Exam 6: Encryption
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
An improvement over the Caesar cipher is based on ____________ substitution.
Free
(Short Answer)
4.9/5
(30)
Correct Answer:
multi-alphabet
Which is a block cipher developed by Belgian researchers and providing 128-,192-,and 256-bit key sizes?
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
A
XOR is a mathematical operation on performed on ____________ numbers that results in the basis for data encryption.
Free
(Short Answer)
4.8/5
(38)
Correct Answer:
binary
Which is a public key encryption standard developed by three mathematicians in 1977 that provides very high but slow security?
(Multiple Choice)
4.9/5
(36)
Which is NOT a part of a step in the XOR operation of encryption method.
(Multiple Choice)
4.8/5
(24)
The ____________ cipher is a very old encryption method used by ancient Romans.
(Short Answer)
4.8/5
(42)
Which is a powerful password cracker that works on Windows and Linux platforms?
(Multiple Choice)
4.8/5
(33)
Information about an individual or organizational identity,their public key,and its expiration date is contained in a digital certificate issued by a(n)____________.
(Short Answer)
4.8/5
(34)
Many encryption techniques such as XOR are easily broken because:
(Multiple Choice)
4.9/5
(32)
Which is NOT a way in which quantum physics might improve encryption in the future?
(Multiple Choice)
4.7/5
(42)
Operations not found in normal math that can be performed on binary numbers include all of the following EXCEPT:
(Multiple Choice)
4.8/5
(41)
Changing a message in a such a way that it can be read easily by the intended recipient but cannot be read easily by any intercepting party is called ____________.
(Short Answer)
4.9/5
(40)
Which is a symmetric block cipher developed in 1993 that provides variable-length key sizes ranging from 32 to 448 bits?
(Multiple Choice)
4.8/5
(36)
Attempting to determine a password by simply trying every possible combination within the set parameters until successful is called:
(Multiple Choice)
4.7/5
(33)
Limiting failed log in attempts minimizes the possibility that attackers will eventually determine a password while using software that repeatedly tries a large range of possibilities in a(n)____________ attack.
(Short Answer)
4.9/5
(38)
A free,non-commercial,symmetric block cipher called ____________ uses a variable-length key ranging from 32 to 448 bits.
(Short Answer)
4.7/5
(38)
A(n)____________ is actually data attached to a file or e-mail to provide verification of the identity and\or origin of the file or e-mail.
(Short Answer)
4.8/5
(34)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)