Exam 8: Encryption
Exam 1: Introduction to Computer Security24 Questions
Exam 2: Networks and the Internet25 Questions
Exam 3: Cyber Stalking, Fraud, and Abuse25 Questions
Exam 4: Denial of Service Attacks25 Questions
Exam 5: Malware25 Questions
Exam 6: Techniques Used by Hackers25 Questions
Exam 7: Industrial Espionage in Cyberspace25 Questions
Exam 8: Encryption25 Questions
Exam 9: Computer Security Software23 Questions
Exam 10: Security Policies25 Questions
Exam 11: Network Scanning and Vulnerability Scanning21 Questions
Exam 12: Cyber Terrorism and Information Warfare23 Questions
Exam 13: Cyber Detective24 Questions
Exam 14: Introduction to Forensics25 Questions
Select questions type
IPsec can only encrypt the packet data but not the header information.
Free
(True/False)
4.9/5
(37)
Correct Answer:
False
_________ is a block cipher that uses a variable-length key ranging from 32 to 448 bits.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
C
Which of these is NOT one of the two basic types of cryptography?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
C
A(n)________ refers to the bits that are combined with the plain text to encrypt it.
(Multiple Choice)
4.8/5
(31)
Using the __________ cipher you choose some number by which to shift each letter of a text.
(Multiple Choice)
4.9/5
(38)
Using the _________ cipher you select multiple numbers by which to shift letters.
(Multiple Choice)
4.8/5
(25)
Kerberos is an authentication protocol that uses a ticket granting system that sends an encrypted ticket to the user's machine.
(True/False)
4.9/5
(34)
A(n)___________is a mathematical process for doing something.
(Multiple Choice)
4.8/5
(38)
With ______________ encryption,one key is used to encrypt a message,and another is used to decrypt the message.
(Multiple Choice)
4.8/5
(32)
With asymmetric cryptography a different ______ is used to encrypt the message and to decrypt the message.
(Multiple Choice)
4.9/5
(32)
______________ is the process to scramble a message or other information so that it cannot be easily read.
(Multiple Choice)
4.8/5
(38)
Which of the following is an operation used on binary numbers not found in normal math?
(Multiple Choice)
4.8/5
(28)
Public key encryption is fast becoming the most widely used type of encryption because there are no issues to deal with concerning distribution of keys.
(True/False)
4.9/5
(33)
A virtual private network is a way to use the Internet to create a connection between a remote user and a central location.
(True/False)
4.7/5
(29)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)