Exam 3: Cryptography
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
________ thwart replay attacks by ensuring "freshness" using cutoff values.
(Multiple Choice)
4.7/5
(40)
A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt messages.
(Multiple Choice)
4.7/5
(36)
Which of the following statements accurately describes RC4?
(Multiple Choice)
4.9/5
(33)
________ occurs when companies believe they have good security because they are using proprietary ciphers that hackers do not know.
(Multiple Choice)
4.9/5
(32)
To be strong, ________ keys need to be longer than ________ keys.
(Multiple Choice)
4.8/5
(30)
When Joshua sends a message to Larry, Joshua will use ________ to encrypt the message.
(Multiple Choice)
4.8/5
(39)
In cryptographic systems, keying takes place during the second handshaking stage.
(True/False)
4.9/5
(34)
When both parties prove their identities to the other, this is called ________.
(Multiple Choice)
4.9/5
(32)
When a hashing algorithm is applied, the hash will ALWAYS have a fixed length.
(True/False)
4.8/5
(35)
To test the digital signature, the verifier will use sender's public key.
(True/False)
4.8/5
(41)
Showing 21 - 40 of 122
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)