Exam 3: Cryptography
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
When Carol sends a message to Bob, Bob will use ________ to decrypt the message.
(Multiple Choice)
4.9/5
(39)
It is OK for a verifier to receive digital certificates from the sender.
(True/False)
4.7/5
(37)
In SSL/TLS, a ________ is a specific set of security methods and options.
(Multiple Choice)
4.8/5
(33)
An attack where an adversary intercepts an encrypted message and transmits it again later is called a ________.
(Multiple Choice)
4.9/5
(33)
Symmetric session key exchange can be done with public key encryption.
(True/False)
4.8/5
(33)
Which of the following is one of the effective key lengths in 3DES?
(Multiple Choice)
4.9/5
(36)
Which of the following statements accurately describes RC4?
(Multiple Choice)
4.8/5
(40)
________ is efficient enough in processing power and RAM requirements to be used on small devices, such as PDAs and cell phones.
(Multiple Choice)
4.8/5
(42)
To ensure that a digital certificate is valid, the receiver of the certificate must check ________.
(Multiple Choice)
4.9/5
(39)
For message-by-message authentication, each message must contain an electronic signature.
(True/False)
4.9/5
(36)
In public key encryption for authentication, the receiver decrypts with the public key of the sender.
(True/False)
4.9/5
(41)
Showing 61 - 80 of 122
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)