Exam 5: Cryptography and Data Protection
Exam 1: Cybersecurity and Network Protocols23 Questions
Exam 2: DNS, IDS/IPS, and Digital Investigations9 Questions
Exam 3: Investigative Techniques and Digital Evidence in Crime Investigations5 Questions
Exam 4: Information Security and Encryption Terminology23 Questions
Exam 5: Cryptography and Data Protection22 Questions
Exam 6: Cryptography and VPNS23 Questions
Exam 7: Cryptography and Security Measures in Network Communication23 Questions
Exam 8: Cryptography Terminology and Techniques25 Questions
Exam 9: Cryptography and Network Security22 Questions
Exam 10: Information Security and Network Protocols23 Questions
Exam 11: Cryptography and Cryptographic Protocols23 Questions
Exam 12: Security Protocols, VPNS, and Firewalls21 Questions
Exam 13: Understanding Cyber-Crime and Firewall Technologies in IT Act29 Questions
Select questions type
What is data encryption standard (DES)?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
A
_______ of information means, only authorized users are capable of accessing the information.
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
D
This helps in identifying the origin of information and authentic user. This referred to here as __________
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
C
In asymmetric key cryptography, the two keys e and d, have special relationship to
(Multiple Choice)
4.8/5
(29)
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
(Multiple Choice)
4.7/5
(27)
______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
(Multiple Choice)
4.8/5
(27)
When you use the word ______it means you are protecting your data from getting disclosed.
(Multiple Choice)
4.9/5
(38)
Which is the largest disadvantage of the symmetric Encryption?
(Multiple Choice)
4.9/5
(38)
A company requires its users to change passwords every month. This improves the ________ of the network.
(Multiple Choice)
4.7/5
(32)
In asymmetric key cryptography, the private key is kept by __________
(Multiple Choice)
4.8/5
(37)
What type of attack uses a fraudulent server with a relay address?
(Multiple Choice)
4.7/5
(31)
The procedure to add bits to the last block is termed as _________________
(Multiple Choice)
4.9/5
(35)
Conventional cryptography is also known as _____________ or symmetric-key encryption.
(Multiple Choice)
4.8/5
(32)
Which one of the following algorithm is not used in asymmetric-key cryptography?
(Multiple Choice)
4.9/5
(35)
In cryptography, the order of the letters in a message is rearranged by __________
(Multiple Choice)
4.9/5
(36)
_______ means the protection of data from modification by unknown users.
(Multiple Choice)
4.9/5
(43)
Showing 1 - 20 of 22
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)