Exam 1: Introduction to Security Concepts
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
A digital certificate is standardized as ____ under IETF RFC 2459.
(Multiple Choice)
4.9/5
(39)
____ is defined as the exchange of information over an unsecured medium that allows each of two parties, the sender and the recipient, to compute a value that will be used to construct a secret key for a symmetric cipher during the rest of the communication.
(Multiple Choice)
4.7/5
(40)
____ is a set of computer networking standards developed by the International Standard Organization (ISO) and covering electronic directory services.
(Multiple Choice)
4.7/5
(31)
What are the prerequisites for a hash function to be classified as a secure cryptographic hash function?
(Essay)
4.9/5
(46)
In ____, the source IP address in a packet is faked to make recipients suppose that packets are coming from trustworthy IP addresses.
(Multiple Choice)
4.8/5
(30)
____________________ is the assurance that an entity is who it claims to be.
(Short Answer)
4.9/5
(30)
____________________ means the assurance of data privacy-ensuring that no one can read the data except for the specific entity or entities intended.
(Short Answer)
4.8/5
(36)
The two primary types of symmetric ciphers are stream ciphers and ____ ciphers.
(Multiple Choice)
4.7/5
(30)
What are the main advantages and disadvantages of Electronic Codebook (ECB)?
(Essay)
4.8/5
(41)
____ was designed by IBM in the 1970s and is the most widely used symmetric cipher.
(Multiple Choice)
4.9/5
(35)
____ ensure(s) the integrity of a message sent between two parties who are unknown to each other.
(Multiple Choice)
4.9/5
(39)
A ____ is a piece of structured data that uses a digital signature to bind a public key with an identity.
(Multiple Choice)
4.8/5
(37)
For communication among former unknown parties, ____________________ refers to any method for distributing a secret amongst a group of participants in cryptography.
(Short Answer)
4.9/5
(39)
A(n) ____ is the unique string of numbers that identifies a computer or server on the Internet.
(Multiple Choice)
4.8/5
(38)
____ was originally designed as part of the International Telecommunication Union's Open Standards Interconnect (OSI) effort as a general description language for the OSI protocol.
(Multiple Choice)
4.9/5
(31)
____ is the process of performing a comprehensive search on the possible solution space by throwing all computational power an attacker can gather at breaking the system.
(Multiple Choice)
4.9/5
(39)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)