Question: Need help answering these multiple choice and true and false questions 11. An institution that issues debit cards to cardholders and is responsible for the
11. An institution that issues debit cards to cardholders and is responsible for the cardholder's account and authorizing transactions is the A. cardholder 8. issuer C. auditor D. processor 12. Unsolicited bulk e-mail is referred to as A. spam B. phishing C. propagating D. crimeware 13. is malware that encrypts the user's data and demands payment in order to access the key needed to recover the information. A. Trojan horse 8. Crimeware C. Ransomware D. Polymorphic 14. Digital signatures are used to do which of the following? a. Verify that a message was received b. Ensure that repudiation is provided c. Provide authentication and nonrepudiation d. Encrypt sensitive message 15. A(n)is is a hacker with minimal technical skill who primarily uses existing attack toolkits A. Master B. Journeyman C. Apprentice D. Activist is the art to write in or decipher secret code. a. Encryption b. Cryptography c. Keying d. Decryption on the 17. The exact substitutions and transformations performed by the algorithm depend A. ciphertext B. secret key C. decryption algorithm D. encryption algorithm bits. 18. SHA-1 produces a hash value of A. 256 B. 384 C. 160 D. 180 19. Which is an example of social engineering? (Choose all apply) A. A user who holds open the front door of an office for a potential hacker B. Ca C. installing a hardware keylogger on a victim's system to capture password ling a help desk and convincing them to reset a password for a user account D. Accessing a database with a cracked password
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
