In the enumeration phase, attackers create active connections to the target system and perform directed queries to gain more information about the target.

a. true
b. false

Answer: a. true

Computer Science & Information Technology

You might also like to view...

When you use written communication, you receive immediate feedback in the form of body language

Indicate whether the statement is true or false

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. One criteria for an S-box is: "If two inputs to an S-box differ in exactly one bit, the outputs must also differ in exactly one bit. “? 2. The heart of a Feistel block cipher is the function F, which relies on the use of S-boxes. ? 3. The strict avalanche criterion and the bit independence criterion appear to weaken the effectiveness of the confusion function. ? 4. An advantage of key-dependent S-boxes is that because they are not fixed, it is impossible to analyze the S-boxes ahead of time to look for weaknesses. ? 5. The key schedule algorithm is more popular and has received more attention than S-box design. ?

Computer Science & Information Technology