Exam 3: Cryptography
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
Which algorithm was the first asymmetric, or public-key, encryption algorithm developed (in 1977) and published for commercial use?
(Multiple Choice)
4.8/5
(45)
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-The process of converting components (words or phrases) of an unencrypted message into encrypted components
(Short Answer)
4.9/5
(38)
____ provides verification that a message was sent by a particular sender and cannot be refuted.
(Multiple Choice)
4.8/5
(42)
Bit stream methods commonly use algorithm functions like ____.
(Multiple Choice)
4.9/5
(26)
Which cipher uses a stencil or template with holes cut out?
(Multiple Choice)
4.8/5
(37)
An X.509 v3 certificate binds a ____, which uniquely identifies a certificate entity, to a user's public key.
(Multiple Choice)
4.9/5
(47)
The science of encryption, known as ____________________, encompasses both cryptography and cryptanalysis.
(Short Answer)
4.9/5
(42)
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-To decrypt, decode, or convert ciphertext into the equivalent plaintext
(Short Answer)
4.7/5
(35)
Encryption methodologies that require the same secret key to encipher and decipher the message are using ____ encryption or symmetric encryption.
(Multiple Choice)
4.8/5
(35)
When deploying ciphers, users have to decide on the ____ of the cryptovariable or key.
(Multiple Choice)
4.8/5
(32)
____________________ keys are limited-use symmetric keys for temporary communications; they allow two organizations to conduct quick, efficient, secure communications based on symmetric encryption.
(Short Answer)
4.9/5
(36)
____________________ functions are mathematical algorithms that generate a message summary or digest (sometimes called a fingerprint) that can be used to confirm the identity of a specific message and/or confirm that there have not been any changes to the content.
(Short Answer)
4.8/5
(36)
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-The process of rearranging plaintext values to form ciphertext
(Short Answer)
4.7/5
(43)
____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.
(Multiple Choice)
4.9/5
(33)
Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.
(Multiple Choice)
4.9/5
(48)
Match each item with a statement below.
a.Algorithm
f.Encipher
b.Cryptosystem
g.Steganography
c.Cryptogram
h.Substitution
d.Code
i.Transposition
e.Decipher
-The encoded message resulting from an encryption
(Short Answer)
4.9/5
(30)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)