Exam 3: Cryptography
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
In a(n) ____________________ attack, the attacker eavesdrops on the victim's session and uses statistical analysis of patterns and inter-keystroke timings to discern sensitive session information.
Free
(Short Answer)
4.8/5
(35)
Correct Answer:
timing
In modulo 26, what happens if a number is larger than 26?
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
C
Digital ____ authenticate the cryptographic key that is embedded in the certificate.
Free
(Multiple Choice)
4.7/5
(43)
Correct Answer:
C
Which cipher is made from a table of 26 distinct cipher alphabets?
(Multiple Choice)
4.9/5
(31)
Which symmetric encryption cryptosystems was developed to replace both DES and 3DES?
(Multiple Choice)
4.8/5
(40)
Digital signatures are encrypted messages that can be mathematically proven authentic.
(True/False)
4.8/5
(29)
Describe the exclusive OR operation (XOR) function and explain where XOR encryption is used.
(Essay)
5.0/5
(32)
The XOR encryption method should be used by itself when an organization is transmitting or storing sensitive data.
(True/False)
4.7/5
(38)
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-The programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represents the message
(Short Answer)
4.7/5
(32)
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-The process of replacing plaintext values with other values to form ciphertext
(Short Answer)
4.8/5
(35)
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-An encryption method or process encompassing the algorithm, key(s) and/or cryptovariable(s), and procedures used to perform encryption and decryption
(Short Answer)
4.8/5
(36)
Why is asymmetric encryption commonly referred to as public-key encryption?
(Essay)
4.8/5
(32)
Which cipher simply rearranges the values within a block to create the ciphertext?
(Multiple Choice)
4.8/5
(37)
____ builds on the encoding format of the MIME protocol and uses digital signatures based on public-key cryptosystems to secure e-mail.
(Multiple Choice)
4.9/5
(42)
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-To encrypt, encode, or convert plaintext into the equivalent ciphertext
(Short Answer)
4.8/5
(36)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)