In: Computer Science
Which of the following is not true of symmetric encryption?
A |
It often involves multiple iterations encryption |
|
B |
It can be decrypted using a key |
|
C |
Breach of the encryption key can enable a brute force attack to be successful |
|
D |
Encryption Key must be protected to ensure password security. |
Which of the following best describes the use of security roles?
A |
A group of users who have been granted the same level of access to the same objects within the database |
|
B |
A group of users who have the same password hashing algorithm applied |
|
C |
Individualized User Security access provisioning |
|
D |
Users who have similar job functions, but different database needs |
Which of the following hashing algorithms supports the greatest number of salt bits?
A. |
MD5 |
|
B. |
Original UNIX crypt |
|
C. |
Blowfish |
|
D. |
Extended Des |
Which of the following is not a characteristic of hashing?
A. |
Hashing functions are generally reversible |
|
B. |
They can be subject to brute force attacks without salts |
|
C. |
They can be subject to brute force attacks without multiple iterations |
|
D. |
You can use a per user salt |
Which of the following privileges can be granted to user based on the Grant/Revoke command?
A. |
Update |
|
B. |
Trigger |
|
C. |
Truncate |
|
D. |
Reference |
|
E. |
Delete |
|
F. |
Insert |
|
G. |
Select |
|
H. |
Connect |
|
I. |
Create |
|
J. |
Execute |
Data Governance pertains to how password hashing algorithms are selected.
True
False
Passwords hashed with the crypt function include the algorithm in the type to allow passwords hashed with different algorithms to coexist
True
False
What is meant when stating that a hashing algorithm is adaptive?
A. |
The algorithms can be slowed as computers become faster to mitigate brute force attacks |
|
B. |
A new salt can be used for hashing when the original becomes breached |
|
C. |
The hashed value output changes over time to prevent brute force attacks |
|
D. |
Users can choose their own salt allowing for secondary level of user password selection |
Solution:
Which of the following is not true of symmetric encryption?
C) Breach of the encryption key can enable a brute force attack to be successful
Explanation;
The given statement false because if we get the encryption key then the data can be decrypted just like that, there won't be any need of brute force attack then.
Which of the following best describes the use of security roles?
A) A group of users who have been granted the same level of access to the same objects within the database
Explanation:
Obviously, a group of users who have access to the same objects in the database will lie on the same level of a security role.
Which of the following hashing algorithms supports the greatest number of salt bits?
Which of the following hashing algorithms supports the greatest number of salt bits?
A) MD5
Explanation:
Which of the following is not a characteristic of hashing?
Hashing functions are generally reversible
Explanation:
The primary property for which hashing came into existence is because hashing is a one-way function.
Which of the following privileges can be granted to a user based on the Grant/Revoke command?
The list is given below:
Data Governance pertains to how password hashing algorithms are selected.
True
Passwords hashed with the crypt function include the algorithm in the type to allow passwords hashed with different algorithms to coexist
True
What is meant when stating that a hashing algorithm is adaptive?
The algorithms can be slowed as computers become faster to mitigate brute force attacks
Hit the thumbs up if you liked the answer. :)