Exam 8: Cryptography Terminology and Techniques
Exam 1: Cybersecurity and Network Protocols23 Questions
Exam 2: DNS, IDS/IPS, and Digital Investigations9 Questions
Exam 3: Investigative Techniques and Digital Evidence in Crime Investigations5 Questions
Exam 4: Information Security and Encryption Terminology23 Questions
Exam 5: Cryptography and Data Protection22 Questions
Exam 6: Cryptography and VPNS23 Questions
Exam 7: Cryptography and Security Measures in Network Communication23 Questions
Exam 8: Cryptography Terminology and Techniques25 Questions
Exam 9: Cryptography and Network Security22 Questions
Exam 10: Information Security and Network Protocols23 Questions
Exam 11: Cryptography and Cryptographic Protocols23 Questions
Exam 12: Security Protocols, VPNS, and Firewalls21 Questions
Exam 13: Understanding Cyber-Crime and Firewall Technologies in IT Act29 Questions
Select questions type
The technique in which when one character is replaced by another Character is called as?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
B
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
C
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
D
In asymmetric key cryptography, the private key is kept by __________
(Multiple Choice)
4.8/5
(33)
The__is a polygraphic substitution cipher based on linear algebra.
(Multiple Choice)
4.8/5
(37)
The__model is 7 layer architecture where each layer is having some specific functionality to perform.
(Multiple Choice)
4.8/5
(50)
In Symmetric schemes requires both parties to share how many secret key?
(Multiple Choice)
4.7/5
(42)
An act of protecting information from unauthorised disclouser to an entity.-
(Multiple Choice)
4.8/5
(36)
__is the practice of concealing a message within another message,image or file.
(Multiple Choice)
4.9/5
(30)
A way to ensure that the entity is indeed what it claims to be.-
(Multiple Choice)
4.9/5
(36)
In cryptography the original message before being transform is called
(Multiple Choice)
4.8/5
(33)
A hacker guessing suggested password to a program is call as?
(Multiple Choice)
4.8/5
(29)
Conversion of plain text into Cipher text is called as________.
(Multiple Choice)
5.0/5
(34)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)