Exam 3: Cryptography
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
________ ciphers move letters around within a message but characters are not substituted.
(Multiple Choice)
4.9/5
(38)
A remote access VPN typically gives users access to multiple resources within a site.
(True/False)
4.9/5
(38)
When two parties communicate with each other using symmetric key encryption, how many keys are used in total to encrypt and decrypt?
(Multiple Choice)
4.8/5
(38)
Nearly all encryption for confidentiality uses ________ encryption ciphers.
(Multiple Choice)
4.9/5
(35)
To check a certificate's revocation status, the verifier can ________.
(Multiple Choice)
4.8/5
(41)
In SSL/TLS, a specific set of protocols that a particular cryptographic system will use to provide protection is called a ________.
(Multiple Choice)
4.8/5
(43)
What protection do cryptographic systems provide on a message-by-message basis?
(Multiple Choice)
4.9/5
(45)
In public key encryption for authentication, the supplicant must prove that it knows ________, which nobody else should be able to know.
(Multiple Choice)
4.7/5
(24)
The best way to thwart exhaustive searches by cryptanalysts is ________.
(Multiple Choice)
4.9/5
(45)
A ________ is a cryptographic system that provides secure communication over an untrusted network.
(Multiple Choice)
4.8/5
(39)
Showing 101 - 120 of 122
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)