob so only Bob can understand it. How many private keys does Carlos need?
- The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
- The ________ method provides a one-time session key for two parties.
- One commonly used public-key cryptography method is the ______ algorithm.
- In an asymmetric-key cipher, the receiver uses the ______ key.
- In an asymmetric-key cipher, the sender uses the__________ key.
- In a(n) ________ cipher, a pair of keys is used.
- In a(n) ________, the key is called the secret key.
- In a(n) ________ cipher, the same key is used by both the sender and receiver.
- The _______ is a number or a set of numbers on which the cipher operates.
- A combination of an encryption algorithm and a decryption algorithm is called a ________.
- A(n) _______ algorithm transforms ciphertext to plaintext.
- A(n) _______ algorithm transforms plaintext to ciphertext.
- The ________ is the message after transformation.
- The ________is the original message before transformation.
- This is the name for the issuer of a PKI certificate.
- This is an encryption/decryption key known only to the party or parties that exchange secret messages.
- Cryptanalysis is used
- What is data encryption standard (DES)?
- In asymmetric key cryptography, the private key is kept by
- In cryptography, what is cipher?
- What is Vulnerability?
- What is Availability?