In the enumeration phase, attackers create active connections to the target system and perform directed queries to gain more information about the target.
a. true
b. false
Answer: a. true
You might also like to view...
When you use written communication, you receive immediate feedback in the form of body language
Indicate whether the statement is true or false
Answer the following statements true (T) or false (F)
1. One criteria for an S-box is: "If two inputs to an S-box differ in exactly one bit, the outputs must also differ in exactly one bit. “? 2. The heart of a Feistel block cipher is the function F, which relies on the use of S-boxes. ? 3. The strict avalanche criterion and the bit independence criterion appear to weaken the effectiveness of the confusion function. ? 4. An advantage of key-dependent S-boxes is that because they are not fixed, it is impossible to analyze the S-boxes ahead of time to look for weaknesses. ? 5. The key schedule algorithm is more popular and has received more attention than S-box design. ?