Networking Chapter 6 Encryption And Password Cracking What The Difference Between Transposition And Substitution

subject Type Homework Help
subject Pages 3
subject Words 438
subject Authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 6: Encryption and Password Cracking
1. What is the difference between transposition and substitution in cryptography? (Short essay, no
2. Writing Exercise: Write a paragraph of 25-40 words, using a transposition or substitution code.
3. List and discuss the symmetric key encryption algorithms based on algorithm and security level.
Algorithm Security level
4. List and discuss the asymmetric key encryption algorithms based on algorithm and security level.
Algorithm Security level
5. Summarize a few of the methods used to acquire passwords.
6. What are the positive uses for password-cracking utilities?
Indicate whether the sentence or statement is true or false.
page-pf2
7. ______ Cain and Abel is used on Linux platforms to crack passwords.
8. ______ When a password hash is present, a Rainbow Table could be used to crack the password.
9. ______ It takes such a long time to crack strong passwords like “199!2GfrRRb9(e)woP” that it
should be used for every account.
10. ______ The strong password, “199!2GfrRRb9(e)woP,” could be cracked with a dictionary attack.
11. ______ The strong password, “199!2GfrRRb9(e)woP” could be cracked with a dictionary attack
12. ______ The strong password, “199!2GfrRRb9(e)woP” could be cracked with a brute-force attack.
13. ______ The process of creating new words through the addition of letters and/or numbers to
every word in a dictionary is called hybridization.
14. ______ Crackers use packet poodles to catch cleartext passwords from protocols such as Telnet,
FTP, and POP3.
15. Which encryption algorithm is open source and freely available for use?
16. ______ Cain and Abel is used from the command line or GUI.
page-pf3
17. Aircrack was first released in 2010. True or False?
18. ______ John the Ripper uses word files to make dictionary attacks.
19. Which cracking tool is useful for cracking WEP and WPA passwords?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.