Monday,
March 18, 2002
|
|
Compuquiz |
|
|
Compuquiz —
75
1. Which technology is
used to measure and analyze human body characteristics for
authentication purposes?
2. What do we call an
electronic or paper log used to track computer activity?
3. A series of messages
sent by someone attempting to break into a computer to learn which
computer network services the computer provides is called what?
4. Name the well known
group of programmers who are hired to expose errors or security holes in
new software or to find out why a computer network's security is being
broken?
5. What do we call a
mechanism for ensuring that only authorized users can copy or use
specific software applications?
6. What do we call the
hiding of a secret message within an ordinary message and the extraction
of it at its destination?
7. A Peripheral
Component Interconnect (PCI) card used to generate encryption keys for
secure transactions on e-commerce Web sites is known as what?
8. Name the technology
involving the monitoring of devices that emit electromagnetic radiation
(EMR) in a manner that can be used to reconstruct intelligible data.
9. What enables users
of a basically unsecure public network such as the Internet to securely
and privately exchange data and money through the use of a public and a
private cryptographic key pair that is obtained and shared through a
trusted authority?
10. An assault on the integrity of a
security system in which the attacker substitutes a section of
ciphertext (encrypted text) with a different section that looks like
(but is not the same as) the one removed is called what?
Answers to Compuquiz 73
1. Private key
2. One-time pad
3. Public key infrastructure
4. Certificate authority
5. Pretty Good Privacy
6. Rijndael
7. Steganography
8. Salt
9. Electronic Code Book
10. Brute force cracking
The following are the
winners of Compuquiz 73
1. Param Sandhu, Nakodar
2. Ranjit Singh Hundal, Amritsar
3. Mrs R. Lakshmi, New Delhi
|