Exam 12: Cryptography
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
When an attacker has access to a password file,they can run a password-cracking program that uses a dictionary of known words or passwords as an input file.What type of attack is this attacker performing?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
D
Which of the following is a range of allowable values that is used to generate an encryption key?
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
C
Which of the following refers to verifying the sender or receiver (or both)is who they claim to be?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
A
Which function ensures that a sender and receiver cannot deny sending or receiving a specific message?
(Multiple Choice)
4.8/5
(34)
If a security expert decides to study the process of breaking encryption algorithms,they are performing which of the following?
(Multiple Choice)
4.9/5
(29)
Cryptography is the process of converting plaintext,which is readable text,into unreadable or encrypted text called which if the following?
(Multiple Choice)
4.7/5
(31)
In what type of attack does the attacker need access to the cryptosystem,and the ciphertext to be decrypted to yield the desired plaintext results?
(Multiple Choice)
4.9/5
(36)
What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms?
(Multiple Choice)
4.9/5
(29)
Which of the following is a scripting language for Windows and Linux that performs repetitive tasks,such as password cracking?
(Multiple Choice)
4.9/5
(36)
Which of the following is the process of converting ciphertext back into plaintext?
(Multiple Choice)
4.8/5
(36)
Match each item with a statement below.
-Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm
(Multiple Choice)
4.8/5
(40)
How can confidentiality and authentication be achieved using public key cryptography?
(Essay)
5.0/5
(35)
What type of attack is being performed when an attacker intercepts the initial communications between a Web server and a Web browser while forcing a vulnerable server to insecurely renegotiate the encryption being used down to a weaker cipher?
(Multiple Choice)
4.7/5
(35)
Match each item with a statement below.
-The use of random data alongside plaintext as an input to a hashing function so that the output is unique
(Multiple Choice)
4.8/5
(29)
What encryption algorithm can be used for both encryption and digital signing,uses a one-way function,and is still widely used in e-commerce?
(Multiple Choice)
4.8/5
(30)
Match each item with a statement below.
-Uses two keys: one to encrypt data and one to decrypt data
(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)