Exam 21: Cryptography and Security
Exam 1: What Is a Computer Network26 Questions
Exam 2: Network Topology26 Questions
Exam 3: Networking Hardware26 Questions
Exam 4: Ethernet Technology26 Questions
Exam 5: Token-Ring, Fddi, and Other Lan Technologies26 Questions
Exam 6: Network Design and Troubleshooting Scenarios26 Questions
Exam 7: Low-Level Protocols26 Questions
Exam 8: The Tcpip Protocols26 Questions
Exam 9: Ipxspx, Appletalk, and Other Network Protocols26 Questions
Exam 10: Switching and Routing26 Questions
Exam 11: Network Management and Security26 Questions
Exam 12: Electronic Mail26 Questions
Exam 13: Ftp and Telnet26 Questions
Exam 14: Multimedia Networking26 Questions
Exam 15: The Internet26 Questions
Exam 16: Writing a Network Application26 Questions
Exam 17: An Introduction to Networking With Windows26 Questions
Exam 18: Windows Domains26 Questions
Exam 19: Unix and Linux26 Questions
Exam 20: Other Network Operating Systems26 Questions
Exam 21: Cryptography and Security26 Questions
Exam 22: Security Hardware26 Questions
Exam 23: Security Software26 Questions
Exam 24: Forensic Techniques26 Questions
Select questions type
____________________ is a technique to detect changes to information rather than encrypt and decrypt information.
Free
(Short Answer)
4.8/5
(31)
Correct Answer:
Hashing
____ ciphers encrypt any number of bits
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
C
A(n) ____________________ is a special word, phrase, or binary number that is used during encryption or decryption to manipulate the data.
Free
(Short Answer)
4.9/5
(29)
Correct Answer:
key
In ____ encryption, the single key must be shared between the individuals wishing to protect their data.
(Multiple Choice)
4.8/5
(27)
The ____ determines the level of data protection provided by the encryption technique.
(Multiple Choice)
4.9/5
(39)
Discuss the encryption strength of symmetric and asymmetric encryption.
(Essay)
4.7/5
(30)
A(n) ____________________ cipher is an algorithm that encrypts or decrypts blocks of data, such as 64-bit or 128-bit chunks of information at a time.
(Short Answer)
4.9/5
(33)
Symmetric encryption is generally thought to be more secure than asymmetric encryption.
(True/False)
4.7/5
(35)
Keeping secrets has become a major force in networking and communication.
(True/False)
4.8/5
(27)
The ____________________ of the WAV file determines how much data can be hidden inside it.
(Short Answer)
4.8/5
(41)
In the ____ cipher technique, the letters of the alphabet are shifted one or more positions to obtain the encryption alphabet.
(Multiple Choice)
4.8/5
(34)
Hashed data can be unhashed and turned back into their original form.
(True/False)
4.9/5
(32)
In ____ encryption, the private key is kept private, in the hands of a single individual.
(Multiple Choice)
4.8/5
(33)
A ____ is visible or invisible information added to an image, video, or audio that identifies the copyright owner of the media.
(Multiple Choice)
4.7/5
(32)
Match each item with a statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(39)
Asymmetric encryption algorithms use ____________________ keys to perform the encryption and decryption.
(Short Answer)
4.8/5
(37)
Showing 1 - 20 of 26
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)