Exam 3: Cryptography
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
________ is the use of mathematical operations to protect messages travelling between parties or stored on a computer.
(Multiple Choice)
4.8/5
(36)
When Emma sends a message to Lucy, Emma will use the public key to encrypt it.
(True/False)
4.9/5
(31)
When two parties in an IPsec connection communicate back and forth, there are ________ security associations.
(Multiple Choice)
4.8/5
(35)
Which of the following is one of the key lengths offered by AES?
(Multiple Choice)
4.9/5
(35)
In order to be considered strong today, a symmetric encryption key must be at least ________ bits long.
(Multiple Choice)
4.8/5
(33)
Companies transmit over the Internet because the Internet ________.
(Multiple Choice)
4.9/5
(35)
The sender the uses public key of the recipient in ________.
(Multiple Choice)
4.9/5
(36)
An attacker who captures the keying information in Diffie-Hellman key agreement can compute the symmetric session key.
(True/False)
4.8/5
(42)
________ ciphers leave letters in their original positions.
(Multiple Choice)
4.9/5
(35)
To meet national export limitation in many countries, RC4 often uses a key length of ________ bits.
(Multiple Choice)
4.8/5
(27)
Showing 81 - 100 of 122
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)