Exam 3: Cryptography
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
In a replay attack, the attacker cannot read the contents of the replayed message.
Free
(True/False)
4.8/5
(32)
Correct Answer:
True
In public key encryption, "signing" is the act of ________.
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
C
To ensure that a digital certificate is valid, the receiver of the certificate must check ________.
(Multiple Choice)
4.9/5
(30)
Signing a message digest means encrypting it with the sender's public key.
(True/False)
4.7/5
(30)
________ is the security guarantee that people who intercept messages cannot read them.
(Multiple Choice)
4.8/5
(48)
In public key encryption for authentication, the verifier decrypts the ciphertext with the supplicant's public key.
(True/False)
4.8/5
(34)
What usually is the longest stage in a cryptographic system dialogue?
(Multiple Choice)
4.8/5
(37)
Which of the following is one of the effective key lengths in 3DES?
(Multiple Choice)
4.9/5
(34)
In authentication, the party trying to provide its identity to the other party is called the applicant.
(True/False)
4.9/5
(31)
If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits?
(Multiple Choice)
4.8/5
(43)
Nearly all encryption for confidentiality uses symmetric key encryption ciphers.
(True/False)
4.8/5
(35)
Showing 1 - 20 of 122
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)