Exam 12: Cryptography
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
What is the difference between a public key and a private key?
Free
(Essay)
4.9/5
(31)
Correct Answer:
A public key is openly available;in many cases,public keys can be downloaded from Web sites for the public to use.A private key is the secret key known only by the key owner and should never be shared.
What is a digital signature?
Free
(Essay)
4.8/5
(31)
Correct Answer:
Asymmetric algorithms have a useful feature that enables a public key to decrypt a message that was encrypted using a private key,or vice versa.The only way a public key can decrypt a message that has been encrypted with a private key is when that message was encrypted by the corresponding private key's holder.This type of encryption is called a digital signature.
____ is the original password-cracking program now used by many government agencies to test for password strength.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
D
____, developed by Xuejia Lai and James Massey, is a block cipher that operates on 64-bit blocks of plaintext.
(Multiple Choice)
4.8/5
(38)
Another name for asymmetric algorithms is ____________________ key cryptography, and these terms are often used interchangeably.
(Short Answer)
4.7/5
(37)
Symmetric algorithms use two keys that are mathematically related.
(True/False)
4.9/5
(38)
____ was developed by Phil Zimmerman as a free e-mail encryption program that allowed typical users to encrypt e-mail messages.
(Multiple Choice)
4.8/5
(33)
MATCHING
Match each term with the correct statement below.
-uses a single key to encrypt and decrypt data
(Multiple Choice)
4.9/5
(35)
In a(n) ____________________ attack, the attacker captures data and attempts to resubmit the captured data so that the device, which can be a computer or router, thinks a legitimate connection is in effect.
(Short Answer)
4.8/5
(31)
____ means that a user can't deny he or she sent a message to a recipient, and the receiver of a message can't deny ever receiving the message.
(Multiple Choice)
4.8/5
(34)
MD5 is a variation of the SHA-1 hashing algorithm that processes blocks twice the size of SHA-1.
(True/False)
4.8/5
(34)
____ is used for encryption as well as digital signatures and key exchange.
(Multiple Choice)
4.8/5
(31)
MATCHING
Match each term with the correct statement below.
-uses two keys, one to encrypt and one to decrypt data
(Multiple Choice)
4.8/5
(29)
The ____ algorithm does not provide encryption but is used to establish the secret key between two parties.
(Multiple Choice)
4.9/5
(26)
In a ____ attack, the attacker has the ciphertext of several messages that were encrypted with the same encryption algorithm but has no access to the plaintext, so he or she must try to figure out the key used to encrypt the data.
(Multiple Choice)
4.8/5
(36)
A famous encryption device was the ____ machine developed by Arthur Scherbius and used by the Germans during World War II.
(Multiple Choice)
4.8/5
(36)
In a ____ attack, an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters.
(Multiple Choice)
4.8/5
(25)
____ refers to verifying the sender or receiver (or both) is who he or she claims to be.
(Multiple Choice)
4.7/5
(47)
Showing 1 - 20 of 58
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)