Problem 13
For Exercises 1-27, mark the answers true or false as follows: A. True B. False Antivirus software is not effective against non-virus types of malware.
Problem 14
For Exercises 1-27, mark the answers true or false as follows: A. True B. False A password-guessing program uses dictionaries to try thousands of potential passwords each second.
Problem 15
For Exercises 1-27, mark the answers true or false as follows: A. True B. False Phishing is a technique that uses deceptive emails and websites to obtain user information, such as usernames and passwords.
Problem 16
For Exercises 1-27, mark the answers true or false as follows: A. True B. False A back door threat is implemented by a programmer of the system under attack.
Problem 17
For Exercises 1-27, mark the answers true or false as follows: A. True B. False A denial-of-service attack does not directly corrupt data.
Problem 18
For Exercises 1-27, mark the answers true or false as follows: A. True B. False Decryption is the process of converting plaintext into ciphertext.
Problem 19
For Exercises 1-27, mark the answers true or false as follows: A. True B. False A cipher is an algorithm used to encrypt and decrypt text.
Problem 20
For Exercises 1-27, mark the answers true or false as follows: A. True B. False A transposition cipher is an example of modern cryptography.
Problem 21
For Exercises 1-27, mark the answers true or false as follows: A. True B. False In public-key cryptography, each user has two related keys, one public and one private.
Problem 22
For Exercises 1-27, mark the answers true or false as follows: A. True B. False A digital signature allows the recipient to verify that the message truly originates from the stated sender.