- ADecryption
- BEncryption
- CAuthentication
- DAuthorization
Answer: b) Encryption
Explanation: Encryption is the process of converting plaintext into ciphertext to protect it from unauthorized access. Ciphertext is the scrambled text that can only be unscrambled by those who have the appropriate decryption key.
Answer: a) Brute force attack
Explanation: A brute force attack is a type of attack where an attacker tries to guess a user's password by trying multiple combinations until they find the correct one.
Answer: a) Authentication
Explanation: Authentication is the practice of verifying the identity of a user or system before granting access. This can involve the use of passwords, biometric data, security tokens, or other methods.
Answer: b) Authorization
Explanation: Authorization is the process of granting or denying access to a user or system based on their identity and permissions.
Answer: a) Steganography
Explanation: Steganography is the process of hiding information within another piece of information, such as a text message or image.
Answer: a) Penetration testing
Explanation: Penetration testing is the practice of testing a system or application for vulnerabilities that can be exploited by attackers. This is done to identify and address potential security weaknesses before they can be exploited.
Answer: c) Phishing attack
Explanation: A phishing attack is a type of attack where an attacker impersonates a legitimate website or email to trick users into revealing sensitive information, such as usernames, passwords, or financial information.
Answer: c) Hashing
Explanation: Hashing is the process of converting plaintext into a fixed-length string of characters that represents the original data. Hashing is a one-way process, meaning that it is not possible to convert the hash back into the original data.
Answer: b) DDoS attack
Explanation: A DDoS (Distributed Denial of Service) attack is a type of attack where an attacker floods a system with traffic to overload it and prevent legitimate users from accessing it. This can be done using a network of compromised computers (a botnet) or by exploiting vulnerabilities in the system's software.
Answer: d) Trojan horse attack
Explanation: A Trojan horse attack is a type of attack where malware disguises itself as a legitimate program to trick users into downloading and installing it. Once installed, the malware can perform a variety of malicious actions, such as stealing sensitive data or giving the attacker remote control of the system.