Ethical Hacking  >  A-Level Question Paper  >  INTRO TO ETHICAL HACKING EXAM (ACTUAL EXAM ) LATEST 2024. (All)

INTRO TO ETHICAL HACKING EXAM (ACTUAL EXAM ) LATEST 2024.

Document Content and Description Below

3DES - CORRECT ANSWER: DES used to encrypt each block three times , each with a different key Access Control List - CORRECT ANSWER: info about what kind of access certain parties are allowed to hav ... e to a given system Read , write , execute Access Control Models - CORRECT ANSWER: Discretionary ( DAC ) Mandatory ( MAC ) Rule - based Role - based ( RBAC ) Attribute - based ( ABAC ) Accountability - CORRECT ANSWER: Refers to making sure that a person is responsible for their actions . -It provides us with the means to trace activities in our environment back to their source . -Depends on identification , authentication , and access control being present so that we can know who a given transaction is associated with , and what permissions were used to allow them to carry it out . Acess Control - CORRECT ANSWER: Allowing - lets us give a particular party access to a given source Denying - opposite of gaining access Limiting - allowing some access to our resource , only up to a certain point Revoking - takes access away from former user AES - CORRECT ANSWER: uses three different ciphers : one with a 128 - bit key , one with a 192 - bit key , and one with a 256 - bit key , all having a block length of 128 bits Asymmetric cryptography - CORRECT ANSWER: a public key and a private key . The public key is used to encrypt data sent from the sender to the receiver and is shared with everyone . Private keys are used to decrypt data that arrives at the receiving end and are very carefully guarded by the receive ( aka the public key cryptography ) Asymmetric Key Algorithms - CORRECT ANSWER: Secure Sockets Layer ( RSA ) Elliptic Curve Cryptography ( ECC ) Pretty Good Privacy ( PGP ) Transport Layer Security ( TLS [Show More]

Last updated: 1 year ago

Preview 1 out of 27 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of INTRO TO ETHICAL HACKING EXAM (ACTUAL EXAM ) LATEST 2024. document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$13.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

46
0

Document information


Connected school, study & course


About the document


Uploaded On

Mar 23, 2024

Number of pages

27

Written in

All

Seller


Profile illustration for Joseph Waihenya
Joseph Waihenya

Member since 2 years

4 Documents Sold

Reviews Received
0
0
0
0
1
Additional information

This document has been written for:

Uploaded

Mar 23, 2024

Downloads

 0

Views

 46

More From Joseph Waihenya

View all Joseph Waihenya's documents »

$13.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·