Exam 21: Cryptography and Security
Exam 1: What Is a Computer Network30 Questions
Exam 2: Network Topology30 Questions
Exam 3: Networking Hardware30 Questions
Exam 4: Ethernet Technology30 Questions
Exam 5: Token-Ring, fddi, and Other LAN Technologies30 Questions
Exam 6: Network Design and Troubleshooting Scenarios30 Questions
Exam 7: Low-Level Protocols30 Questions
Exam 8: The Tcpip Protocols30 Questions
Exam 9: Ipxspx, Appletalk, and Other Network Protocols30 Questions
Exam 10: Switching and Routing30 Questions
Exam 11: Network Management and Security30 Questions
Exam 12: Electronic Mail30 Questions
Exam 13: FTP and Telnet30 Questions
Exam 14: Multimedia Networking30 Questions
Exam 15: The Internet30 Questions
Exam 16: Writing a Network Application30 Questions
Exam 17: An Introduction to Networking With Windows30 Questions
Exam 18: Windows Domains30 Questions
Exam 19: Unix and Linux30 Questions
Exam 20: Other Network Operating Systems30 Questions
Exam 21: Cryptography and Security30 Questions
Exam 22: Security Hardware30 Questions
Exam 23: Security Software30 Questions
Exam 24: Forensic Techniques30 Questions
Select questions type
Symmetric encryption is generally thought to be more secure than asymmetric encryption.
Free
(True/False)
4.9/5
(36)
Correct Answer:
False
A(n)____________________ is a special word,phrase,or binary number that is used during encryption or decryption to manipulate the data.
Free
(Short Answer)
4.8/5
(40)
Correct Answer:
key
A JPG image is a complex data structure containing compressed DCT coefficients for ____ blocks of pixels.
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
B
____ is a fascinating and possibly dangerous technique for hiding one form of information inside another.
(Multiple Choice)
4.8/5
(33)
Match each item with a statement below.
-Involves taking encrypted information and putting it back into the original form
(Multiple Choice)
4.9/5
(31)
The ____________________ of the WAV file determines how much data can be hidden inside it.
(Short Answer)
4.8/5
(36)
Discuss the encryption strength of symmetric and asymmetric encryption.
(Essay)
4.9/5
(32)
A(n)____________________ cipher is an algorithm that encrypts or decrypts blocks of data,such as 64-bit or 128-bit chunks of information at a time.
(Short Answer)
4.8/5
(36)
Hashed data can be unhashed and turned back into their original form.
(True/False)
4.8/5
(40)
Symmetric encryption algorithms use one key for both encryption and decryption.
(True/False)
4.9/5
(41)
Asymmetric encryption algorithms use ____________________ keys to perform the encryption and decryption.
(Short Answer)
4.9/5
(35)
Match each item with a statement below.
-Two keys are used to encrypt and decrypt the data
(Multiple Choice)
4.9/5
(41)
The power of a particular encryption technique is based on the ____.
(Multiple Choice)
4.9/5
(29)
The ____ determines the level of data protection provided by the encryption technique.
(Multiple Choice)
4.8/5
(33)
Match each item with a statement below.
-Involves taking data and coding it into a different,unreadable form
(Multiple Choice)
4.8/5
(40)
____________________ is a technique to detect changes to information rather than encrypt and decrypt information.
(Short Answer)
4.9/5
(27)
Match each item with a statement below.
-The process to change something easy to read into something that is difficult to read
(Multiple Choice)
4.7/5
(35)
Even the best encryption algorithm can be outdone by improper use.
(True/False)
4.9/5
(32)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)